Threat actors are now using Sarwent, a malware that mimics Amnesty International’s legitimate scanner, to scan systems for traces of Pegasus and remove them to infect Windows.
While the tactics of previous campaigns remain unclear, researchers at Cisco Talos recently announced a new attack when the malware was delivered via a fake Amnesty International website promoting Anti-Pegasus AV.
Based on an investigation that examined the administration panel of a Sarwent Command and Control server, the malware mainly reached users in the U.K.
Further research shows that Sarwent, written in Delphi, has remote access tool and allows direct access to the machine by activating the Remote Desktop Protocol or the Virtual Network Computing system.
According to researchers at Cisco Talos, the graphical user interface that Sarvent masquerades as an antivirus solution gives a clear indication that the threat actor behind the malware already has access to its source code.
For more information, read the original story in Bleeping Computer.