![]() |
Media: How to protect your phone from spywareThe Committee to Protect Journalists (CPJ) has issued a global safety advisory for journalists regarding the use of Pegasus spyware to target the media. The spyware gives the attacker the ability to monitor, record, and collect existing and future data from mobile phones. ![]() Image source: Gallo/Getty. Pegasus is a spyware created for mobile devices which transforms a cellphone into a mobile surveillance station. Researchers have documented it being used to spy on journalists. This raises significant implications for journalists’ own security and that of their sources. In 2018, Citizen Lab said it had detected Pegasus in over 45 countries. Pegasus could have been deployed against journalists and civil society actors in Mexico, Saudi Arabia, Bahrain, Morocco, Togo, Israel, the U.S., and the United Arab Emirates, the report found. In May 2019, a vulnerability was identified in the messaging app WhatsApp that, before it was patched, infected some of its users’ phones with spyware, including over 100 human rights defenders and journalists in at least 20 countries, according to Citizen Lab. WhatsApp, which is owned by Facebook, later identified that spyware as Pegasus or a variant produced by the Israel-based NSO Group, which markets tools for investigating crime and terrorism to government agencies. (NSO Group has repeatedly told CPJ that it will not comment on individual cases, but investigates reports that its products were misused in breach of contract.) The spyware gives the attacker the ability to monitor, record, and collect existing and future data from the phone. This includes calls and information from messaging applications and real-time location data. The spyware is able to remotely activate the camera and microphone to surveil the target and their surroundings. Pegasus is designed to be installed on phones running Android, BlackBerry OS, and iOS without alerting the target to its presence. Journalists will likely only know if their phone has been infected if the device is inspected by a tech expert. If you have reason to believe you have been targeted and have spyware on your device:
Pegasus can be installed in a number of ways. Journalists should keep up to date on these methods and take appropriate steps to protect themselves and their sources. Zero-day attacksZero-day attacks exploit vulnerable software, not people. They require no interaction from the user. Reports from the WhatsApp hack stated that the attack took the form of calls from unknown numbers to users which resulted in the app crashing. The numbers disappeared from the call log, leaving no record of a missed call or who had made it. Protecting yourself against a zero-day attack is difficult. Journalists who may be targeted by a sophisticated adversary such as a government should consider changing cheap, burner phones every few months as a precaution. If possible, contact a digital security expert for one-to-one support. Spear-phishing attacksAttackers create tailor-made messages that are sent to a specific journalist. These messages convey a sense of urgency and contain a link or a document which the journalist is encouraged to click on. The messages come in a variety of forms, including SMS, email, through messaging apps such as WhatsApp or via messages on social media platforms. Once the journalist has clicked on the link, then the spyware is installed on their phone. Research by Citizen Lab and Amnesty International found that messages tend to take the following forms:
Attackers can target personal and work phones. To better protect themselves and their sources, journalists should:
Physical installation by an adversaryPegasus can also be installed on your phone if an adversary gains physical access to the device. To reduce risk:
For more information to protect yourself and your sources, consult CPJ’s Digital Safety Kit. *With thanks to Citizen Lab for valuable insight. |