Intellexa’s Predator spyware used to hack iPhone of journalist in Angola, research says
Contact Us Do you have more information about Intellexa? Or other spyware makers? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or. Do you have more information about Intellexa? Or other spyware makers? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email Intellexa is one of the most controversial spyware makers of the last few years, operating from different jurisdictions to skirt export laws and using an “opaque web of corporate entities” — as a U.
S government official put it at the time — to hide its activities.
Earlier this year, the Treasury lifted sanctions against three other executives tied to Intellexa, a decision that left Senate Democrats demanding answers from the Trump administration. Dilian did not respond to a request for comment. An example of a malicious link sent by the hackers to Cândido on WhatsApp. Image Credits:Amnesty International Amnesty researchers wrote in the report that they linked the intrusions to Intellexa by examining forensic traces found on Cândido’s phone. Amnesty said that Intellexa used infection servers that had been previously linked to the company’s spyware infrastructure. Several hours after clicking on the link that led to his phone hack, Cândido rebooted his phone, which wiped the spyware from his device.
The researchers found that Predator stayed hidden by impersonating legitimate iOS system processes to avoid detection.
“It is not currently possible to conclusively identify the customer of the Predator spyware in the country,” read the report. Last year, based on leaks of internal documents, Amnesty and media organizations revealed that Intellexa employees had the ability to access customers’ systems remotely, potentially giving the spyware maker visibility into government surveillance operations. Those leaks, like this report, shows that despite its controversies and sanctions, Intellexa has remained active in recent years. “We’ve now seen confirmed abuses in Angola, Egypt, Pakistan, Greece, and beyond — and for every case we uncover, many more abuses surely remain hidden,” said Donncha Ó Cearbhaill, the head of the security lab at Amnesty International
Logic Quality Breakdown:
- Updated_At:
- Truth_Blocks:
- Analysis_Method: