Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

What is Pegasus spyware, and how to detect and remove it
Norton.com ^ | June 13, 2025 | Jeremy Coppock

Posted on 10/25/2025 7:48:58 PM PDT by ransomnote

I'm not recommending any remedies for hacked phones - not even the one at the link, because I am not technical and I'm skeptical of commercial software said to work on state level cyber spying.

While Pegasus spyware was designed by an Israeli cyber-intelligence company to combat criminal and terrorist activities, it has also been used to spy on voices challenging power, like activists, journalists, and whistleblowers.

Data suggests that more than 50,000 people are being, or have been, monitored by Pegasus spyware — with serious implications for their privacy and personal safety. Learn more about this unsettling spyware and get tips on how to detect and remove it in the unlikely event that you’re targeted.

What is Pegasus spyware?

Pegasus is an advanced spyware tool that targets smartphones. Most often used by government actors, it gives attackers real-time access to sensitive data stored on the affected device, allowing them to monitor all sorts of activity. Emails, messages, calls, photos, location, and even camera and microphone data could all be compromised on a phone infected with Pegasus.

Pegasus usually infects mobile devices through zero-click attacks that exploit unpatched vulnerabilities. However, some attacks still lean on traditional methods like phishing which require user interaction, typically in the form of clicking a link that triggers the installation.

SNIP

How does Pegasus spyware work?  

Once a license for Pegasus spyware has been obtained, the attacker selects a strategic target, infects their phone using zero-click attacks or a phishing scheme, harvests data, and either watches user activities in real-time or exfiltrates data back to their servers.


(Excerpt) Read more at us.norton.com ...


TOPICS: Miscellaneous
KEYWORDS: ohnoes; qanonwillsaveus; superbad

1 posted on 10/25/2025 7:48:58 PM PDT by ransomnote
[ Post Reply | Private Reply | View Replies]

To: ransomnote

There’s a Pegasus email program. Too bad malware stole the name.


2 posted on 10/25/2025 7:53:56 PM PDT by Dr. Sivana ("Whatsoever he shall say to you, do ye." (John 2:5))
[ Post Reply | Private Reply | To 1 | View Replies]

To: ransomnote

What platform does it attack?


3 posted on 10/25/2025 8:25:32 PM PDT by Albion Wilde (To live free is the greatest gift; to die free is the greatest victory. —Erica Kirk)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ransomnote

If your phone is more than a few years old, just get a new one.


4 posted on 10/25/2025 8:45:01 PM PDT by smokingfrog ( sleep with one eye open (<o> --- )
[ Post Reply | Private Reply | To 1 | View Replies]

To: ransomnote
It's an interesting article, thanks for posting it.

Be aware, though, that the article is an advertisement for Norton security software -- it is not a neutral source. They are selling a product. A product which, by the way, I do not recommend.

Also, as the article makes clear, the subject "Pegasus" spyware is NOT ADDRESSED by Norton's software. Pegasus is way above the level of Norton's products. The likelihood of the average person being infected by Pegasus is vanishingly small, unless they are an explicit target of government surveillance, which despite the tinfoil hats we all wear at times, we are not.

5 posted on 10/25/2025 9:49:22 PM PDT by dayglored (This is the day which the LORD hath made; we will rejoice and be glad in it. Psalms 118:24)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ransomnote

Bkmk


6 posted on 10/25/2025 9:53:02 PM PDT by sauropod
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Thank you for the clarity!
I too, reject Norton’s in all its forms - it just provides a false sense of security.


7 posted on 10/25/2025 10:36:40 PM PDT by ransomnote (IN GOD WE TRUST)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Albion Wilde; ransomnote
> What platform does it attack?

Both Android (Google, etc.) and iOS (Apple) platforms.

That includes mobile devices, mainly smartphones, but could also be used against any device running either of those operating systems.

8 posted on 10/25/2025 11:26:34 PM PDT by dayglored (This is the day which the LORD hath made; we will rejoice and be glad in it. Psalms 118:24)
[ Post Reply | Private Reply | To 3 | View Replies]

To: ransomnote

Good post...


9 posted on 10/26/2025 8:36:31 AM PDT by Openurmind (AI - An Illusion for Aptitude Intrusion to Alter Intellect. )
[ Post Reply | Private Reply | To 1 | View Replies]

To: Openurmind

“Good post...”

Why thank you! :D


10 posted on 10/28/2025 3:09:43 PM PDT by ransomnote (IN GOD WE TRUST)
[ Post Reply | Private Reply | To 9 | View Replies]

To: ransomnote

It is a serious problem... :)


11 posted on 10/28/2025 5:27:08 PM PDT by Openurmind (AI - An Illusion for Aptitude Intrusion to Alter Intellect. )
[ Post Reply | Private Reply | To 10 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson