Pegasus Spyware: so dangerous that it should be banned? OTW explains...
Pegasus is used around the world to hack people's phones. It's extremely dangerous and can be used to control a phone remotely without the user knowing that is running.
Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: brilliant.org/DavidBombal
// Mr Robot Playlist //
• Mr Robot
// David's SOCIAL //
Discord: / discord
Twitter: / davidbombal
Instagram: / davidbombal
LinkedIn: / davidbombal
Facebook: / davidbombal.co
TikTok: / davidbombal
KZhead: / davidbombal
// Occupy The Web social //
Twitter: / three_cube
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: davidbombal.wiki/otw
// Occupy The Web books //
Linux Basics for Hackers: amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh
Top Hacking Books you need to read: • Top Hacking Books for ...
// Other books //
The Linux Command Line: amzn.to/3ihGP3j
How Linux Works: amzn.to/3qeCHoY
The Car Hacker’s Handbook by Craig Smith: amzn.to/3pBESSM
Hacking Connected Cars by Alissa Knight: amzn.to/3dDUZN8
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Intro
00:22 - Brilliant Ad
01:59 - OTW Books
03:54 - Pegasus overview
06:54 - Pegasus info
07:40 - Pegasus in use
08:56 - Human rights
09:25 - 0 Day malware
13:33 - Original Pegasus 1 click exploit
14:30 - How it works
16:52 - Remote access
17:48 - Malware links
19:30 - Femtocell
21:01 - Stingray
22:10 - How they work
23:50 - Pegasus 0 click exploit
24:55 - Pegasus malware
25:29 - Human rights
26:51 - ISO/Android vs malware
27:40 - Governments
29:19 - What can we do?
30:35 - Be responsible
32:01 - Governments and malware
32:51 - NSO
35:14 - Privacy
36:03 - Command and control
37:36 - Processes
38:38 - NSO developers
38:53 - Expectations
40:30 - Social engineering
43:04 Eternal blue
44:25 Chrysaor
45:23 Outro thoughts
pegasus
spyware
hacking
hacker
malware
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#pegasus #iphone #andorid
Pegasus is used around the world to hack people's phones. It's extremely dangerous and can be used to control a phone remotely without the user knowing that is running. Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: brilliant.org/DavidBombal // Mr Robot Playlist // kzhead.info/channel/PLhfrWIlLOoKNYR8uvEXSAzDfKGAPIDB8q.html // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal KZhead: kzhead.info // Occupy The Web social // Twitter: twitter.com/three_cube // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: davidbombal.wiki/otw // Occupy The Web books // Linux Basics for Hackers: amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh Top Hacking Books you need to read: kzhead.info/sun/p9aJesV7fnSYfo0/bejne.html // Other books // The Linux Command Line: amzn.to/3ihGP3j How Linux Works: amzn.to/3qeCHoY The Car Hacker’s Handbook by Craig Smith: amzn.to/3pBESSM Hacking Connected Cars by Alissa Knight: amzn.to/3dDUZN8 // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Intro 00:22 - Brilliant Add 01:59 - OTW Books 03:54 - Pegasus overview 06:54 - Pegasus info 07:40 - Pegasus in use 08:56 - Human rights 09:25 - 0 Day malware 13:33 - Original Pegasus 1 click exploit 14:30 - How it works 16:52 - Remote access 17:48 - Malware links 19:30 - Femtocell 21:01 - Stingray 22:10 - How they work 23:50 - Pegasus 0 click exploit 24:55 - Pegasus malware 25:29 - Human rights 26:51 - ISO/Android vs malware 27:40 - Governments 29:19 - What can we do? 30:35 - Be responsible 32:01 - Governments and malware 32:51 - NSO 35:14 - Privacy 36:03 - Command and control 37:36 - Processes 38:38 - NSO developers 38:53 - Expectations 40:30 - Social engineering 43:04 Eternal blue 44:25 Chrysaor 45:23 Outro thoughts pegasus spyware hacking hacker malware Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
It's extremely dangerous but the pegasus issue is largely a media red herring to avoid discussion of 5 eyes (14 eyes) epic global spying. Why western media don't like Pegasus is someone is cutting into their spying grass. Either end spying globally, including downscaling organizations like NSA, GHCQ, and Chinese, Russian and other large counterparts or a natural consequence is other countries will spy on the countries that lament about spying then hypocritically spy. Perhaps Pegasus democratization of spying will be a wake up call for the governments of 14 eyes nations. If foreign governments are tapping their own phones, like they have been doing ot others for decades, then maybe they will see why mass computer surveillance they'be been doing of foreign states is morally wrong. Mind you that's wishful thinking. What's more likely to happen is virtue signalling hypocrisy.
How do you even find out if your phone is infected by pegasus?
yep good old pegasus among I think there was one other big one. good ol' Mossad :)
Funny.. see how easy it is to deactivate all google apps and try to go deep in your android with developer settings enabled. Try to disable google.android.gms.persistence So who is spying on you? Who does most governments work closely with?... But why be scared about someone spying on you if you not harming anyone?
What about Palantir? The number one spy tool that the Government's are using today. This feels like a honeypot 😂
When a government commissions anything for use, their justification is always "it will be used against our enemies" but invariably it will always be turned inwards against it's own people.
When these two get together, it ALWAYS seems to end too soon....just can't get enough. Thanks guys!
Privacy is one of the most fundamental human rights
❤Yes!
(US "Patriot Act" rolling on it like a tank)
privacy is a facade
And yet blanket geo location warrents are done almost every day with out legal ramifications, from the gov.... its by the gov....on the USA...by the USA orders..... 🍿🍿🍿🍿🍿🍿🍿🍿
@@sefzxm6486definitely seems that way
As a Retired combat Marine I want to tell you that as what you are doing is just as important as any warrior on the battlefield. You are waging warfare against cheater on the digital battlefield. You are defending and protecting the most vulnerable of our society against these predators and cheaters. Keep up the good work Team *Topphase Resolution* ..
The problem is not Pegasus, it is phone makers that don’t let you install a proper firewall and a proper app locker.
it can also be a problem with pegasus. Anyone can use it if you have the money (a lot of money as its license is around 600k for the base version).
Yes But you can control your phone with a rooted device and learn about android system
Pegasus attacks the hardware
I believe someone once said "you control the endpoint, you control the network?"
@@RANSOMEART yeah like elliot from mr robot or something, maybe Otw
Thinking that the government or corporations care, and are not one and the same, is foolish. There is no privacy period. Thanks for both of your work.
Thank you, both of you for addressing this issue and educating us
You're welcome! OTW has an amazing wealth of knowledge and it's great to have him share it with all of us! 😀
@@davidbombalalways looking forward for your videos 🙏🏻
We need to stop treating phones as secure devices. The mindset has to change. I don't keep any sensitive data on my phone, my cameras have tapes on them etc.
What is a "secure device"? I was taught security is merely a state of mind.
Many thanks to you two David & OTW, your collaboration is always top-notch.👌 Keep up the good work. 🙏🙏
Thanks for the upload! I know most of the stuff discussed, but it was interesting to be able to confirm my understanding was correct. I hope such videos get more attention and people stop clicking on links outside a sandbox, at the very least!
I think bringing awareness to things like this is the first step to implementing policies to help protect privacy rights for people
Dear David and OTW, you guys together are amazing! Hope this collaboration will continue for a long time, because I’m looking forward to any new video you guys work on! Great job!
It’s always a good time with David and OccupyTheWeb!
You and Occupy the web are a great combo for sure. Well done
Dear Mr. Bomball and Mr. OccupyTheWeb, Thank you for educating us on these issues. I would like to kindly please you to teach us how we can technically detect such spywares on our phones? What lessons or tutorials should we learn in order to find out whether our phones are being spied? Please help us learning that great area of cyber security.
thats a great question i would also like the answer to
Yes!!!
Both your content and OTW content are addictive-especially helpful to gain value when you’re hooked, though 🙌🏽
Getting a search warrant to surveil a subject should not include the use of a Stingray! All the phones in the area will connect to it. LEOs don't have a search warrant for everyone in the transceiver area!
@@Andrew-zy7jz Local LEOs can’t get one.
They have stuff way better than stingrays now. They also have CelleBrite. If they get your phone for even a second, they plug it in, and that’s all she wrote.
