apple patient
  • Home
  • News
  • Rumors
  • Tips & Tricks
  • Reviews
  • Insights
No Result
View All Result
  • Home
  • News
  • Rumors
  • Tips & Tricks
  • Reviews
  • Insights
No Result
View All Result
apple patient
No Result
View All Result

Pegasus and Commercial Spyware on iPhone: What Users Really Need to Know

by Milan
May 11, 2026
in Tips & Tricks
Pegasus iPhone

Image: Shutterstock / Bits And Splits

Pegasus is the best-known, but far from the only commercial spyware that specifically targets iPhones. Behind these programs are private companies that sell surveillance software to state customers. The vast majority of iPhone users will never be affected – but those who are targeted face attacks that cost millions and, in modern variants, work entirely without the victim clicking anything. Below we explain how Pegasus operates, who is really at risk, what Apple's threat notifications mean and which protective measures make sense.

Apple officially refers to this class of attack tools as "mercenary spyware." The term replaces the previously used phrase "state-sponsored attacks" and describes the business model more precisely: private companies develop highly complex surveillance software and sell it to state actors. The best-known example is Pegasus from the Israeli NSO Group, but the market has grown. Coruna and DarkSword have emerged in 2025 and 2026 as additional iOS exploit kits that Apple had to address in several emergency security updates. For those affected, Apple's Lockdown Mode is the most important line of defense – but all other users benefit from understanding the threat landscape as well.

What Pegasus actually is

Pegasus was first documented in 2016, when the security firm Lookout and the Citizen Lab at the University of Toronto discovered the software on the iPhone of a human rights activist from the United Arab Emirates. It is developed by the NSO Group, an Israeli company that sells the spyware exclusively to state customers – officially to combat terrorism and crime.

Pegasus has evolved significantly in technical terms. The version discovered in 2016 was still a one-click attack: Ahmed Mansoor received a text message with a link, and a single tap was enough to trigger the infection. By 2020 at the latest, the shift to zero-click exploits was documented – initially via the Kismet vulnerability, and from February 2021 via the far better-known FORCEDENTRY attack, which bypassed Apple's then-new BlastDoor protection layer in iMessage and was closed in September 2021 with iOS 14.8. In a zero-click attack, the victim has to do nothing – simply receiving a crafted message, a manipulated image or a specific web call is enough to exploit a vulnerability in iOS and install the software unnoticed. Once active, the spyware gains near-complete access to the iPhone: messages, emails, photos, location, microphone, camera and stored passwords can be read out or monitored in real time.

Pegasus is not the only tool of its kind. Predator is distributed by the Intellexa Consortium, an alliance of several companies founded by former Israeli intelligence officer Tal Dilian. The actual development takes place at the consortium's company Cytrox AD in North Macedonia. In addition, Coruna and DarkSword are two further iOS exploit kits in active use, employed among others by groups attributed to Russia as well as by commercial surveillance vendors.

Who is actually targeted

Apple itself makes it clear: the vast majority of iPhone users will never be affected by a mercenary spyware attack. The cost per target runs into several million dollars, operations are often only briefly active and are deliberately directed against individual persons.

Typical targets include:

  • Journalists engaged in critical reporting
  • Human rights activists and dissidents
  • Politicians and diplomats
  • Lawyers handling sensitive cases
  • Researchers in geopolitically relevant fields

Known cases include the surveillance of people close to Saudi journalist Jamal Khashoggi, who was murdered in 2018, targeted attacks on Indian journalists and opposition politicians, and spyware found on the devices of European activists. Since 2021, Apple has notified users in more than 150 countries with threat notifications about such attempted attacks.

How Apple notifies affected users

When Apple detects activity consistent with a mercenary spyware operation, the affected user is notified in two ways. After signing in at account.apple.com, a threat notification appears at the top of the page. In parallel, Apple sends a notification by email to all addresses linked to the Apple Account and an iMessage to the phone numbers on file.

Since April 2025, emails are sent from the address threat-notifications [at] email.apple.com, while iMessage notifications come from threat-notifications [at] apple.com. Earlier emails were also sent from threat-notifications [at] apple.com.

Apple explicitly points out what a genuine threat notification does not contain:

  • No links to click on
  • No prompts to install apps or profiles
  • No requests for the Apple Account password
  • No requests for a verification code

Anyone who receives such a notification can reliably verify its authenticity by signing in directly at account.apple.com. If the warning appears at the top of the page there, it is genuine.

