Skip to content

Device Integrity

These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on mobile security, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.

This is an advanced topic

These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to use effectively.

It is critical to understand that scanning your device for public indicators of compromise is not sufficient to determine that a device is "clean", and not targeted with a particular spyware tool. Reliance on these publicly-available scanning tools can miss recent security developments and give you a false sense of security.

General Advice

The majority of system-level exploits on modern mobile devices—especially zero-click compromises—are non-persistent, meaning they will not remain or run automatically after a reboot. For this reason, we highly recommend rebooting your device regularly. We recommend everybody reboot their devices once a week at minimum, but if non-persistent malware is of particular concern for you, we and many security experts recommend a daily reboot schedule.

This means an attacker would have to regularly re-infect your device to retain access, although we'll note this is not impossible. Rebooting your device also will not protect you against persistent malware, but this is less common on mobile devices due to modern security features like secure/verified boot.

Post-Compromise Information & Disclaimer

If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact:

  • If you are a human rights defender, journalist, or from a civil society organization: Amnesty International's Security Lab
  • If a business or government device is compromised: the appropriate security liason at your enterprise, department, or agency
  • Local law enforcement

We are unable to help you directly beyond this. We are happy to discuss your specific situation or circumstances and review your results in our community spaces, but it is unlikely we can assist you beyond what is written on this page.

The tools on this page are only capable of detecting indicators of compromise, not removing them. If you are concerned about having been compromised, we advise that you:

  • Consider replacing the device completely
  • Consider changing your SIM/eSIM number
  • Not restore from a backup, because that backup may be compromised

These tools provide analysis based on the information they have the ability to access from your device, and publicly-accessible indicators of compromise. It is important to keep in mind two things:

  1. Indicators of compromise are just that: indicators. They are not a definitive finding, and may occasionally be false positives. If an indicator of compromise is detected, it means you should do additional research into the potential threat.
  2. The indicators of compromise these tools look for are published by threat research organizations, but not all indicators are made available to the public! This means that these tools can present a false negative, if your device is infected with spyware which is not detected by any of the public indicators. Reliable and comprehensive digital forensic support and triage require access to non-public indicators, research, and threat intelligence.

External Verification Tools

Protects against the following threat(s):

External verification tools run on your computer and scan your mobile device for forensic traces, which are helpful to identify potential compromise.

Danger

Public indicators of compromise are insufficient to determine that a device is "clean", and not targeted with a particular spyware tool. Reliance on public indicators alone can miss recent forensic traces and give a false sense of security.

Reliable and comprehensive digital forensic support and triage require access to non-public indicators, research, and threat intelligence.

Such support is available to civil society through Amnesty International's Security Lab or Access Now’s Digital Security Helpline.

These tools can trigger false-positives. If any of these tools finds indicators of compromise, you need to dig deeper to determine your actual risk. Some reports may be false positives based on websites you've visited in the past, and findings which are many years old are likely either false-positives or indicate previous (and no longer active) compromise.

Mobile Verification Toolkit

MVT logo

Mobile Verification Toolkit (MVT) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the Pegasus Project.

Homepage

Downloads

Warning

Using MVT is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool.

MVT is most useful for scanning iOS devices. Android stores very little diagnostic information useful to triage potential compromises, and because of this, mvt-android capabilities are limited as well. On the other hand, encrypted iOS iTunes backups provide a large enough subset of files stored on the device to detect suspicious artifacts in many cases. This being said, MVT does still provide fairly useful tools for both iOS and Android analysis.

If you use iOS and are at high-risk, we have three additional suggestions for you:

  1. Create and keep regular (monthly) iTunes backups. This allows you to find and diagnose past infections later with MVT, if new threats are discovered in the future.
  2. Trigger sysdiagnose logs often and back them up externally. These logs can provide invaluable data to future forensic investigators if need be.

    The process to do so varies by model, but you can trigger it on newer phones by holding down Power + Volume Up + Volume Down until you feel a brief vibration. After a few minutes, the timestamped sysdiagnose log will appear in Settings > Privacy & Security > Analytics & Improvements > Analytics Data.

