Leaks Expose Predator Spyware’s Ad Attacks and Vendor Role

Leaks Expose Predator Spyware’s Ad Attacks and Vendor Role

A malicious advertisement rendering silently in the background of a smartphone application is all it takes for a sophisticated surveillance tool to seize complete control of the device, from its microphone and camera to its most sensitive encrypted messages. This is not a theoretical threat but the documented reality exposed by a cache of leaked internal documents from the mercenary spyware vendor Intellexa. A joint investigation by Amnesty International and a consortium of media partners has pulled back the curtain on Predator, a powerful surveillance tool whose capabilities and delivery methods represent a grave escalation in the global digital arms race. The findings reveal not only an arsenal of potent exploits targeting the world’s most popular mobile devices but also a groundbreaking attack vector that weaponizes the online advertising ecosystem and evidence suggesting spyware vendors are more directly involved in their clients’ operations than they publicly admit.

Can the Simple Act of an Ad Loading on Your Phone Grant a Stranger Full Control

The very architecture of modern digital life, built on a constant stream of information and advertising, has been turned into a delivery system for invasive surveillance. For years, digital security experts have warned users to be wary of suspicious links, but the latest revelations show that such vigilance is no longer sufficient. The possibility that a passively viewed advertisement—one the user may not even consciously register—can trigger a full device compromise dismantles the traditional understanding of cyber defense. It shifts the threat from an active choice, such as clicking a malicious link, to a passive state of exposure, making nearly every smartphone user a potential target without their knowledge or consent. This new paradigm forces a fundamental reevaluation of where digital threats originate and who bears the responsibility for preventing them.

This evolution from interactive to invisible attacks is a calculated move by the commercial spyware industry to bypass the growing awareness and skepticism of potential targets. As individuals become more educated about phishing and other social engineering tactics, spyware vendors have been forced to innovate. The development of a zero-click vector that leverages the automated, high-velocity world of programmatic advertising is a strategic masterstroke in this context. It allows the spyware to be delivered silently and at scale, exploiting the complex and often opaque supply chains of ad networks to reach a target’s device. The infection occurs in the background, leaving no obvious trace and rendering the user powerless to stop an attack they cannot see.

Understanding the Threat: The Rise of Intellexa and Its Predator Spyware

At the center of this controversy is Intellexa, a company that markets a powerful surveillance tool known as Predator. Functionally equivalent to the infamous Pegasus spyware, Predator is designed for covert infiltration of both Android and iOS devices, granting its operators complete and unrestricted access. Once deployed, it can exfiltrate nearly any data point, including call logs, emails, location history, and the contents of encrypted messaging apps like WhatsApp and Signal. The spyware’s capabilities extend beyond data theft; it can remotely activate the device’s microphone to record conversations and its camera to capture images, effectively turning a personal phone into a 24/7 surveillance device. Leaked marketing materials show Intellexa offered this tool under various codenames, including Helios and Nova, tailoring its branding for different government clients while ensuring the collected data was stored on servers within the customer’s jurisdiction.

The real-world consequences of this technology are starkly illustrated by a documented attack on a human rights lawyer in Pakistan’s Balochistan province. This case marked the first confirmed instance of a civil society member in the country being targeted with Predator. The lawyer received a message on WhatsApp containing a one-time link sent from an unknown number. Analysis by Amnesty International’s Security Lab confirmed the link was an attempt to infect the device with Predator, citing the technical signature of the infection server and link characteristics consistent with previous 1-click attacks. The incident underscores the direct threat that commercially available spyware poses to activists, journalists, and dissidents. Despite the technical evidence, the Pakistani government issued a firm denial, stating there was “not an iota of truth” to the allegations, a common response from states accused of deploying such tools against their citizens.

The Arsenal Unveiled: Zero-Day Exploits and Sophisticated Attack Chains

Intellexa’s ability to reliably infect modern smartphones rests on a formidable portfolio of zero-day vulnerabilities—undisclosed flaws in software that developers have not yet had the chance to patch. The leaked data reveals that the company either developed or acquired a significant number of these high-value exploits targeting critical software from Apple, Google, and Arm. For instance, its arsenal included multiple vulnerabilities in Google’s Chrome browser and the Android operating system, such as CVE-2025-6554, a flaw in the V8 JavaScript engine observed in an attack in Saudi Arabia in June 2025, and CVE-2021-1048, a use-after-free vulnerability in the Android Kernel. Similarly, Apple’s iOS was targeted with exploits like CVE-2023-41993, a Safari vulnerability that allowed for remote code execution.

These individual vulnerabilities were not used in isolation but were meticulously woven together into multi-stage exploit chains designed to bypass layers of security. An attack against targets in Egypt in 2023, for example, initiated with the Safari exploit before leveraging two additional vulnerabilities (CVE-2023-41991 and CVE-2023-41992) to escape the browser’s restrictive sandbox and gain deep access to the operating system. This intricate process allowed for the deployment of the final payload, codenamed PREYHUNTER. This payload consisted of modules designed for persistence and stealth; a “Watcher” component monitored the device for crashes or signs of detection, while a “Helper” component installed the hooks necessary to record calls, log keystrokes, and capture photos, all while remaining hidden from the user and security software. The modular nature of these chains, noted by Google’s Threat Analysis Group (GTAG), allowed Intellexa to swap out components as old vulnerabilities were discovered and patched, ensuring the longevity and effectiveness of its platform.

