Predator spyware is still active and more difficult to track – here's how to stay safe

  • Hi there and welcome to PC Help Forum (PCHF), a more effective way to get the Tech Support you need!
    We have Experts in all areas of Tech, including Malware Removal, Crash Fixing and BSOD's , Microsoft Windows, Computer DIY and PC Hardware, Networking, Gaming, Tablets and iPads, General and Specific Software Support and so much more.

    Why not Click Here To Sign Up and start enjoying great FREE Tech Support.

    This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.
  • Hello everyone We want to personally apologize to everyone for the downtime that we've experienced. We are working to get everything back up as quickly as possible. Due to the issues we've had, your password will need to be reset. Please click the button that says "Forgot Your Password" and change it. We are working to have things back to normal. Emails are fixed and should now send properly. Thank you all for your patience. Thanks, PCHF Management

PCHF IT Feeds

PCHF Tech News
PCHF Bot
Jan 10, 2015
52,116
26
pchelpforum.net
After going quiet for a few months amid public exposure and US sanctions, the Predator spyware is back and is even better to evade detection.

This is the worrying revelation coming from experts at Insikt Group as they detect the new infrastructure of the mercenary spyware toll in multiple countries, including in the Democratic Republic of the Congo (DRC) and Angola.

"Predator is far from disappearing," wrote experts. "Recent findings by Insikt Group reveal that Predator's infrastructure is back with modifications to evade detection and anonymize users."

New Research from Insikt Group finds that despite U.S. sanctions, Intellexa’s Predator spyware has reappeared with enhanced infrastructure to evade detection. https://t.co/TUa2ivkfhC pic.twitter.com/cYUfcVOd6HSeptember 5, 2024

Developed by the Intellexa Alliance – a group of companies among which many are EU-based – Predator spyware is a highly invasive mobile hacking software (for both Android and iPhone) designed to leave minimal traces on affected devices. It uses both one-click and zero-click attack vectors to install itself on targeted phones, taking advantage of browser vulnerabilities and network access.

Investigations suggest that this sophisticated mercenary spyware, similar to the infamous Pegasus developed by Israeli firm NSO Group, has been largely used by government actors since at least 2019.

Predator is highly dangerous due to its level of intrusiveness. Once the device is infected, the spyware has unrestricted access to the microphone, camera, and all users' data, such as contacts, messages, photos, and videos, without their knowledge.

Did you know?

As the spyware problem keeps getting bigger, a group of civil societies is calling on European regulators for "an EU-wide ban on the production, export, sale, import, acquisition, transfer, servicing and use of spyware."


The latest report found that Predator's operators "significantly enhanced their infrastructure" by adding layers of complexity that make it even more difficult to trace it. The malicious software now has an additional tier in its delivery system which anonymizes customer operations. Put simply, it's now even harder for researchers to identify the countries using Predator and track how its usage spread.

"The re-emergence of Predator spyware is a stark reminder of the growing dangers posed by mercenary spyware," wrote experts. "Public reporting, ongoing research, and stronger regulations are critical in minimizing the damage caused by tools like Predator."

How to protect yourself from Predator spyware​


It's true that spyware tools are powerful malware and full protection against them is very difficult. Simply connecting to security software like the best VPN and antivirus apps, for instance, isn't enough to fight back the spyware threat. Yet, there are still some steps you can take to considerably reduce the risk of becoming a target.

As experts pointed out: "[Predator] infrastructure has evolved, making it harder to track and identify users, but with the right cybersecurity practices in place, individuals and organizations can reduce their risk of becoming targets."

Hence, if you are a high-profile individual – like a politician, journalist, activist, or company's executive – you need to be vigilant at all times. Below are Insikt Group's suggested defensive measures you should take to mitigate the risk of a Predator's attack:

  • Keep your software updated at all times. A piece of advice that never gets old, staying on top of your device updates considerably reduces potential vulnerabilities that Predator might exploit.
  • Regularly reboot your device. Rebooting your device can also help in disrupting spyware operations, so experts suggest doing that periodically. Bear in mind that a reboot may not be enough to completely eliminate advanced spyware.
  • Enable lockdown mode. Both available on iPhones and Android phones, lockdown mode is a security feature that boosts device protection with stringent controls, such as disabling biometrics access.
  • Boost your organization's security. If you're looking to protect your workforce, experts suggest implementing a mobile device management (MDM) system while investing in security awareness training to educate employees against online risks.

Continue reading...