> series: anatomy_of_a_breach —— part: 125 —— weapon: pegasus_spyware —— delivery: zero-click_missed_call —— targets: journalists_lawyers_dissidents<span class="cursor-blink">_</span>_
In May 2019, WhatsApp disclosed that attackers had exploited CVE-2019-3568, a buffer overflow vulnerability in its VoIP (Voice over Internet Protocol) calling stack, to deliver NSO Group's Pegasus spyware to targeted phones. The exploit required zero interaction from the target — the attacker placed a WhatsApp call, and the spyware was installed whether or not the call was answered. The missed call was then deleted from the call log. The target had no indication that their phone had been compromised.
Pegasus, developed by Israeli surveillance firm NSO Group, is one of the most sophisticated commercial spyware platforms ever created. Once installed, it can access all data on the phone — messages (including encrypted ones), emails, photos, contacts, location data, calendar entries — and can activate the microphone and camera for real-time surveillance. WhatsApp identified approximately 1,400 targeted users across 20 countries, including journalists, human rights lawyers, political dissidents, and diplomats. WhatsApp's parent company Meta sued NSO Group, and the case established important legal precedents about the liability of surveillance technology vendors.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe WhatsApp/Pegasus attack represented a paradigm shift in mobile exploitation. Previous mobile compromises — including those documented in the iCloud photo leak (2014) and the CIA's Vault 7 tools (2017) — required some form of user interaction: clicking a link, opening an attachment, or entering credentials on a phishing page. The WhatsApp exploit required nothing — a missed call that the target never needed to see was sufficient to install full surveillance capability.
The WhatsApp/Pegasus attack challenged fundamental assumptions about mobile security. If a zero-click exploit can install full surveillance capability through a missed WhatsApp call — on any iPhone or Android device, regardless of what other security measures are in place — then the question is not whether phones can be secured but what level of protection is achievable against state-grade adversaries.
For most UK organisations, nation-state surveillance via Pegasus is not a likely threat. But the techniques and vulnerability classes that Pegasus exploits — buffer overflows in communications software — apply broadly. Cyber Essentials mandates prompt patching of all internet-facing software including mobile apps. Our mobile application testing assesses mobile security posture. SOC in a Box monitors for indicators of mobile compromise. And UK Cyber Defence provides threat intelligence on surveillance tool capabilities targeting specific sectors.
<a href="/cyber-essentials">Cyber Essentials</a> mandates mobile patching. Our <a href="/penetration-testing/mobile-application">mobile testing</a> assesses device security. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for compromise indicators.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call