Distinguishing threat notifications from phishing

Since the term "Pegasus" has now become widely known, phishing attackers deliberately use it for fake warnings. Pop-ups with text like "Warning Pegasus Spyware Activated" or fake emails urging users to call a supposed Apple Care hotline are pure scam attempts. Apple never makes unsolicited calls, never requests actions via phone numbers in warning messages and never sends browser pop-ups. The methods for spotting such fakes are described in detail in our separate guide on phishing warning signs.

A second peculiarity: real Pegasus infections are designed to remain undetected. Anyone who sees a message claiming that their iPhone is "infected with Pegasus" can be certain that it is a scam.

What to do after receiving a genuine threat notification

Apple itself recommends contacting specialized support organizations. The Digital Security Helpline of the nonprofit Access Now is available around the clock and supports recipients of Apple threat notifications free of charge with individual security recommendations. Amnesty International and the Citizen Lab at the University of Toronto also offer forensic investigations for at-risk groups.

The order matters: anyone who immediately resets or re-installs the iPhone may destroy forensic traces that would be crucial for investigating the attack. A restart does remove many memory-resident components of the spyware, but it also wipes valuable log files. Unless there is an urgent need, expert help should therefore be consulted first.

In parallel, Lockdown Mode should be activated. Apple has developed it explicitly for this class of threats. It dramatically reduces the attack surface by restricting features such as message attachments, FaceTime calls from unknown contacts and certain web technologies – exactly the vectors through which mercenary spyware typically gets in.

Practical protection for all users

Even those who have not received a threat notification can reduce their own attack surface through consistent security hygiene. Apple recommends the following for all users:

  • Always keep devices on the latest iOS version
  • Set a passcode
  • Use two-factor authentication for the Apple Account
  • Install apps only from the App Store
  • Use secure and unique passwords
  • Do not open links or attachments from unknown senders

Anyone facing an elevated risk for professional reasons – for example as a journalist, a lawyer handling politically sensitive cases or an NGO employee working with authoritarian regimes – should keep Lockdown Mode permanently activated, even without a specific threat notification. The functional restrictions are noticeable in everyday use, but the additional layer of protection is substantial.

Apple versus the spyware industry

Apple filed a lawsuit against the NSO Group in 2021, with the aim of permanently barring the company from using Apple services and devices. In January 2024, a US court rejected NSO Group's motion to dismiss. But in September 2024, Apple withdrew the lawsuit itself. The reasoning: the proceedings would have required Apple to disclose internal threat intelligence information – a risk that had become too high after a suspected intervention by Israeli authorities in NSO documents. In addition, the spyware market had diversified, and a single lawsuit against NSO was no longer effective.

Apple has since invested more heavily in technical measures rather than legal ones. Lockdown Mode has been expanded, threat notifications have been refined, and Apple is cooperating in the new cybersecurity initiative Project Glasswing with Anthropic to systematically uncover security vulnerabilities.

A realistic look at your own risk

Pegasus and Predator are real but highly targeted threats – anyone without a high-risk political profile is statistically not in the crosshairs of these operations, because the cost per target is simply too high. The picture is different with Coruna and DarkSword: these exploit kits have moved beyond the state-sponsored niche and are now also being used by criminals for mass attacks, for example to steal cryptocurrencies via compromised websites. Anyone running an outdated version of iOS who clicks on a manipulated link or visits an infected site can end up being targeted even without a political profile. The key takeaway for every iPhone user: keep your devices consistently up to date, understand Apple's threat notifications and be able to distinguish them from phishing attempts. Anyone who does that is as well protected against the tools of the mercenary spyware industry as a consumer device can be today. Time for fresh accessories? Visit our Amazon Storefront and discover a wide selection of products from leading manufacturers, including for HomeKit! (Image: Shutterstock / Bits And Splits)

