Knock, knock: Why the recent announcement about mobile spyware leak was fake

Background: Recently, a Telegram account announced the publication of source codes related to a mobile spyware. Before drawing any final conclusions, it is important to understand that this announcement was made in the context of various geopolitical conflicts. In addition, we are facing two challenges: identifying the source and conducting package research. enter image description here

Research: The package contained some files, including PDFs and source code. Now, let's take a look at the PDF. enter image description here The PDF contains a leaked document related to spyware, which is quite old and has been seen previously. enter image description here The next file is a 7z archive named "pegasus n.s.o". Upon review, we can see that this tool is open-source and freely available. It has no connection with the actual mobile spyware vendor’s product. enter image description here Other files were related to Windows products associated with open-source RATs.

enter image description here

Another file contained a malicious (malwarized) file, but it has been freely available since 2018. enter image description here

Conclusion: Based on the current analysis, the file that was impersonated as a new leak appears to be quite old. The confidence in claiming that it is a unique leak is low; it is likely a false alarm.