That was an awesome interview Dave. My best wishes to Neal, stay positive, fast 2 days at least a week exercise a lot , green diet , less sugar and red meat, a lot of water . Win your life back don’t give up and you will a champion in Golf as you are In Cybersecurity. All the best.
Thanks David Bombal, just one quick request. Next time you interview OTW, can you ask about the release date of 'cyberwarrior handbook'?, because I already have read all his other books.
This is real content!!! Thanks David and OTW sharing all your knowledge.
Thanks a lot David, awesome content as usual. I would love to see you interviewing Ryan Montgomery!
Hopefully soon 😀
That would be great a technical demostration of Eternal blue ! we will wait for the session David,
there should be a rule that all email client applications are required to run in a sandbox regardless of how thoroughly annoying this is.
Hi.Thanks for very in-depth video. If I have installed a distro such as arch linux on your phone, then access still be gained to your phone?
I had it, or something similar, used on my phone back in 2019. My ex's baby daddy was involved in the Cartel in Cbus, Ohio. About 8 months before he got busted, I noticed my phone, my hirls phone, and her sons phone was acting strangly and possibly hacked. I informed her ex of this while dropping her son off one day. Then, all of the sudden. I had several cars following me and my phone was torally acting weird! I was being followed by some group. I think it was the FBI because they busted the Columbus Police Cartel Unit for being crooked about 8 months after her ex was arrested by the Cartel Unit 😮 So, im a believer and i know what they did to me was illegal because i wasnt involved in anything criminal. This needs to stop because it was incredibly frightening!! Good Show guys!
I am so happy to have found your channel. #1 favorite content! Thanks so much!
Thank you so much! 😀
Thank you !!😊 It helped me learn about the danger lurking around me.
Top content David....Love the videos you collaborate with OTW.
Fantastically informative, thank you for the awesome content.
Back in the DOS days, PC Tools, did a program byte count of the code in a software product. If the scanner found a different number of code bytes, say less or more, than the original known ( size ) of the code including key, count, it would send up the red flag. Think about thar for a second. One way to detect key loggers is get your hard drive used information motion, type 100 words on notepad, the delete it, re read hard drive bytes used,if it's the same count after you erased it, that's good, but if now you drive says it's more than the count you first logged, say about the amount you typed in, I would suspect a keylogger installed. Keep a watchful eye on disk storage usage. It's a pain, but.
Hey David first im learning from you and your videos for years and I'm fascinating by social engineer you have any recommendation on specific place that i can learn more about this skill and upgrade my self bit more?
Thank you, David, for another brilliant video! I always feel just a little bit smarter, much more hungry and inspired to learn more. OTW's classes are top notch! You are the best! Cheers!!
What an enthralling captivating discussion! Thank you David! I look forward to hearing more! 👍👏
What's crazy is there are probably 10 or more that we don't know about. Great video David.
That is a worry 😢
@@davidbombal Agreed, one of the reasons I don't use anything made by Apple. Their code is dog s**t. 100% believe it's harder to pwn an android these days.
@@camelotenglishtuition6394 OTW disagrees with you. And I think many other people do too and say that Android is more vulnerable.
@David Bombal I understand, but I disagree with OTW over several things. I would ask specifically what you think makes ios stronger when it has so many issues. Specifically with webkit, unused features in code, poor code review, and also very slow patch times.
Technical details aside, it's easier to make mistakes on an android because your phone allows you to. A lot of iOS security is designed around blocking you from compromising your device. Android doesn't tend to care beyond asking "Are you sure?"
would it be possible to investigate malware and resend it to the originator by working on the device in a faraday cage and send it when you remove the device from the cage?
Another great video David. OTW is correct you do have the best YT channel for cyber
thank you for bringing back OTW
Welcome back Master OTW Thnkz both of u ...
Mann your community, the majority of IT community, David B, OTW, and etc all dropping diamond and gems!! Letting us know how to win!! We need more people like y’all mann!! God bless y’all!! We appreciate you David and OTW!!!
Legendary thanks David. From south Australia at work chatting about u Chanel interesting hey many people watching u Chanel
John McAfee once said, "Computer Security is an Oxymoron."
It's alarming to think about the misuse of tools like Pegasus spyware, especially when it comes to infringing on individual privacy and human rights. I'd say "unbelievable", but sadly... Its not.
