New iPhone security patch in iOS 14.8: How to scan for Pegasus spyware on your phone
With iOS 14.8, Apple has released a critical update for your iPhone that looks to patch a flaw that the Pegasus spyware exploited.
The spyware can be remotely installed on a target's iPhone or iPad, granting the person or organization who installed it full access to the device and all the data it holds -- without the owner taking any action. That includes text messages, emails and even recording phone calls. Pegasus was originally designed, and is marketed by its creator the NSO Group, to monitor criminals and terrorists.
While's there probably little chance a government entity would install Pegasus on your iPhone to monitor your activities, if you are curious, there's a free tool that allows you to check your iPhone or iPad with a few clicks. To be clear, the odds of your iPhone or iPad being infected by the Pegasus Spyware are low. That said, if you want peace of mind -- just in case -- here's what you need to do, along with installing the iOS update.
Download and install iMazing app on your Mac or PC
iMazing recently updated its desktop app to include Amnesty International's Mobile Verification Toolkit, which was built to detect signs of Pegasus on a device and isn't charging users for access to the feature.
Download iMazing for your computer from the company's website. Don't worry about buying the app: You can run the full spyware test using just the free trial.
Install iMazing and open it. When prompted, select the free trial.
With iMazing installed and running, connect your iPhone or iPad to the computer. You may have to enter the Lock Screen code on your device to approve the connection before proceeding (something to keep in mind if your iPhone or iPad isn't showing up in iMazing).
Next, scroll down through the action options on the right-hand side of iMazing until you locate Detect Spyware; click it.
A new window will open, guiding you through the process. The tool works by creating a local backup of your device (so you'll need to make sure you have enough storage space for the backup), and then analyzing that backup. It's an automated task, so you don't have to stick around to monitor it once you click start.
iMazing suggests leaving all of the default settings in place as you click through each screen. There are configuration options built into the tool for advanced users, but for most of us (including myself), the default configuration settings will get the job done.
After going through the basic configuration, you'll need to accept a license for the tool and then click the Start Analysis button.
Once the process starts, make sure you leave your iPhone or iPad connected until it's finished. I ran the test on my iPhone 12 Pro and it took around 30 minutes to create the backup and another five minutes for it to be analyzed. After the backup was created, I did have to enter my account password to allow iMazing to begin analyzing the file. Because of that, I recommend starting the tool and checking on it after a while.
Once iMazing begins analyzing your device's backup, it'll show you its progress by displaying each individual app it's checking, starting with iMessage. The app is using a database of known "malicious email addresses, links, process names and file names"
When iMazing finishes, you'll see an alert with the results. In my case, my iPhone 12 Pro showed no signs of infection and had 0 warnings.
The alert also includes two buttons to open or reveal the report. I looked through my report, and it contained a bunch of random links that meant nothing to me.
First of all, don't panic. It could be a false positive. If this happens, iMazing asks that you send the report (click Reveal Report to go directly to the file) to its customer support team for further analysis. The company does suggest, however, that if you or a family member are active in a "politically sensitive context" and have a positive report to immediately remove your SIM card and turn off your iPhone or iPad.
If your phone is not infected, you still want to install the latest update on your iPhone, iPad, Apple Watch and Mac, which addresses the vulnerability.