Fake Pegasus spyware's misuse surges on Dark Web: Researchers

By IANS | Published: May 23, 2024 11:05 AM2024-05-23T11:05:23+5:302024-05-23T11:10:07+5:30

New Delhi, May 23 Cyber-security researchers on Thursday warned about the widespread misuse of fake Pegasus spyware on ...

Fake Pegasus spyware's misuse surges on Dark Web: Researchers | Fake Pegasus spyware's misuse surges on Dark Web: Researchers

Fake Pegasus spyware's misuse surges on Dark Web: Researchers

New Delhi, May 23 Cyber-security researchers on Thursday warned about the widespread misuse of fake Pegasus spyware on the Dark Web where hackers are leveraging the name of Pegasus for financial gains.

Following Apple's recent notification to users in 92 countries about a ‘mercenary spyware’ attack, homegrown cybersecurity firm CloudSEK carried out an in-depth investigation.

They found a widespread misuse of Israel-based company NSO’s Pegasus spyware's name.

The findings serve “as an advisory against scammers and threat actors who are exploiting the growing recognition of NSO Group's renowned product, Pegasus, for their fraudulent purposes,” the researchers noted.

The researchers analysed approximately 25,000 posts on Telegram, many of which claimed to sell authentic Pegasus source code.

“These posts followed a common template offering illicit services, with Pegasus and NSO tools frequently mentioned,” the team mentioned.

This included purported Pegasus source code, live demonstrations, file structures, and snapshots.

“Similar misuse was observed on surface web code-sharing platforms, where actors disseminated randomly generated source codes falsely associated with Pegasus,” said researchers.

After analysing 15 samples and over 30 indicators from human intelligence (HUMINT), deep, and dark web sources, the team discovered that nearly all samples were “fraudulent and ineffective”.

Threat actors created their own tools and scripts, distributing them under Pegasus' name to capitalise on its notoriety for financial gain, the report said.

Disclaimer: This post has been auto-published from an agency feed without any modifications to the text and has not been reviewed by an editor

Open in app