It was created for misuse
Misuse?
Always love to listen to otw and David!!
As always thank you both so much for the content!! Amazing as always! Happy Father's day yall and all other fathers out there!
Same to you! Thank you!
Looking forward to Occupy the web talking On the AIGC era we are living in & how it impacts different Cybersecurity Fields
Lol,Love how he's right,He said there's really no way to scan for any of these because when hackers catch wind that you're on to them they jump ship.
hay could you do a practical example of how to set up a subnet. I looked up a few tutorials but they all only explain the theory and how tlit works with IP but no practical examples of how to set it up on routers
we all love our great teacher, doing a great job and educating about digital era and talking about privacy that is core thing for human society .
I was staying at a hotel one time and overnight the first night, I got an alert that my phone had used 50GB of mobile data. If I recall correctly, I had tried to join a wireless network at the airport that was not successful. Always wondered what the heck it was that happened. I figure either my phone was hacked and they got all my pics including nudes lol. Or the only other possibility is that I fell asleep as I was browsing a web page that had some videos and things playing, and maybe that stupid website was downloading crap ads and videos all night.
One of the best OTW videos. Thanks.
Always assume your devices are already compromised.
the sms is a usual attempt, you should update this story as nso has a new 0 click by physically calling the phone with just music . the owner answers the call to hear music while they hack the phone
Thats interesting. Do you have further information for this kind of attack?
Thanks for the video. I have known about this technology for a while and even had a tech demonstrate it on one of our instructors phone. Question...if you ditch that smartphone and get a different handset is Pegasus transfered to the new one. Or would that agency have to target the new handset and infect it? Thankyou!!
I remember many many years ago, I had to learn how to hack/crack so that I could properly protect clients, I did PEN testing for companies often.
When I got a device that monitors my data usage (up and down) in the upper right hand corner, bc it is integrated in my custom Rom and I'm not doing anything, then "sb listening to my mic or taking pictures/a video of me" (I got stickers), will result in data usage, which I will notice eventually.
thx David for such a good material and thank for the OccupyTheWeb sharing such a good info
Thank you for the guest. Amazing video.
Regards Pegasus if its sending messages back to servers would this traffic not end up detected by BOT activity security? I wounder if Zscaler et al could detect this malicious communication from the device to identify it as compromised?
Why isn't it stopped by firewalls or detected by router software?
What we need are some huge Class-Action lawsuits against Apple and Google to give them an incentive to make more secure phones.... They will not respond to public pressure, they will only respond to financial pressure.
Google makes some of the most secure phones available given the right care. Its all about hardware.
so what you want them to do? they patch as soon as it is found. They can't test every vulnerability in house.
And Samsung
my mind is never invurniable to the knowledge you guys have...
Eye opener content .keep rocking ....
In passing I'd really like you to touch up on LOIC(Low Orbit Iron Cannon) and the evolution of DOS/DDOSes.
I was really curious and just thought about it today about how is that even legal use 0 days or 0 clicks vuln's against targets because it basically sell black hat service as a legit company.. so i was really confused by that.. (I'm Israeli myself and it was really interesting to understand those things)
These types of laundry rooms are standard if you rent your flat. If you own your flat you usually have the washy things inside your flat.
Thank you for the video. I am new in hacking and interested in learning. How can i become a student of the facilitator/join his class?? Thanks
Great episode! Thx
You guys together are best ❤❤❤, amazing video ❤❤❤
100%, one of the best traits one can have working in a technician role is to have the ability to explain seemingly complex concepts in simple terms that executives can understand. * know your audience.
I think the better option is basic devices which do a couple of things you need securely.
I had a iphone 12 around the time this video came out and i got on my phone and it was in the files and the only file that was there was Pegasus, i tried to factory reset but my phones screen flashed and i was at the startup screen that said my phone was locked due to the passcode being changed...
Thank you so much for the great content and this was one of the best
Thank you! Glad you enjoyed it!
Is Pegasus II covered in this? Video is in my queue to watch at some point.
Everytime you release one of these videos w/ OTW, I get the urge to change my career into cyber security. Thank you for continuing these conversations.
Same lol😂😂😂
Always a treat. Thank you so much
Thank you Derrick!
