CPJ Safety Advisory: Journalist targets of Pegasus spyware

An Israeli woman uses her iPhone in front of the building housing the Israeli NSO group, on August 28, 2016, in Herzliya, near Tel Aviv. NSO Group has been accused of facilitating surveillance of journalists through sales of its Pegasus spyware. (AFP/Jack Guez)

An Israeli woman uses her iPhone in front of the building housing the Israeli NSO group, on August 28, 2016, in Herzliya, near Tel Aviv. NSO Group has been accused of facilitating surveillance of journalists through sales of its Pegasus spyware. (AFP/Jack Guez)

Updated January 31, 2024

Pegasus is a spyware created for mobile devices which transforms a cellphone into a mobile surveillance station. Researchers have documented it being used to spy on journalists around the world. This raises significant implications for journalists’ own security and that of their sources.

Pegasus can be inserted onto a phone in a number of ways detailed below. Once on the device, the spyware gives the attacker the ability to monitor, record, and collect existing and future data from the phone. This includes calls and information from messaging applications and real-time location data. The spyware is able to remotely activate the camera and microphone to surveil the target and their surroundings.

The Israel-based NSO Group, which produces Pegasus, markets tools for investigating crime and terrorism to government agencies. (NSO Group has repeatedly told CPJ that it will not comment on individual cases, but investigates reports that its products were misused in breach of contract.)

Guidance for journalists and newsrooms

Pegasus is designed to be installed on phones running Android, and iOS without alerting the target to its presence. Journalists will likely only know if their phone has been infected if the device is inspected by a trusted tech expert. Journalists who are concerned may wish to share this guide with them.

If you have reason to believe you have been targeted and have spyware on your device:

Spyware defense for iOS  

Apple’s iOS 16 introduced lockdown mode, a security feature to reduce the number of ways spyware can be inserted onto an iPhone, as well as iPads running iOS 16 and MacOS Ventura.  

Lockdown mode restricts some functionality, including FaceTime calls from unknown numbers and what others can share with you via iMessage and Photos apps.  

Journalists who believe they are at risk of being targeted by Pegasus should turn on lockdown mode. To do this:  

  • Enable lockdown mode in privacy and security settings.
  • Restart your phone to activate it.

Advice for different types of attack

Pegasus can be installed in a number of ways. Journalists should keep up to date on these methods and take appropriate steps to protect themselves and their sources.

Zero-day attacks

Zero-day attacks, also known as zero-click attacks, exploit vulnerable software, not people. They require no interaction from the user.

Protecting yourself against a zero-day attack is difficult. Journalists who may be targeted by a sophisticated adversary such as a government should:

For journalists using other phones and operating systems:

Network injection attacks

A network injection attack does not require any interaction with the user; instead, it involves the automatic redirecting of browsers or apps to sites controlled by attackers. This is also known as a Man in the Middle Attack (MITM). Once connected to the malicious site, attackers infect the device through vulnerabilities in the software.

A journalist is highly unlikely to know whether they have been the target of this type of network injection attack and protecting against it can be difficult.

To minimize risk:

Spear-phishing attacks

Attackers create tailor-made messages that are sent to a specific journalist. These messages convey a sense of urgency and contain a link or a document which the journalist is encouraged to click on. The messages come in a variety of forms, including SMS, email, through messaging apps such as WhatsApp, or via messages on social media platforms. Once the journalist has clicked on the link, then the spyware is installed on their phone.

Research by Citizen Lab and Amnesty International found that messages tend to take the following forms:

The suspect messages may also arrive from unknown numbers.

Attackers can target personal and work phones. To better protect themselves and their sources, journalists should:

Physical installation by an adversary

Pegasus can also be installed on your phone if an adversary gains physical access to the device. To reduce risk:

For more information to protect yourself and your sources, consult CPJ’s Digital Safety Kit. Follow CPJ’s spyware coverage and advocacy to learn more about the impact on journalists in your area.

With thanks to Citizen Lab for valuable insight.

Exit mobile version