After extensive research and understanding of how Pegasus Spyware is operating inside of iOS and Android OS systems I have created tools that will be able to identify & validate the presence of the spyware on mobile devices, and tablets. Initial detection points were derived from the mvt-project. https://github.com/mvt-project/mvt
These tools do not require your android device to be rooted and you do not have to take a full backup of your iOS device.
Background: I am a professional mobile security engineer, and mobile forensic analyst. I work with human rights groups around the world teaching ethical mobile forensics practices, how to reverse engineer APTs, and how to engineer software and hardware tools to protect against data privacy violations among other things.
I Developed Mobile & IOT Device ID, Diagnostics, Data Clearing & Validation utilities for publicly traded companies around the world. I have worked with US government agencies, and privately held firms in this same regard.
For the past 8 years I was contracted to create mobile and IOT backdoors into software, firmware, and hardware.
Pending Peer Review, I have reached out to Citizen Labs for review before I post.
Pending Peer Review, I have reached out to Citizen Labs for review before I post.
Pending Peer Review, I have reached out to Citizen Labs for review before I post.
Pending Peer Review, I have reached out to Citizen Labs for review before I post.
This is just an identification tool set, I am working on remediation tools, but they are not ready for review yet.