Pegasus Spyware Signs Can Be Detected on Your Phone Using This Dedicated Tool

Mobile Verification Toolkit (MVT) tool is aimed to help you find forensic traces to understand whether the Pegasus spyware has targeted your phone.

Advertisement
By Jagmeet Singh | Updated: 20 July 2021 15:16 IST
Highlights
  • NSO Group’s Pegasus spyware signs can be detected using a tool
  • Amnesty researchers found more forensic traces on iPhone over Android
  • You need basic command line knowledge to use MVT for your phone

Pegasus spyware targeted thousands of activists, journalists, and politicians

Photo Credit: Pexels/ cottonbro

Pegasus spyware from Israel-based NSO Group was found to have allegedly helped governments in countries, including India, to hack into the phones of thousands of activists, journalists, and politicians. An international consortium of news outlets revealed some details of the targets in the last couple of days. However, the scope of targeted attacks through Pegasus is yet to be defined. Meanwhile, researchers at Amnesty International have developed a tool to let you see whether your phone is targeted by the spyware.

Called Mobile Verification Toolkit (MVT), the tool is aimed to help you identify if the Pegasus spyware has targeted your phone. It works with both Android and iOS devices, though the researchers noted that it is easier to find the signs of compromise on iPhone handsets over an Android device due to more forensic traces available on the Apple hardware.

Advertisement

“In Amnesty International's experience there are significantly more forensic traces accessible to investigators on Apple iOS devices than on stock Android devices, therefore our methodology is focused on the former,” the non-governmental organisation said in its research.

Users need to generate a backup of their data to let MVT decrypt locally stored files on their phone to look for Pegasus indicators. However, in case of a jailbreak iPhone, a full filesystem dump can also be used for the analysis.

Advertisement

In its current stage, MVT requires some command line knowledge. It may, however, receive a graphical user interface (GUI) over time. The tool's code is also open source and is available along with its detailed documentation through GitHub.

Once a backup is created, MVT uses known indicators such as domain names and binaries to look for traces related to NSO's Pegasus. The tool is also capable of decrypting iOS backups if they are encrypted. Further, it extracts installed apps and diagnostic information from Android devices to analyse data for any potential compromise.

Advertisement

MVT requires at least Python 3.6 to run on a system. If you are on a Mac machine, it also needs to have Xcode and Homebrew installed. You also need to install dependencies if you want to look for forensic traces on an Android device.

After you are done with the installation of MVT on your system, you need to feed in Amnesty's indicators of compromise (IOCs) that are available on GitHub.

Advertisement

As reported by TechCrunch, there might be an instance in which the tool may find a possible compromise that might be a false positive and needs to be removed from the available IOCs. You can, however, read the organisation's forensic methodology report to check out the known indicators and look for them in your backup.

In collaboration with Amnesty International, Paris-based journalism nonprofit Forbidden Stories shared a list of more than 50,000 phone numbers with the news outlet consortium Pegasus Project. Of the total numbers, journalists were able to find more than a thousand individuals in 50 countries who were allegedly targeted by the Pegasus spyware.

The list of targets included journalists working for organisations including The Associated Press, Reuters, CNN, The Wall Street Journal, and India's The Wire, among others. Some political figures including Rahul Gandhi of the Indian National Congress and political strategist Prashant Kishore were also recently claimed to be a part of the targets.


What is the best phone to buy right now? We discussed this on Orbital, the Gadgets 360 podcast. Orbital is available on Apple Podcasts, Google Podcasts, Spotify, Amazon Music and wherever you get your podcasts.
Affiliate links may be automatically generated - see our ethics statement for details.
 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. These OnePlus and Nothing Phones Could Get Expensive in India Soon
  2. Samsung India's Mobile Division Head Calls It Quits After Over Four Years
  1. Amazon Prime Day 2026 India Sale Set for July: Here’s What to Expect
  2. Bakkt Acquires DTR to Build Stablecoin Settlement Layer
  3. Samsung India Mobile Chief Raju Antony Pullan Steps Down; Aditya Babbar to Reportedly Lead MX Operations
  4. Oppo Reno 16, Reno 16 Pro Set to Launch Later This Month; Pre-Reservations Begin
  5. Samsung Galaxy S26 Ultra Successor Might Skip the 3x Telephoto Rear Camera, Early Leak Suggests
  6. Drift Exploit Claims Its First Victim as DeFi Protocol Carrot Shuts Down
  7. Realme 16T Geekbench Listing Suggests Possible Performance Downgrade Over Realme 15T
  8. Microsoft Rolls Out Xbox Mode on Windows 11 PCs in Select Markets
  9. OnePlus, Nothing and More Smartphone Makers Reportedly Raise Prices of Their Mid-Range, Flagship Handsets as RAM Shortage Rages On
  10. Xiaomi Civi 6, Civi 6 Pro Leak Hints at Dimensity Chips and 50-Megapixel Periscope Camera
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.