speakerNEW!iShredder™ Business for iOS and Android are now available for Enterprise users.Learn more

What is Pegasus? Who created the Pegasus spyware? How can Protectstar protect me?

Pegasus is not just any spyware—it is considered one of the most advanced and dangerous surveillance tools for mobile devices in the world. Developed by the Israeli NSO Group, Pegasus was originally intended to help fight terrorism and organized crime. However, various reports and revelations suggest that Pegasus has likely spied on far more than just criminals and terrorists. Below, you will learn what Pegasus is, how it spreads, and above all, how you can protect yourself with our Protectstar apps for Android devices.

1. What is Pegasus, and who is behind it?

  • Developer: Pegasus was developed by the Israeli company NSO Group. Officially, the software is sold only to certain governments to fight terror and crime. Some countries, such as China and Russia, are reportedly on a blocked list.
  • Area of use: Whether Pegasus is used exclusively for legitimate purposes is controversial. For example, NSO Group reportedly also delivered to Saudi Arabia, which sparked controversy.
  • Scope of support: NSO says it only grants a license and provides technical support—but critics doubt that the NSO Group can fully distance itself if the software is misused.
     

2. What makes Pegasus so dangerous?

Modular spyware for iOS and Android
An iOS version was discovered as early as 2016, followed shortly afterward by an Android version. Pegasus is considered highly advanced surveillance software that can extract extensive data from a smartphone.

Infection methods

  • Often via a manipulated SMS containing a link (“phishing link”). If the link is tapped, Pegasus installs itself in the background.
  • In addition, Pegasus uses so-called zero-day vulnerabilities to compromise iOS or Android. These are security gaps that are still unknown to the manufacturer and for which no patch yet exists.

Functions and capabilities

  • Access to SMS and emails
  • Listening to phone calls
  • Recording screenshots
  • Keylogging (capturing keystrokes)
  • Access to contacts and browser history

Typical targets
Because Pegasus is extremely expensive to develop and deploy (presumably several million US dollars for development and zero-day exploits), it is usually used only against “persons of special interest,” such as journalists, activists, or political opponents. Even so, there is still a fundamental risk for the “average user” if governments or other actors choose to target them.
 

3. Zero-day vulnerabilities and trading on the dark web

  • Zero-day vulnerabilities: Security gaps that are still unknown to device manufacturers (Apple, Google, etc.). Attackers can exploit these gaps before a patch exists.
  • Dark web market: Both spyware and zero-day exploits are traded by various groups. The price of Android security vulnerabilities can run into the millions—back in 2019, up to 2.5 million US dollars was reportedly being offered for all still-open Android vulnerabilities combined.
  • iOS vs. Android cost comparison: Interestingly, Android vulnerabilities were in some cases even more expensive than iOS vulnerabilities in 2019—an indication that attacks on Android devices are becoming increasingly worthwhile and in demand.
     

4. How can I recognize Pegasus, and how can I protect myself?

Indicators of an infection

  • Unexplained battery drain
  • Noticeable system crashes or unusual sounds during calls
  • Sudden background data connections even when the device is supposedly idle
  • Suspicious SMS messages, emails, or links

Updates and caution

  • Keep the operating system & apps up to date: Every patch can close potential backdoors.
  • Do not click suspicious links: Especially avoid phishing SMS messages or emails.
  • Use only trusted sources for app downloads (Play Store, manufacturer websites).

Protectstar protection solutions

  • Anti Spy: Our specialized app that specifically searches for spyware, stalkerware, and similar threats and issues warnings if Pegasus-like activity appears.
  • Antivirus AI: Uses artificial intelligence to detect known and still unknown malware, viruses, and trojans—including Pegasus variants—using continuously updated threat intelligence and heuristic analysis.
  • Firewall AI: Monitors your data traffic in real time and blocks suspicious connections. Even if Pegasus tries to communicate with command-and-control servers, our firewall app can detect and stop this.

Practical example: In 2017, Pegasus could, for example, eavesdrop on calls or read SMS messages. An app such as Protectstar Anti Spy scans the device for suspicious system components and can thus detect a possible infection. Protectstar Firewall AI, in turn, would report suspicious data traffic before malicious software can send sensitive data.
 

5. Why Pegasus usually affects only “high-value targets”

Because using Pegasus is extremely expensive and complex, it is typically used against people whose surveillance appears “worthwhile”—such as politicians, journalists, or government critics. Even so, zero-day vulnerabilities are a general risk for all Android and iOS users because they can also be abused by other malware at any time.
 

6. Additional information and sources

7. Conclusion: How Protectstar protects you from Pegasus and similar spyware

Pegasus shows impressively how far modern surveillance technologies can go and how much zero-day vulnerabilities can endanger our daily lives. With Protectstar apps for Android—especially Anti Spy, Antivirus AI, and Firewall AI—you can protect your device as effectively as possible against unwanted surveillance and data theft.

That keeps you one step ahead—even when zero-day vulnerabilities are in circulation. Keep your system up to date, regularly review suspicious links, and use our security solutions to protect yourself comprehensively. Even though Pegasus primarily targets “high-profile targets,” alertness is the best protection for every smartphone user. Together with Protectstar, you can make your Android device more secure and detect and fend off potential spyware attacks at an early stage.

Was this article helpful? Yes No
417 out of 423 people found this article helpful