Experiencing Interruptions?

PegaSOMOSh

Pegasus viz. incorruptibility undergoes a stress test to prove its name. Will his code of chivalry stand the attempts at corruption? Here we have four situations in which he gets proved. Criminal solicitations interfere digitally in the shape of data moshing. He takes a rough ride onto the mosh pit of the blockchain. Cybercryptocy video art meets classical Greek mythology.

The poetry is entirely written and read by AI, while the video is hand-moshed using a Python script.

  • Sara Ferro
    Director
  • Chris Weil
    Director
  • ARTOLDO pictures
    Production
  • Project Type:
    Experimental, Short
  • Runtime:
    11 minutes 47 seconds
  • Film Color:
    Color
  • First-time Filmmaker:
    No
  • Student Project:
    No
  • Castello d’Albertis – CODE WAR
    Genoa (2021)
    Special Screening
  • Ces Gens Là: 25.07 - 11.08.2024
    Paris
    Group Exhibition
Distribution Information
  • ARTOLDO media
    Distributor
    Country: Worldwide
    Rights: All Rights
Director Biography - Sara Ferro, Chris Weil

Artoldo pushes the boundaries of visual storytelling. With a passion for innovative Avant-garde cinema, Moving Images Arts and New Media, their portfolio includes a diverse range of works, such as AI Art, Crypto Art, Digital Art, Experimental Films, Feature Documentaries, Immersive Experiences [AR / VR / XR], Net Art, Sound Art and Video Art.

Add Director Biography
Director Statement

Pegasus Spyware – Technical Overview from the Attacker’s Perspective

What Is Pegasus?

Pegasus is one of the most advanced and covert spyware tools ever discovered. It’s designed to silently infiltrate smartphones—both iOS and Android—and extract nearly every form of private data: messages, calls, photos, files, passwords, camera and microphone feeds, and real-time location.

While originally sold as a tool for law enforcement, Pegasus has been widely used in targeted digital surveillance, often against individuals involved in journalism, activism, politics, or high-stakes legal and diplomatic matters.

How Pegasus Works

From an attacker’s perspective, Pegasus is built to be:
• Stealthy
• Remote
• Data-rich
• Hard to detect

The infection usually begins through zero-click exploits, meaning the target doesn’t have to tap or open anything. Known delivery vectors include:

• VoIP Exploits: Just receiving a missed call on apps like WhatsApp or FaceTime could trigger code execution.

• Messaging App Bugs: Specially crafted iMessages (e.g. with a malformed GIF) exploit vulnerabilities in how the device processes media or notifications.

• Browser/Rendering Engine Exploits: Exploits in Safari’s WebKit engine can be triggered by background processes, even without opening links.

Once access is gained:
1. Privilege escalation gives full control over the OS.
2. Pegasus can now:
• Access messages from encrypted apps in real time
• Record calls and surroundings
• Capture screen content and keystrokes
• Dump files and credentials
3. Communication with Command & Control servers (C2) is done stealthily, often using custom encrypted protocols over HTTPS.

Persistence may be maintained depending on the exploit chain. Some versions are RAM-resident, meaning they disappear after reboot to reduce forensic risk.

Targeting and Deployment

Pegasus is typically used for highly targeted operations. Attackers often pre-load specific phone numbers or Apple IDs into a system, which attempts silent delivery of the payload. There is no mass infection—only laser-focused surveillance.

Avoidance and Detection

Pegasus uses advanced techniques to avoid detection:
• Avoids creating files on disk
• Deletes itself if a forensic tool is detected
• Runs using legitimate OS services
• Alters system logs or crash traces

Detection is difficult but not impossible:
• iOS sysdiagnose logs may show suspicious process behavior or failed crash attempts.
• MVT (Mobile Verification Toolkit) and similar tools can identify known traces, such as injected config files, domains, or unusual sandbox activity.
• VPN or DNS logs may hint at data exfiltration endpoints, though Pegasus often uses layered encryption.

Why Pegasus Matters

Pegasus represents a shift in surveillance technology—from traditional network taps and phishing to total device compromise without the user ever knowing. It defeats encryption by accessing data before it’s encrypted—right at the device level.

It also reflects a broader change: espionage is now digital-first, personal, and deeply invasive.