Source |
Schneier on Security |
Identifiant |
8620625 |
Date de publication |
2024-12-06 12:09:12 (vue: 2024-12-06 13:07:46) |
Titre |
Detecting Pegasus Infections |
Texte |
This tool seems to do a pretty good job.
The company’s Mobile Threat Hunting feature uses a combination of malware signature-based detection, heuristics, and machine learning to look for anomalies in iOS and Android device activity or telltale signs of spyware infection. For paying iVerify customers, the tool regularly checks devices for potential compromise. But the company also offers a free version of the feature for anyone who downloads the iVerify Basics app for $1. These users can walk through steps to generate and send a special diagnostic utility file to iVerify and receive analysis within hours. Free users can use the tool once a month. iVerify’s infrastructure is built to be privacy-preserving, but to run the Mobile Threat Hunting feature, users must enter an email address so the company has a way to contact them if a scan turns up spyware—as it did in the seven recent Pegasus discoveries...
This tool seems to do a pretty good job.
The company’s Mobile Threat Hunting feature uses a combination of malware signature-based detection, heuristics, and machine learning to look for anomalies in iOS and Android device activity or telltale signs of spyware infection. For paying iVerify customers, the tool regularly checks devices for potential compromise. But the company also offers a free version of the feature for anyone who downloads the iVerify Basics app for $1. These users can walk through steps to generate and send a special diagnostic utility file to iVerify and receive analysis within hours. Free users can use the tool once a month. iVerify’s infrastructure is built to be privacy-preserving, but to run the Mobile Threat Hunting feature, users must enter an email address so the company has a way to contact them if a scan turns up spyware—as it did in the seven recent Pegasus discoveries... |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
activity address also analysis android anomalies anyone app based basics built but can checks combination company company’s compromise contact customers detecting detection device devices diagnostic did discoveries downloads email enter feature file free generate good has heuristics hours hunting infection infections infrastructure ios iverify iverify’s job learning look machine malware mobile month must offers once paying pegasus potential preserving pretty privacy receive recent regularly run scan seems send seven signature signs special spyware spyware—as steps telltale them these threat through tool turns use users uses utility version walk way who within |
Tags |
Malware
Tool
Threat
Mobile
|
Stories |
|
Move |
|