A Paradigm Shift in Delivery: From Malicious Links to Zero-Click Ad Attacks

The foundation of spyware deployment has long been the 1-click attack vector, which relies on tricking a target into clicking a specially crafted link sent via text message or email. This method, while effective, requires a degree of user interaction and carries the risk of being recognized as suspicious. Intellexa’s leaked operational documents show a clear and deliberate evolution beyond this traditional technique toward more sophisticated and less detectable methods designed for both “tactical” and “strategic” deployment. These advanced vectors demonstrate a significant leap in capability, moving the point of attack from the user’s inbox to the very infrastructure of the internet.

Among the most advanced of these are the network injection systems codenamed “Mars” and “Jupiter.” These platforms enable adversary-in-the-middle attacks, which require the cooperation of the client state with local mobile operators or Internet Service Providers. By gaining privileged access to the network, operators can intercept a target’s unencrypted web traffic and seamlessly redirect them to an exploit server. In some cases, they can even intercept traffic to legitimate encrypted websites by using valid TLS certificates for domestic domains, injecting the malicious payload without raising any browser warnings. This method eliminates the need for a deceptive message, as the infection is delivered directly through the target’s normal browsing activity.

The most alarming innovation detailed in the leaks is a zero-click vector codenamed “Aladdin.” In development since at least 2022, Aladdin weaponizes the mobile advertising ecosystem to infect a device without any user interaction whatsoever. The system forces a malicious advertisement to be served to an application on the target’s phone. The mere act of the ad rendering on the screen is enough to trigger the exploit chain and install Predator. Google’s TAG confirmed that Intellexa abused the ad ecosystem to fingerprint target devices and redirect them to its exploit servers. In response, Google terminated accounts associated with front companies, including Pulse Advertise and MorningStar TEC, which were identified by security firm Recorded Future as being linked to the Aladdin vector. This method marks a profound shift, transforming a ubiquitous and seemingly benign feature of the mobile experience into a potent weapon for targeted surveillance.

Shattering the Plausible Deniability: Evidence of Direct Vendor Involvement

Perhaps the most significant revelation from the leaked documents is the evidence of direct and ongoing operational involvement by Intellexa personnel in their clients’ surveillance activities. The documents show that company staff retained the ability to remotely access customer systems using commercial software like TeamViewer. This access allowed them to view operational logs, which included sensitive details about surveillance targets. This finding shatters the industry’s long-standing narrative of plausible deniability, where vendors claim they merely sell a technology and have no knowledge of or involvement in how it is ultimately used by their government clients. The ability to monitor active operations implies a level of partnership and oversight that fundamentally changes the calculus of corporate responsibility.

This direct access carries profound legal and ethical implications. Jurre van Bergen of Amnesty International’s Security Lab emphasized that such operational involvement raises serious questions about Intellexa’s adherence to human rights due diligence principles. If a company has visibility into how its product is being used, it can no longer claim ignorance when that product is deployed to facilitate human rights abuses against journalists, activists, or political opponents. This evidence could expose the company and its executives to greater legal liability, particularly in jurisdictions that regulate the export and use of dual-use technologies. It transforms the vendor from a passive supplier into an active participant in surveillance.

Corroborating research from other organizations reinforces the scale and persistence of the Predator threat. Following the leaks, Google’s Threat Analysis Group independently confirmed the abuse of the ad ecosystem for delivering spyware, lending weight to the findings on the Aladdin vector. Moreover, despite the United States imposing sanctions on Intellexa and its leadership, a June 2025 report from Recorded Future’s Insikt Group found that Predator infrastructure remained active in over a dozen countries. The report noted ongoing communications from clients in nations like Saudi Arabia, Kazakhstan, and Angola, indicating that demand for these powerful surveillance tools remains strong and that sanctions alone may not be sufficient to curb their proliferation.

Redefining Digital Defense in an Era of Invisible Attacks

The emergence of zero-click attack vectors like Aladdin renders much of the conventional wisdom on personal digital security obsolete. For years, the primary advice given to at-risk individuals has been to practice good digital hygiene: do not click on suspicious links, verify sender identities, and be wary of unsolicited attachments. However, when an attack can be initiated simply by an ad loading in a background app, user vigilance becomes a largely ineffective defense. No amount of caution can prevent an infection that requires no interaction. This reality exposes the inadequacy of placing the burden of security solely on the end-user, who cannot reasonably be expected to defend against state-level offensive cyber capabilities.

This paradigm shift necessitates a reallocation of responsibility toward the powerful corporate and state actors who build and govern our digital infrastructure. The new front line in the fight against mercenary spyware is not the individual user but the boardrooms of technology companies, advertising networks, and the halls of government regulators. Companies like Apple and Google must continue to invest heavily in platform hardening to make exploits more difficult and expensive to develop. Simultaneously, the ad-tech industry must address the systemic vulnerabilities in its ecosystem that allow for malicious actors to inject exploits into the ad supply chain. The opaque and automated nature of programmatic advertising, once seen as a model of efficiency, now presents a significant national and international security risk.

Ultimately, containing the proliferation of tools like Predator required a comprehensive framework for accountability. This included the implementation of robust international regulations governing the sale and transfer of surveillance technology, similar to controls placed on physical weaponry. It also meant establishing clear legal liability for spyware vendors who fail to prevent the misuse of their products, especially when evidence suggests they had direct oversight of their clients’ operations. The revelations about Predator served as a stark reminder that digital security is a collective responsibility. Without decisive action from lawmakers and a concerted effort by the technology industry to secure its platforms, the threat of invisible, unstoppable surveillance would only continue to grow, eroding privacy and endangering human rights around the globe.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later