iMazing iPhone backup vs Pegasus spyware infection

Top Business Tech takes a closer look at the iMazing iPhone backup and management app, which can scan for Pegasus spyware malware.

Top Business Tech takes a closer look at the iMazing iPhone backup and management app, which can scan for Pegasus spyware.

After discovering private-owned spyware infection, Pegasus, on iPhones, several companies have started developing software to trace the spyware. One company to roll out a service to detect the infection is iPhone backup and management app, iMazing. 

What is Pegasus? 

Apple devices have been celebrated as “unhackable” or deemed completely safe instead of its competitor Android. Unfortunately, this belief has been proven wrong as politically motivated state-sponsored hacks have risen drastically in recent months. 

Pegasus is a zero-click spyware attack sent by iMessage that can collect emails, call records, social media posts, user passwords, contact lists, pictures, videos, sound recordings and browsing histories. It can also access cameras, microphones, listen to calls, and track the phone user’s movements. 

Israeli Surveillance company NSO Group used the malware to target over 50,000 individuals. Pegasus is effective against the latest Apple devices and iOS updates and is nearly undetectable by iPhone users as Apple products operate on a closed platform. 

Ivan Krsti, head of Apple Security Engineering and Architecture, defended his company’s security efforts. “Apple unequivocally condemns cyberattacks against journalists, human rights activists, and others seeking to make the world a better place. For over a decade, Apple has led the industry in security innovation and, as a result, security researchers agree iPhone is the safest, most secure consumer mobile device on the market,” he said in a statement. 

“Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals. While that means they are not a threat to the overwhelming majority of our users, we continue to work tirelessly to defend all our customers, and we are constantly adding new protections for their devices and data.”

Other IT professionals, however, have been far more commending. Security researcher Bill Marczak, a fellow at Citizen Lab, a research institute based at the University of Toronto’s Munk School of Global Affairs & Public Policy, said: “Your iPhone, and a billion other Apple devices out-of-the-box, automatically run famously insecure software to preview iMessages, whether you trust the sender or not. Any Computer Security 101 student could spot the flaw here.”

What is iMazing? 

iMazing released its spyware detection tool, detecting NSO’s Pegasus and other spyware on iPhone and iPad. The methodology implemented by iMazing closely resembles the open-source Mobile Verification Kit by Amnesty International’s Security Lab. It does this by searching for known malicious file names, links, processes and emails. 

iMazing’s guide on using iMazing spyware detection: 

  1. Launch iMazing on your Mac or PC and connect your iPhone or iPad via USB.
  2. Unlock your device and enter your passcode to establish a pairing with the computer.
  3. In the Actions panel, scroll down and click Detect Spyware.
  4. Follow the information and configuration steps carefully.
  5. Read the analysis report and refer to the documentation for help.

READ MORE:

Though iMazing cannot prevent spyware like Pegasus, it is an important advancement for individuals to identify if their device has been compromised. While Apple’s cybersecurity credibility comes increasingly under question, we can remain confident that Apple and other third-party developers will continue to develop solutions to mitigate against these evolving threats.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin

  • Overcoming the Obstacles to AI Adoption

  • Overcoming the Obstacles to AI Adoption

  • How Predictive AI is Helping the Energy Sector

  • How Predictive AI is Helping the Energy Sector

  • Cheltenham MSP is first official local cyber advisor

  • How we’re modernising BT’s UK Portfolio Businesses

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Overcoming the Obstacles to AI Adoption

Kit Cox • 02nd May 2024

The power of AI combined with suitable use cases and a robust implementation plan can help businesses to radically reduce the time spent on manual, repetitive tasks, and allow teams to prioritise value-added work. But in all the excitement, it’s evident that many businesses are held back by inertia, and a lack of understanding about...

Overcoming the Obstacles to AI Adoption

Kit Cox • 02nd May 2024

The power of AI combined with suitable use cases and a robust implementation plan can help businesses to radically reduce the time spent on manual, repetitive tasks, and allow teams to prioritise value-added work. But in all the excitement, it’s evident that many businesses are held back by inertia, and a lack of understanding about...

How Predictive AI is Helping the Energy Sector

Colin Gault head of product at POWWR • 29th April 2024

In the past year or so, we have seen the emergence of many new and exciting applications for predictive AI in the energy industry to better maintain and optimise energy assets. In fact, the advances in the technology have been nothing short of rapid. The challenge, though, has been in supplying the ‘right’ data to...

How Predictive AI is Helping the Energy Sector

Colin Gault head of product at POWWR • 29th April 2024

In the past year or so, we have seen the emergence of many new and exciting applications for predictive AI in the energy industry to better maintain and optimise energy assets. In fact, the advances in the technology have been nothing short of rapid. The challenge, though, has been in supplying the ‘right’ data to...

Cheltenham MSP is first official local cyber advisor

Neil Smith Managing Director of ReformIT • 23rd April 2024

ReformIT, a Managed IT Service and Security provider (MSP) based in the UK’s cyber-capital, Cheltenham, has become the first MSP in the local area to be accredited as both a Cyber Advisor and a Cyber Essentials Certification Body. The Cyber Advisor scheme was launched by the Government’s official National Cyber Security Centre (NCSC) and the...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

What is a User Journey

Erin Lanahan • 19th April 2024

User journey mapping is the compass guiding businesses to customer-centric success. By meticulously tracing the steps users take when interacting with products or services, businesses gain profound insights into user needs and behaviors. Understanding users’ emotions and preferences at each touchpoint enables the creation of tailored experiences that resonate deeply. Through strategic segmentation, persona-driven design,...