  3. Enable Lockdown Mode.

MVT allows you to perform deeper scans/analysis if your device is jailbroken. Unless you know what you are doing, do not jailbreak or root your device. Jailbreaking your device exposes it to considerable security risks.

iMazing (iOS)

iMazing logo

iMazing provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for MVT. This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators.

Homepage

Downloads

iMazing automates and interactively guides you through the process of using MVT to scan your device for publicly-accessible indicators of compromise published by various threat researchers. All of the information and warnings which apply to MVT apply to this tool as well, so we suggest you also familiarize yourself with the notes on MVT in the sections above.

On-Device Verification

Protects against the following threat(s):

These are apps you can install which check your device and operating system for signs of tampering, and validate the identity of your device.

Warning

Using these apps is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool.

Auditor (Android)

Auditor logo Auditor logo

Auditor is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for supported devices.

Homepage

Downloads

Auditor is not a scanning/analysis tool like some other tools on this page. Rather, it uses your device's hardware-backed keystore to allow you to verify the identity of your device and gain assurance that the operating system itself hasn't been tampered with or downgraded via verified boot. This provides a very robust integrity check of your device itself, but doesn't necessarily check whether the user-level apps running on your device are malicious.

Auditor performs attestation and intrusion detection with two devices, an auditee (the device being verified) and an auditor (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by GrapheneOS), while the auditee must be a specifically supported device. Auditor works by:

  • Using a Trust On First Use (TOFU) model between an auditor and auditee, the pair establish a private key in the hardware-backed keystore of the Auditor.
  • The auditor can either be another instance of the Auditor app or the Remote Attestation Service.
  • The auditor records the current state and configuration of the auditee.
  • Should tampering with the operating system of the auditee happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations.
  • You will be alerted to the change.

It is important to note that Auditor can only effectively detect changes after the initial pairing, not necessarily during or before due to its TOFU model. To make sure that your hardware and operating system is genuine, perform local attestation immediately after the device has been installed and prior to any internet connection.

No personally identifiable information is submitted to the attestation service. We recommend that you sign up with an anonymous account and enable remote attestation for continuous monitoring.

If your threat model requires privacy, you could consider using Orbot or a VPN to hide your IP address from the attestation service.

On-Device Scanners

Protects against the following threat(s):

These are apps you can install on your device which scan your device for signs of compromise.

Warning

Using these apps is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool.

Hypatia (Android)

Hypatia logo Hypatia logo

Hypatia is an open source real-time malware scanner for Android, from the developer of DivestOS. It accesses the internet to download signature database updates, but does not upload your files or any metadata to the cloud (scans are performed entirely locally).

Homepage

Downloads

Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should visit this page for advice.

iVerify Basic (iOS)

iVerify logo

iVerify Basic is an iOS app which can scan your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or of Targeted Attacks such as Pegasus.

Homepage

Downloads

Previously, iVerify would scan your device for threats automatically in the background and notify you if one is found, but this is no longer the case following their rebrand of the consumer app to iVerify Basic in May 2024. You can still run manual scans within the app. Automatic background scanning is now only available in iVerify's enterprise product which is unavailable to consumers.

Like all iOS apps, iVerify Basic is restricted to what it can observe about your device from within the iOS App Sandbox. It will not provide nearly as robust analysis as a full-system analysis tool like MVT. Its primary function is to detect whether your device is jailbroken, which it is effective at, however a hypothetical threat which is specifically designed to bypass iVerify's checks would likely succeed at doing so.

iVerify Basic is not an "antivirus" tool, and will not detect non-system-level malware such as malicious custom keyboards or malicious Wi-Fi Sync configurations, for example.

In addition to device scanning, iVerify Basic also includes a number of additional security utilities which you may find useful, including device reboot reminders, iOS update notifications (which are often faster than Apple's staggered update notification rollout), and some basic privacy and security guides.


Share this website and spread privacy knowledge

Copy this text to easily share Privacy Guides with your friends and family on any social network!