Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Threat Actor Promises Pegasus Spyware Protection, Serves Trojan Instead

A threat group is distributing the little-known Sarwent Trojan via a fake website that impersonates Amnesty International and claims to deliver protection against the Pegasus mobile malware.

A threat group is distributing the little-known Sarwent Trojan via a fake website that impersonates Amnesty International and claims to deliver protection against the Pegasus mobile malware.

According to security researchers at Cisco Talos, the attack targets individuals who believe they might have been targeted by the NSO Group’s Pegasus spyware and might be associated with nation-state activity, but Talos has yet to identify links to a specific threat actor.

Initially detailed in 2016, Pegasus is a controversial surveillance software tool that, despite claims of legitimate use, has been reportedly used by oppressive regimes in campaigns targeting journalists, human rights activists, and other individuals opposing the regime.

Following a detailed Amnesty International report on Pegasus released in July this year, and Apple issuing patches for the ForcedEntry zero-day exploit, many people started searching for protection against the spyware, and adversaries decided to take advantage of that.

[ READ: Apple Confirms New Zero-Day Attacks on Older iPhones ]

A fake website designed to look similar to that of Amnesty International, the threat actor claims to be offering “Amnesty Anti Pegasus,” an anti-virus tool that can supposedly protect against NSO Group’s spyware.

Instead, however, users are served the Sarwent remote access tool (RAT), which allows attackers to easily upload and execute payloads on the compromised machines, as well as to exfiltrate any data deemed to be of interest.

Although low volume, the campaign has snagged victims worldwide, including in the United States, the United Kingdom, Colombia, Czech Republic, India, Romania, Russia, and Ukraine, according to the Cisco Talos report.

Advertisement. Scroll to continue reading.

The adversary behind the campaign appears to be a Russian speaker that has been using Sarwent since at least January 2021, targeting all types of individuals globally. The threat actor likely used the Trojan or one with a similar backend since 2014, the security researchers say.  

“Given the available data, we remain uncertain about the intentions of the actor. The use of Amnesty International’s name, an organization whose work often puts it at odds with governments around the world, as well as the Pegasus brand, a malware that has been used to target dissidents and journalists on behalf of governments, certainly raises concerns about who exactly is being targeted and why,” Cisco Talos said.

Related: Apple Confirms New Zero-Day Attacks on Older iPhones

Related: Germany Admits Police Used Controversial Pegasus Spyware

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...