Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Skills Shortages Trump Headcount as Critical Cyber Challenge

December 6, 2025

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

December 6, 2025

Louvre to Bolster Its Security, Issues €57m Public Tender

December 6, 2025
Facebook X (Twitter) Instagram
Saturday, December 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Predator Spyware Maker Intellexa Evades Sanctions
News

Predator Spyware Maker Intellexa Evades Sanctions

Team-CWDBy Team-CWDDecember 5, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Spyware products from the surveillance consortium Intellexa are still thriving despite extensive US sanctions.

This comes as a months-long investigation into a set of highly sensitive documents and other materials leaked from the company has been published by Inside Story, Haaretz and the WAV Research Collective, dubbed “Intellexa Leaks”.

Following publication of the investigation, three distinct but coordinated reports into the spyware consortium’s activity have emerged detailing new attack vectors and victim lists.

These include documents by Google Threat Intelligence Group (GTIG), Recorded Future’s Insikt Group and Amnesty International’s Security Lab, which also provided the technical team to the journalists working on Intellexa Leaks, which revealed that the spyware maker continues to sell digital weapons to the highest bidders.

Among the key findings, GTIG revealed that Intellexa has solidified its position as one of, if not the most, prolific spyware vendors exploiting zero-day vulnerabilities against mobile browsers.

The spyware vendor, made up of several legal entities spanning across Greece, Ireland, Hungary, North Macedonia and beyond, is behind at least 15 of the 70 zero-day exploits documented by GTIG and its predecessor, Google’s Threat Analysis Group (TAG), since 2021.

This is despite several waves of sanctions targeting Intellexa’s businesses and individuals linked to the consortium, including sanctions by the US Treasury’s Office of Foreign Assets Control (OFAC) in March and September 2024, targeting seven individuals in total.

Additionally, Intellexa was fined by the Greek Data Protection Authority in 2023 for failing to comply with its investigations into the company.

New ‘Zero-Click’ Attack Vectors Revealed

The report from Amnesty’s Security Lab also shed light on how Predator, Intellexa’s flagship product, now sometimes marketed as Helios, Nova, Green Arrow or Red Arrow, infects target devices.

Traditionally, Predator relied almost exclusively on ‘one-click’ attacks to infect a device, which require a malicious link to be opened in the target’s phone. This is less intrusive that leveraging ‘zero-click’ attacks typical of other spyware made by competitors like NSO Group’s Pegasus.

However, the Amnesty report revealed that Intellexa has recently developed a new strategic infection vector, ‘Aladdin,’ which can enable silent zero-click infection of target devices anywhere in the world.

The vector, which was first exposed by Haaretz and Inside Story, exploits the commercial mobile advertising ecosystem to carry out infections.

Amnesty describes the attack chain as “technically complex to implement” but “conceptually simple.”

“The Aladdin system infects the target’s phone by forcing a malicious advertisement created by the attacker to be shown on the target’s phone. This malicious ad could be served on any website which displays ads, such as a trusted news website or mobile app, and would appear like any other ad that the target is likely to see. Internal company materials explain that simply viewing the advertisement is enough to trigger the infection on the target’s device, without any need to click on the advertisement itself,” the Amnesty report reads.

The Recorded Future report also revealed that two newly identified entities appearing to operate in the advertising sector may be connected to Aladdin.

Amnesty’s Security Lab shared the findings of leaked documents and footage showing Intellexa’s deep visibility into live surveillance operations, indicating that the spyware maker retains direct access to live customer spyware systems.

New Entities Linked to Intellexa Discovered

Another key finding in Amnesty’s report confirmed the previous attribution of suspected infection domains, which imitate legitimate Kazakhstani news websites, and infrastructure to Predator.

“While no victims of Predator spyware targeting have been identified in Kazakhstan, previous investigations by the Security Lab have documented the unlawful hacking of at least four Kazakhstani youth activists with Pegasus spyware in 2021,” the Amnesty report said.

Based on infrastructure analysis, Recorded Future’s Insikt Group assessed that Kazakhstan has, at least until August 2025, continued to use Predator spyware.

The report also uncovered several newly identified Intellexa nexus entities, including some linked to the consortium’s Czech cluster and one in the Philippines.

The Intellexa data examined during the investigations also showed potential new victims in Greece and Egypt and evidence that Egypt and Saudi-based clients are still active.

Over the past two years, Recorded Future’s Insikt Group has identified suspected Predator operators in more than a dozen countries, including in Angola, Armenia, Botswana, the Democratic Republic of the Congo, Egypt, Greece, Indonesia, Kazakhstan, Mongolia, Mozambique, Oman, the Philippines, Saudi Arabia, Sudan and Trinidad and Tobago and Vietnam.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleJackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
Next Article How to Fix OST File cannot be Opened Error
Team-CWD
  • Website

Related Posts

News

Skills Shortages Trump Headcount as Critical Cyber Challenge

December 6, 2025
News

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

December 6, 2025
News

React.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability

December 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

What is it, and how do I get it off my device?

September 11, 2025

AI-powered financial scams swamp social media

September 11, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.