iMazing iPhone backup vs Pegasus spyware infection

Top Business Tech takes a closer look at the iMazing iPhone backup and management app, which can scan for Pegasus spyware malware.

Top Business Tech takes a closer look at the iMazing iPhone backup and management app, which can scan for Pegasus spyware.

After discovering private-owned spyware infection, Pegasus, on iPhones, several companies have started developing software to trace the spyware. One company to roll out a service to detect the infection is iPhone backup and management app, iMazing. 

What is Pegasus? 

Apple devices have been celebrated as “unhackable” or deemed completely safe instead of its competitor Android. Unfortunately, this belief has been proven wrong as politically motivated state-sponsored hacks have risen drastically in recent months. 

Pegasus is a zero-click spyware attack sent by iMessage that can collect emails, call records, social media posts, user passwords, contact lists, pictures, videos, sound recordings and browsing histories. It can also access cameras, microphones, listen to calls, and track the phone user’s movements. 

Israeli Surveillance company NSO Group used the malware to target over 50,000 individuals. Pegasus is effective against the latest Apple devices and iOS updates and is nearly undetectable by iPhone users as Apple products operate on a closed platform. 

Ivan Krsti, head of Apple Security Engineering and Architecture, defended his company’s security efforts. “Apple unequivocally condemns cyberattacks against journalists, human rights activists, and others seeking to make the world a better place. For over a decade, Apple has led the industry in security innovation and, as a result, security researchers agree iPhone is the safest, most secure consumer mobile device on the market,” he said in a statement. 

“Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals. While that means they are not a threat to the overwhelming majority of our users, we continue to work tirelessly to defend all our customers, and we are constantly adding new protections for their devices and data.”

Other IT professionals, however, have been far more commending. Security researcher Bill Marczak, a fellow at Citizen Lab, a research institute based at the University of Toronto’s Munk School of Global Affairs & Public Policy, said: “Your iPhone, and a billion other Apple devices out-of-the-box, automatically run famously insecure software to preview iMessages, whether you trust the sender or not. Any Computer Security 101 student could spot the flaw here.”

What is iMazing? 

iMazing released its spyware detection tool, detecting NSO’s Pegasus and other spyware on iPhone and iPad. The methodology implemented by iMazing closely resembles the open-source Mobile Verification Kit by Amnesty International’s Security Lab. It does this by searching for known malicious file names, links, processes and emails. 

iMazing’s guide on using iMazing spyware detection: 

  1. Launch iMazing on your Mac or PC and connect your iPhone or iPad via USB.
  2. Unlock your device and enter your passcode to establish a pairing with the computer.
  3. In the Actions panel, scroll down and click Detect Spyware.
  4. Follow the information and configuration steps carefully.
  5. Read the analysis report and refer to the documentation for help.

READ MORE:

Though iMazing cannot prevent spyware like Pegasus, it is an important advancement for individuals to identify if their device has been compromised. While Apple’s cybersecurity credibility comes increasingly under question, we can remain confident that Apple and other third-party developers will continue to develop solutions to mitigate against these evolving threats.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin

  • An image of , News, Addressing Regulatory Compliance in Government-Owned, Single-Use Devices

    Addressing Regulatory Compliance in Government-Owned, Single-Use Devices

  • An image of , News, Advantages of Cloud-based CAD Solutions for Modern Designers

    Advantages of Cloud-based CAD Solutions for Modern Designers

  • An image of , News, Harnessing IoT Technology for Stolen Vehicle Recovery

    Harnessing IoT Technology for Stolen Vehicle Recovery

  • An image of , News, Experts gather for UK Cyber Week to support neurodiversity

    Experts gather for UK Cyber Week to support neurodiversity

  • An image of , News, AI in Europe heats up as banks increase investment

    AI in Europe heats up as banks increase investment

  • An image of , News, Experts gather at UK Cyber Week to address neurodiversity

    Experts gather at UK Cyber Week to address neurodiversity

Follow us on LinkedIn and Twitter

An image of , News, iMazing iPhone backup vs Pegasus spyware infection

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Unlocking productivity and efficiency gains with data management

Russ Kennedy • 04th July 2023

Enterprise data has been closely linked with hardware for numerous years, but an exciting transformation is underway as the era of the hardware businesses is gone. With advanced data services available through the cloud, organisations can forego investing in hardware and abandon infrastructure management in favour of data management.