In 2016, The New York Times, Wall Street Journal, Washington Post and many other media outlets covered Lookout and Citizen Lab's striking find: the most sophisticated, targeted, and persistent mobile attack ever found on iOS. On July 18, 2021, The Washington Post and 16 other media outlets reported that Pegasus was used on countless business executives, human rights activists, journalists, academics and government officials.
The attack allows an adversary to silently jailbreak an iOS device and stealthily spy on victims, collecting information from voice communications, camera, email, messaging, GPS, passwords, and contact lists.
This discovery is further proof that mobile platforms are fertile ground for gathering sensitive information from target victims, and well-resourced threat actors are regularly exploiting that mobile environment.
Spend four minutes reading this executive brief for a complete overview of the Pegasus spyware attack on iOS, including answers to the most commonly asked questions, a summary of the media response, and unique perspective from Lookout.
Read Lookout's investigation into this highly sophisticated espionage software. The attack takes advantage of how essential mobile devices are in our lives, spying on voice communications, camera, email, messaging, GPS, passwords, and contact lists.
Watch this on-demand webinar to learn the technical details of Lookout and Citizen Lab's striking find: the most sophisticated, targeted, and persistent mobile attack ever found in iOS.
Get visual, step-by-step instructions on how to determine if you've been affected by Pegasus.
Congressman Ted Lieu urges the U.S. government to pay closer attention to mobile security.
Learn how this attack directly applies to enterprises and how to protect sensitive data.