How Big of a Threat to Your Crypto is Scandalous Pegasus Spyware?

How Big of a Threat to Your Crypto is Scandalous Pegasus Spyware? 101

A data leak revealed a malware that may have been used for spying on human rights activists, journalists, and lawyers across the world. It infects people’s Android and iOS devices, extracting all the existing information. Yet, the threat doesn’t seem to be that large for crypto users, according to security experts speaking to Cryptonews.com, both for technical reasons, as well the fact that ‘regular’ people aren’t typically such tools’ targets. That said, the risk is still there – even if all the passwords are stored safely.

The Guardian reported, citing "an investigation into a massive data leak" done with 16 other media organizations, that a piece of malware called Pegasus, coming from the Israeli surveillance company NSO Group, has been sold to authoritarian regimes, which used it to target pro-democracy activists and journalists investigating corruption, as well as political opponents and government critics.

NSO Group insists the tool is only intended for use against criminals and terrorists, the report said.

The leak, however, reportedly contains a list of more than 50,000 phone numbers that "have been identified as those of people of interest by clients of NSO since 2016" – including the numbers of more than 180 journalists, and even those of close family members of a country’s ruler.

At least ten governments, believed to be NSO customers, were entering numbers into a system, while the phone numbers spanned more than 45 countries across four continents.

This was done possibly ahead of a surveillance attack.

"Forensics analysis of a small number of phones whose numbers appeared on the leaked list also showed more than half had traces of the Pegasus spyware," stated the Guardian.

Pegasus is a spyware, first discovered as an iOS version in 2016, and later for Android as well. According to Dmitry Galov, Security Researcher from the GReAT (Security Researcher, Global Research & Analysis Team) at cybersecurity firm Kaspersky, the main infection scheme is sending an SMS with a link to the victim, and if they click on it, the device gets infected with the spyware. Also, in order to infect iOS, the spyware exploits zero-day vulnerabilities found in the system.

Even back in 2017, Pegasus for Android was able to read SMS and emails, listen to calls, take screenshots, and access contacts and browser history, among other functionalities, he said.

Read the article:  Public Pension Funds In Virginia Keen on Getting More Direct Exposure to Cryptocurrencies

As for how this could affect crypto, according to Galov, "Pegasus seems to be able to carry out a lot of different actions, including recording keystrokes and accessing various data on the phone."

If the passwords to crypto wallets are kept on the phone, the risks are clear, he told Cryptonews.com. But even if the passwords are stored securely, there still might be risks, cautioned Galov.

However, the Security Researcher noted that Pegasus is a spyware and its purpose, per public information, is primarily collecting information from specific individuals rather than a financial crime.

Per the Kaspersky team’s explanation, Pegasus is a complex and expensive malware, and it is designed to spy on "individuals of particular interest, so the average user is unlikely to encounter it."

Another expert finds that Pegasus is not necessarily a major threat to crypto users, though caution is always in order.

Gina Kim, a South Korean IT security expert based in Seoul told Cryptonews.com that, not having seen it in person, "it’s quite difficult to say if this piece of ‘spyware’ could affect crypto apps or not at this stage."

However, multi-factor authentication systems seem to be of help in these situations.

Per Kim, most major South Korean crypto exchange apps "use fairly sophisticated two or three factor authentication systems that are relatively resistant to most forms of hacking and phone-based malware."

However, a spyware – as the name indicates – poses an arguably large threat to an individual’s or organization’s privacy in either case.

However, per Sušánka, when it comes to Trezor specifically, those behind the spyware can’t manipulate the cryptocurrency in the wallet unless the user physically approves it. The wallet has the so-called trusted display – therefore, all transactions need to be confirmed by the user on Trezor’s screen, not in any other application or website. "So even in such cases where the phone is affected by malware, Trezor shows the data it actually works with on its display," meaning that "the malware can’t e.g. send coins to their address, etc," he said.

As Pegasus targets Android and iOS devices specifically, Trezor is not affected directly, said the CTO, adding that "the wallet runs single-purpose custom software which is written and maintained by SatoshiLabs and fully open-source for audibility."

Read the article:  Bitcoin Returns Above USD 30K, Ethereum, Altcoins Rally

It is worth distinguishing between two concepts: spyware and vulnerabilities, said Kaspersky’s Galov. Pegasus is a spyware that, in order to infect iOS, exploits zero-day vulnerabilities – those that the developer does not know about and for which a fix has not yet been released. Still, these, when found, can be exploited by cybercriminals to implement a variety of types of attacks, including targeted attacks.

Both spyware and zero-day vulnerabilities can be sold and bought on the darknet by various groups, on the darknet, and the price of vulnerabilities can reach USD 2.5m – which is "how much was offered in 2019 for the full chain of vulnerabilities in Android," Galov said. He added that, "interestingly, that year, for the first time, an Android vulnerability turned out to be more expensive than an iOS vulnerability."

Generally speaking, the best way to stay protected against such tools as Pegasus is to "provide as much information on these cases as it possible, to related software and security vendors," said Galov. "Software developers will fix the vulnerabilities exploited by the attackers and security vendors will take measures to detect and protect users from them."

With additional reporting by Tim Alper.

Every trader who trades cryptocurrency on the Binance exchange wants to know about the upcoming pumping in the value of coins in order to make huge profits in a short period of time.
This article contains instructions on how to find out when and which coin will participate in the next “Pump”. Every day, the community on Telegram channel Crypto Pump Signals for Binance publishes 1-2 free signals about the upcoming “Pump” and reports on successful “Pumps” which have been successfully completed by the organizers of the VIP community.
These trading signals help earn from 20% to 150% profit in just a few hours after purchasing the coins published on the Telegram channel “Crypto Pump Signals for Binance”. Are you already making a profit using these trading signals? If not, then try it! We wish you good luck in trading cryptocurrency and wish to receive the same profit as VIP users of the Crypto Pump Signals for Binance channel. Examples can be seen on this page!
John Lesley/ author of the article

John Lesley is an experienced trader specializing in technical analysis and forecasting of the cryptocurrency market. He has over 10 years of experience with a wide range of markets and assets - currencies, indices and commodities.John is the author of popular topics on major forums with millions of views and works as both an analyst and a professional trader for both clients and himself.

Leave a Reply