the malware you can defend yourself against
is the headline of the news that the author of WTM News has collected this article. Stay tuned to WTM News to stay up to date with the latest news on this topic. We ask you to follow us on social networks.
Trendy malware has a name: Pegasus. It affects the high institutions of the States and companies and private users. Developed by the Israeli company NSO Group, it is one of the most complex and sophisticated viruses in the world that has multiple remote control capabilities and is specifically designed for cyber espionage tasks.
We are dealing with a type of spyware that takes advantage of and exploits a multitude of vulnerabilities and exploits of the “Zero-day” type. In addition, its characteristic is that it affects the operating systems of all mobile terminals: iOS, Android, BlackBerry and even Symbian, and at least seven different versions of the malware are known.
The operation of Pegasus is developed in different phases:
Step 1: Infect
Step 2: Escalate privileges
Step 3: Discover
Step 4: Access credentials
Step 5: Take control of the device
Step 6: Listen, steal
Step 7: Sending the stolen information
Pegasus is a type of spyware that takes advantage of and exploits a multitude of vulnerabilities and exploits of the “Zero-day” type.
Since it jumped to the front pages of all the national media, it has been suggested that there are no tools to combat Pegasus, since one of its characteristics is that it does not require the user to take any action for the malware to be detected. install in terminal. However, from the National Cryptologic Center they point out the solutions that, at this time, would prevent Pegasus from running.
One of them is Ivanti’s Mobileiron Core solution that provides Unified Endpoint Management (UEM) allowing users in an organization to enjoy seamless access to corporate applications and data across mobile devices, tablets and smartphones. computers, while maintaining full control of your privacy. It also allows the maximum and safe optimization of the potential of devices, applications and mobility in general, thus enabling digital transformation and corporate innovation.
Another of the solutions, also from Ivanti, is MobileIron Threat Defense which, according to the National Cryptologic Center, allows mobile devices to be supervised, managed and secured against cyberattacks on devices, networks and applications. Detect both known and zero-day threats, even without network connectivity. The four pillars that define this security functionality are proactive threat and attack detection, timely remediation, increased device and network visibility, and easy management.