You are absolutely correct! They are Pegasus like processes. I am dealing with the same issue.
there is no way to clean the network / system configurations to my knowledge. The problem is that these types of attacks are entirely successful but still illegal. What is there to do???