Slide 13
Slide 13 text
camouflage
Signature Manipulation: Pegasus modifies its digital signatures and attributes to appear similar to
legitimate applications or other operating system components. This makes the malware pass itself off
as trustworthy software, decreasing its chances of being identified as a threat.
Environment detection: Pegasus can detect whether it is running in an analysis environment, such
as a test virtual machine or sandbox environment, used to examine suspicious software activity.
When it detects these environments, malware can behave differently or remain dormant to avoid
discovery.
Behavior analysis: Rather than performing malicious operations immediately after infection, Pegasus
can wait for certain user behavior or other specific conditions before taking action. This technique
delays the moment when malware reveals its true intentions, making detection more difficult.