  • Secure email usage on the iPhone
  • AI makes your iPhone more secure – what that really means for you
  • Apple Security Updates: How Apple protects your Devices
  • Ransomware explained: Could my iPhone be affected?
  • Identity theft: What to do if your Data has been stolen?
  • Recognizing Social Engineering: How to Protect Yourself from Manipulation
  • Detecting AI fraud: Deepfakes, fake voices and how to protect yourself
  • Recognizing Quishing: How to protect yourself from QR code fraud
  • Use public Wi-Fi safely: How to protect your iPhone
  • iOS 26.4: Show Hotspot Data usage per Device
  • Recognizing Smishing: How to protect yourself from SMS fraud
  • Create and manage secure passwords: The Apple guide
  • WhatsApp hacked: How to protect your Account
  • Recognizing Phishing: How to protect yourself from fraud
  • Creating, Changing, and Deleting an Apple ID: The complete Overview
  • Activate iPhone Call forwarding: All Methods under iOS 26
  • iPhone vibrates for no Reason: Causes and Solutions under iOS 26
  • Connecting and resetting AirPods: Instructions for all Models
  • AirDrop not working: All Solutions for iOS 26
  • iPhone loading slowly: Causes and Solutions under iOS 26
  • iPhone Screen Recording: Instructions for iOS 26
  • How to view your Wi-Fi Password on your iPhone: All Methods under iOS 26
  • iPhone Update Problems: All Solutions for iOS 26
  • Creating an iPhone Backup: All methods under iOS 26

Frequently Asked Questions about Pegasus and Commercial Spyware

What is the difference between Pegasus and ordinary malware?

Pegasus is highly sophisticated spyware that, in modern versions, is installed without any interaction from the victim (zero-click) and costs millions of dollars per deployment. Ordinary malware almost always relies on phishing or malicious apps and targets broad user groups rather than individual persons.

Can my iPhone be infected with Pegasus without me noticing?

Yes – that is actually the design goal. Pegasus is built to remain completely undetected. Messages like "Pegasus activated" are exclusively phishing attempts.

Does Lockdown Mode reliably protect against Pegasus?

The mode is Apple's most effective protection against mercenary spyware. Citizen Lab and Apple have documented several concrete cases in which Lockdown Mode blocked active attacks – including with Pegasus and Predator. A one-hundred-percent guarantee never exists in software security, but the mode reduces the attack surface dramatically.

How do I know if an email from Apple is a genuine threat notification?

Genuine threat notifications come from threat-notifications [at] email.apple.com and are shown in parallel at account.apple.com after signing in. They never contain links to click or requests to enter a password.

How much does a Pegasus attack cost?

According to reports and court filings, the cost per target runs into several million dollars. This makes the use of Pegasus against private individuals without a political profile economically unattractive.

Does an iPhone reset help against spyware?

A reset or restart removes many memory-resident components but can also wipe important forensic traces. Anyone who has received a threat notification should consult expert help from organizations such as Access Now or Citizen Lab before performing a reset.

Have you already visited our Amazon Storefront? There you'll find a hand-picked selection of various products for your iPhone and other devices – enjoy browsing !
This post contains affiliate links.
Add Apfelpatient to your Google News Feed. 
Was this article helpful?
YesNo
Tags: CybersecurityiOSiPhone
Previous Post

iOS 26.5 closes over 50 security vulnerabilities at once

Pegasus and Commercial Spyware on iPhone: What Users Really Need to Know">
Pegasus iPhone

Pegasus and Commercial Spyware on iPhone: What Users Really Need to Know

May 11, 2026
iOS 26.5 Apple

iOS 26.5 closes over 50 security vulnerabilities at once

May 11, 2026
iOS 26.5 Apple RCS

RCS messages are encrypted: Apple launches beta in iOS 26.5

May 11, 2026

About APFELPATIENT

Welcome to your ultimate source for everything Apple - from the latest hardware like iPhone, iPad, Apple Watch, Mac, AirTags, HomePods, AirPods to the groundbreaking Apple Vision Pro and high-quality accessories. Dive deep into the world of Apple software with the latest updates and features for iOS, iPadOS, tvOS, watchOS, macOS and visionOS. In addition to comprehensive tips and tricks, we offer you the hottest rumors, the latest news and much more to keep you up to date. Selected gaming topics also find their place with us, always with a focus on how they enrich the Apple experience. Your interest in Apple and related technology is served here with plenty of expert knowledge and passion.

Legal

  • Imprint – About APFELPATIENT
  • Cookie Settings
  • Privacy Policy
  • Terms of Use

Service

  • Netiquette
  • Partner Program
  • Push Notifications

RSS Feed

Follow Apfelpatient:
Facebook Instagram YouTube threads threads
Apfelpatient Logo

© 2026 Apfelpatient. All rights reserved. | Sitemap

No Result
View All Result
  • Home
  • News
  • Rumors
  • Tips & Tricks
  • Reviews
  • Insights

© 2026 Apfelpatient. All rights reserved. Page Directory

Change language to Deutsch