Targeted iOS Spyware: What you need to know to protect your organization from Pegasus and Trident

On August 25, The New York Times, Wall Street Journal, Washington Post and many other media outlets covered Lookout and Citizen Lab's striking find: the most sophisticated, targeted, and persistent mobile attack ever found on iOS.

The attack allows an adversary to silently jailbreak an iOS device and stealthily spy on victims, collecting information from voice communications, camera, email, messaging, GPS, passwords, and contact lists.

This discovery is further proof that mobile platforms are fertile ground for gathering sensitive information from target victims, and well-resourced threat actors are regularly exploiting that mobile environment.


From the Lookout Blog

The five things CISOs and CIOs should do now

With just a single tap the Pegasus attack has the capability to cause catastrophic data loss to a targeted individual or organization, completely compromising all communications from a smartphone — including data from end-to-end encrypted applications. CISOs and CIOs should read this post to learn the top five things to do now.

Read more arrow_forward

Device already infected with Pegasus? Updating your OS won’t help

Updating to the latest iOS version will unfortunately not remove or detect Trident if the device is already infected. If an attacker has already infected a device with Trident, updating to iOS 9.3.5, the latest version of iOS, will only protect against future infection. It does not remove the spyware itself or alert enterprises to infections.

Read more arrow_forward

MDM solutions don’t deliver sufficient protection against Pegasus

MDMs can only detect known jailbreak techniques. Pegasus used advanced exploits of zero-day vulnerabilities to jailbreak the device. Now that these advanced techniques are publicly known, we have not observed any MDM technology that is currently able to detect them.

Read more arrow_forward

Encryption and VPNs alone do not protect you from Pegasus and Trident

Encryption and VPNs are excellent tools that protect sensitive data in most situations. However, Pegasus has kernel level access to the device. This means the spyware sits in the path of all data, and uses “function hooking” to alter the legitimate app itself and intercept the decrypted communications.

Read more arrow_forward

As Featured In

60 Minutes

Everything is hackable, especially your cellphone, as Sharyn Alfonsi finds out

Watch episode arrow_forward
The Washington Post

This malware sold to governments could help them spy on iPhones, researchers say

Read article arrow_forward
AirWatch

What You Need to Know about Trident & Pegasus

Read more arrow_forward
The New York Times

iPhone Users Urged to Update Software After Security Flaws Are Found

Read article arrow_forward
Microsoft

Apple zero-days mark a new era of mobile hacking

Learn more arrow_forward
Microsoft

Microsoft and Lookout have been working together on a partnership for mobile security

Learn more arrow_forward
Wall Street Journal

Startup Manipulated iPhone to Allow Government Spying, Report Says

Read article arrow_forward

Learn More: Threat Brief and Technical Analysis

Get a quick overview and answers to the most frequently asked questions about the Pegasus spyware and Trident vulnerabilities from the Executive Four-Minute Read document below, ideal for CEOs and business executives.

CISOs, CIOs, and Security Researchers should get a copy of the Technical Analysis of Pegasus Spyware, the most in-depth information available on this unprecedented attack, from the only security company with samples of Pegasus.

Executive Four Minute Read
Pegasus and Trident: Executive four-minute read

Spend four minutes reading this executive brief for a complete overview of the Pegasus spyware attack on iOS, including answers to the most commonly asked questions, a summary of the media response, and unique perspective from Lookout.

Get the executive brief arrow_forward
Technical Analysis of Pegasus Spyware

Read Lookout's investigation into this highly sophisticated espionage software. The attack takes advantage of how essential mobile devices are in our lives, spying on voice communications, camera, email, messaging, GPS, passwords, and contact lists.

Get the report arrow_forward
On-demand Webinar

iOS Spyware: How To Protect Your Enterprise

Watch this on-demand webinar to learn the technical details of Lookout and Citizen Lab's striking find: the most sophisticated, targeted, and persistent mobile attack ever found in iOS.

Watch the on-demand webinar

Watch the on-demand webinar


More actionable insights and perspective about the Pegasus spyware and Trident vulnerabilities


The Pegasus attack: How to determine if you’re impacted

Get visual, step-by-step instructions on how to determine if you've been affected by Pegasus.

Datasheet Download Datasheet


Congressman urges congressional hearing after Trident discovery

Congressman Ted Lieu urges the U.S. government to pay closer attention to mobile security.

Blog Read Blog Post


3 things CISOs need to know about the Trident iOS vulnerabilities

Learn how this attack directly applies to enterprises and how to protect sensitive data.

Blog Read Blog Post

Determine if your organization's iOS devices are still infected by Pegasus.

Contact Us Now call_made


    Close