Wow , really interesting topic!!! Thank you
And malware too😂😂😂
New to the channel. The convos have been very insightful. Much thanksnto your guests for coming on and sharing their knowledge and experiences in the cyber world. I was wondering, have you every talked with the author of "This Is How They Tell Me The World End", NICOLE PERLROTH. I just finished her book. Her breakdown of the cat and mouse for the cyber exploit market is jaw dropping. There were somethings I was aware but she connected the names and marked the timeline for how the market started and has developed over the year. Would be a interesting guess even though she not a actual hacker.
I'd love to see a video on hacking and AI and how crazy things might or could get in the future while we still have the training wheels on for AI? The last part of the video really made me think hmmmm AI hacking big problem?!
there are some tools that can find the pegasus inside of mobiles , ( verification mobil tool ) mvt
22:07 or you turn off mobile data while at home to prevent your device from connecting to the strongest signal.
Hello @David Network Basics for Hackers is not yet available in India yet😢
That's a pity 😢 I purchased mine from Amazon in the UK, but didn't know it wasn't available in India.
Great video many many thanks @David
You're very welcome!
Thanks David your teach us new things for everytime
So how do de detect Pegasus? And how do we protect ourselves from it / remove it?
Guys great show, more info then I can wrap my head around. Will be listening more.
Loving these occupy the web videos David!!!!!
I agree with OTW, David Bombal is probably the best KZhead channel I have come across when it comes to updated information about security, when it comes to other stuff, in my opinion, I prefer John Hammond as my 2nd source for education, and Null Byte as my 3rd
One of those pegasus devs now sells secure phones with Eric Prince (blackwater fame, interview is on the Shawn Ryan show)
Keep it going David !👍
“A JIF image….” And I loved you OTW. How could you do this to us?
Maybe also do a deep-dive on what Malware is out there for Android. I'd be interested in that. Also what to do to protect against that type of malware.
yes my exact thoughts!
not until its been out for atleast 6yrs and nobody uses it anymore because its old news.
Sadly if you are a target of one of these attacks of the new version of Pegasus not much you can do in today day inn age
Hey Bombal ! Can u help us regarding part time job while preparing CCNA exam 🙏🙏🙏Please make video on this . This would be great helpful. I know you r too busy but have a little glance on this issue
5 eyes just skipped the game by mandating access via 'end and end' parallel scanning via the divice and device manufacturers, under the guise of the 'online safety bill'.
How effective is Pegasus malware on linux phones,I know they are not many linux phones but will have the same effect like on apple and android phones?
Another sleek way thats kind of a no-click , that people can use is Stenography , it's basically a way of embedding malware into certain types of files but mostly Photos like png . Img . ect and it makes it at least less suspicious and more susceptible to being clicked on , but it's also more likely to be blocked or detected by antivirus software , but it's definitely effective if you can send it to someone as a photo of something and essentially opening up the different places you could send it , like through a text message or even in a social networking app or chat
It's worth mentioning that privacy and open source groups actively reject AVs. It may turn out being effective against them :(.
you're talking about "steGAnography". Stenography is a way of fast typing
@@adrianalexandrov7730 thanks , yeah the auto correct fucked me up
But those don't actually execute easily. You have to run software to extract the executable from the image file. Unless there is a vulnerability in a piece of software that leads to the execution of that, it doesn't help at all
@@therealb888lmfao li
My iphone has been having these issues. I deleted the email associated with that account and it locked my iphone. This should completely disable messaging but it turns on by itself when I turn I off. Also my voicemail box was set up Andi purposely didn't activate it. I need help but I don't know what to do as the police want proof... But proof they understand apparently. Any advice would be so grateful
A security vulnerability deliberately implemented by the system and software developers couldn't be called "0-Day", could it? Is there another term for it? Regionally distributed smartphones manufactured and OSes developed by Chinese companies may pass security screening now, but could they be conditionally compromised?
love the book why has it taken so long to share this type of info l would have done this decades ago keep up the good work
We are always talking about that user need to click something, this shows that it's not always the case.
This couldnt have been timed before! Pegasus was my blindspot.
I think, pagasus can't be used on non-android button phones. Keep multiple phones with different sim cards.