iMazing iPhone backup vs Pegasus spyware infection

Top Business Tech takes a closer look at the iMazing iPhone backup and management app, which can scan for Pegasus spyware malware.

Top Business Tech takes a closer look at the iMazing iPhone backup and management app, which can scan for Pegasus spyware.

After discovering private-owned spyware infection, Pegasus, on iPhones, several companies have started developing software to trace the spyware. One company to roll out a service to detect the infection is iPhone backup and management app, iMazing. 

What is Pegasus? 

Apple devices have been celebrated as “unhackable” or deemed completely safe instead of its competitor Android. Unfortunately, this belief has been proven wrong as politically motivated state-sponsored hacks have risen drastically in recent months. 

Pegasus is a zero-click spyware attack sent by iMessage that can collect emails, call records, social media posts, user passwords, contact lists, pictures, videos, sound recordings and browsing histories. It can also access cameras, microphones, listen to calls, and track the phone user’s movements. 

Israeli Surveillance company NSO Group used the malware to target over 50,000 individuals. Pegasus is effective against the latest Apple devices and iOS updates and is nearly undetectable by iPhone users as Apple products operate on a closed platform. 

Ivan Krsti, head of Apple Security Engineering and Architecture, defended his company’s security efforts. “Apple unequivocally condemns cyberattacks against journalists, human rights activists, and others seeking to make the world a better place. For over a decade, Apple has led the industry in security innovation and, as a result, security researchers agree iPhone is the safest, most secure consumer mobile device on the market,” he said in a statement. 

“Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals. While that means they are not a threat to the overwhelming majority of our users, we continue to work tirelessly to defend all our customers, and we are constantly adding new protections for their devices and data.”

Other IT professionals, however, have been far more commending. Security researcher Bill Marczak, a fellow at Citizen Lab, a research institute based at the University of Toronto’s Munk School of Global Affairs & Public Policy, said: “Your iPhone, and a billion other Apple devices out-of-the-box, automatically run famously insecure software to preview iMessages, whether you trust the sender or not. Any Computer Security 101 student could spot the flaw here.”

What is iMazing? 

iMazing released its spyware detection tool, detecting NSO’s Pegasus and other spyware on iPhone and iPad. The methodology implemented by iMazing closely resembles the open-source Mobile Verification Kit by Amnesty International’s Security Lab. It does this by searching for known malicious file names, links, processes and emails. 

iMazing’s guide on using iMazing spyware detection: 

  1. Launch iMazing on your Mac or PC and connect your iPhone or iPad via USB.
  2. Unlock your device and enter your passcode to establish a pairing with the computer.
  3. In the Actions panel, scroll down and click Detect Spyware.
  4. Follow the information and configuration steps carefully.
  5. Read the analysis report and refer to the documentation for help.

READ MORE:

Though iMazing cannot prevent spyware like Pegasus, it is an important advancement for individuals to identify if their device has been compromised. While Apple’s cybersecurity credibility comes increasingly under question, we can remain confident that Apple and other third-party developers will continue to develop solutions to mitigate against these evolving threats.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin

  • Custom Software Development

  • The Impact of Test Automation on Software Quality

  • Custom Software Development

  • AI-SDRs and the Future of B2B Sales: Risks vs. Rewards

  • The Power of AI SDRs and the Brain Behind It All

  • BUILD GLOBAL AWARENESS USING REAL-WORLD EXPERIENCES

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Custom Software Development

Natalia Yanchii • 04th October 2024

There is a wide performance gap between industry-leading companies and other market players. What helps these top businesses outperform their competitors? McKinsey & Company researchers are confident that these are digital technologies and custom software solutions. Nearly 70% of the top performers develop their proprietary products to differentiate themselves from competitors and drive growth. As...

The Impact of Test Automation on Software Quality

Natalia Yanchii • 04th October 2024

Software systems have become highly complex now, with multiple interconnected components, diverse user interfaces, and business logic. To ensure quality, QA engineers thoroughly test these systems through either automated or manual testing. At Testlum, we met many software development teams who were pressured to deliver new features and updates at a faster pace. The manual...

Custom Software Development

Natalia Yanchii • 03rd October 2024

There is a wide performance gap between industry-leading companies and other market players. What helps these top businesses outperform their competitors? McKinsey & Company researchers are confident that these are digital technologies and custom software solutions. Nearly 70% of the top performers develop their proprietary products to differentiate themselves from competitors and drive growth. As...

Six ways to maintain compliance and remain secure

Patrick Spencer VP at Kiteworks • 16th September 2024

With approximately 3.4 billion malicious emails circulating daily, it is crucial for organisations to implement strong safeguards to protect against phishing and business email compromise (BEC) attacks. It is a problem that is not going to go away. In fact, email phishing scams continue to rise, with news of Screwfix customers being targeted breaking at...

Enriching the Edge-Cloud Continuum with eLxr

Jeff Reser • 12th September 2024

At the global Debian conference this summer, the eLxr Project was launched, delivering the first release of a Debian derivative that inherits the intelligent edge capabilities of Debian, with plans to expand these for a streamlined edge-to-cloud deployment approach. eLxr is an open source, enterprise-grade Linux distribution that addresses the unique challenges of near-edge networks...
The Digital Transformation Expo is coming to London on October 2-3. Register now!