LIVE NEWS
  • Global economy must stop pandering to ‘frivolous desires of ultra-rich’, says UN expert | Environment
  • Some Middle East Flights Resume but Confusion Reigns From Iran Strikes
  • Clinton Deposition Videos Released in Epstein Investigation
  • Elevance stock tumbles as CMS may halt Medicare enrollment
  • Wild spaces for butterflies to be created in Glasgow
  • You can now adjust how your caller card looks for calls on Android phones
  • TRON DAO expands TRON Academy initiative with Dartmouth, Princeton, Oxford, and Cambridge
  • Alex Mitchell: England scrum-half ruled out of Six Nations
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Predator Spyware Maker Intellexa Evades Sanctions
Cybersecurity

Predator Spyware Maker Intellexa Evades Sanctions

primereportsBy primereportsDecember 5, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Predator Spyware Maker Intellexa Evades Sanctions
Share
Facebook Twitter LinkedIn Pinterest Email


Spyware products from the surveillance consortium Intellexa are still thriving despite extensive US sanctions.

This comes as a months-long investigation into a set of highly sensitive documents and other materials leaked from the company has been published by Inside Story, Haaretz and the WAV Research Collective, dubbed “Intellexa Leaks”.

Following publication of the investigation, three distinct but coordinated reports into the spyware consortium’s activity have emerged detailing new attack vectors and victim lists.

These include documents by Google Threat Intelligence Group (GTIG), Recorded Future’s Insikt Group and Amnesty International’s Security Lab, which also provided the technical team to the journalists working on Intellexa Leaks, which revealed that the spyware maker continues to sell digital weapons to the highest bidders.

Among the key findings, GTIG revealed that Intellexa has solidified its position as one of, if not the most, prolific spyware vendors exploiting zero-day vulnerabilities against mobile browsers.

The spyware vendor, made up of several legal entities spanning across Greece, Ireland, Hungary, North Macedonia and beyond, is behind at least 15 of the 70 zero-day exploits documented by GTIG and its predecessor, Google’s Threat Analysis Group (TAG), since 2021.

This is despite several waves of sanctions targeting Intellexa’s businesses and individuals linked to the consortium, including sanctions by the US Treasury’s Office of Foreign Assets Control (OFAC) in March and September 2024, targeting seven individuals in total.

Additionally, Intellexa was fined by the Greek Data Protection Authority in 2023 for failing to comply with its investigations into the company.

New ‘Zero-Click’ Attack Vectors Revealed

The report from Amnesty’s Security Lab also shed light on how Predator, Intellexa’s flagship product, now sometimes marketed as Helios, Nova, Green Arrow or Red Arrow, infects target devices.

Traditionally, Predator relied almost exclusively on ‘one-click’ attacks to infect a device, which require a malicious link to be opened in the target’s phone. This is less intrusive that leveraging ‘zero-click’ attacks typical of other spyware made by competitors like NSO Group’s Pegasus.

However, the Amnesty report revealed that Intellexa has recently developed a new strategic infection vector, ‘Aladdin,’ which can enable silent zero-click infection of target devices anywhere in the world.

The vector, which was first exposed by Haaretz and Inside Story, exploits the commercial mobile advertising ecosystem to carry out infections.

Amnesty describes the attack chain as “technically complex to implement” but “conceptually simple.”

“The Aladdin system infects the target’s phone by forcing a malicious advertisement created by the attacker to be shown on the target’s phone. This malicious ad could be served on any website which displays ads, such as a trusted news website or mobile app, and would appear like any other ad that the target is likely to see. Internal company materials explain that simply viewing the advertisement is enough to trigger the infection on the target’s device, without any need to click on the advertisement itself,” the Amnesty report reads.

The Recorded Future report also revealed that two newly identified entities appearing to operate in the advertising sector may be connected to Aladdin.

Amnesty’s Security Lab shared the findings of leaked documents and footage showing Intellexa’s deep visibility into live surveillance operations, indicating that the spyware maker retains direct access to live customer spyware systems.

New Entities Linked to Intellexa Discovered

Another key finding in Amnesty’s report confirmed the previous attribution of suspected infection domains, which imitate legitimate Kazakhstani news websites, and infrastructure to Predator.

“While no victims of Predator spyware targeting have been identified in Kazakhstan, previous investigations by the Security Lab have documented the unlawful hacking of at least four Kazakhstani youth activists with Pegasus spyware in 2021,” the Amnesty report said.

Based on infrastructure analysis, Recorded Future’s Insikt Group assessed that Kazakhstan has, at least until August 2025, continued to use Predator spyware.

The report also uncovered several newly identified Intellexa nexus entities, including some linked to the consortium’s Czech cluster and one in the Philippines.

The Intellexa data examined during the investigations also showed potential new victims in Greece and Egypt and evidence that Egypt and Saudi-based clients are still active.

Over the past two years, Recorded Future’s Insikt Group has identified suspected Predator operators in more than a dozen countries, including in Angola, Armenia, Botswana, the Democratic Republic of the Congo, Egypt, Greece, Indonesia, Kazakhstan, Mongolia, Mozambique, Oman, the Philippines, Saudi Arabia, Sudan and Trinidad and Tobago and Vietnam.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleDecart uses AWS Trainium3 for real-time video generation
Next Article Merz heads to Brussels for talks on Russian assets – DW – 12/05/2025
primereports
  • Website

Related Posts

Cybersecurity

Samsung Unpacked 2026 live blog: Updates on Galaxy S26 Ultra, preorder deals, and pricing

February 25, 2026
Cybersecurity

Marquis sues SonicWall over backup breach that led to ransomware attack

February 25, 2026
Cybersecurity

Why ‘Call This Number’ TOAD Emails Beat Gateways

February 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20255 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Global economy must stop pandering to ‘frivolous desires of ultra-rich’, says UN expert | Environment
  • Some Middle East Flights Resume but Confusion Reigns From Iran Strikes
  • Clinton Deposition Videos Released in Epstein Investigation
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.