Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Intellexa Leak Exposes Predator Zero Days

December 5, 2025
Reading Time: 3 mins read
in Alerts
Intellexa Leak Exposes Predator Zero Days

A new report by Amnesty International and several media partners has revealed that a human rights lawyer in Pakistan’s Balochistan province was the apparent target of an attempted infection by Predator spyware. The attack was initiated through a suspicious link received on WhatsApp from an unknown number. Amnesty International has technically characterized the link as a “Predator attack attempt” because its technical behavior and specific characteristics were consistent with Predator’s previously observed “1-click infection links.” This marks the first known time a civil society member in Pakistan has been targeted by Intellexa’s powerful spyware. In response, Pakistan has publicly rejected the claims, stating that the allegations are without any basis.

The investigation’s findings are the result of a joint effort, published in collaboration with Israeli newspaper Haaretz, Greek news site Inside Story, and Swiss tech site Inside IT. The report is primarily based on a significant trove of leaked materials from the company, including internal documentation, sales and marketing literature, and training videos. These leaked documents provide rare insight into the clandestine operations and offerings of the mercenary surveillance firm.

Intellexa is the developer behind Predator, a powerful mercenary spyware tool designed to covertly and without the user’s knowledge harvest sensitive data from both Android and iOS mobile devices. It operates similarly to other high-profile spyware, such as the NSO Group’s Pegasus. The documents indicate that Predator has also been marketed to potential buyers under several other code names, including Helios, Nova, Green Arrow, and Red Arrow.

Predator attacks often exploit vulnerabilities, known as zero-days, in platforms like messaging apps to stealthily install the spyware. These exploits can be deployed via a zero-click method (requiring no action from the target) or, as in the lawyer’s case, a 1-click approach, where the victim must open a malicious link to trigger the infection. If the target clicks the booby-trapped link, an exploit for either Google Chrome (on Android) or Apple Safari (on iOS) is loaded. This exploit gains the initial necessary access to the device and then downloads the main spyware payload.

Data from Google’s Threat Intelligence Group (GTIG) has connected Intellexa to the exploitation of numerous zero-day flaws, suggesting the company either develops them internally or purchases them from external brokers. These exploits target critical components, including the Android Runtime, the V8 JavaScript engine in Chrome, and various parts of the iOS kernel and security framework. One specific iOS zero-day exploit chain used against targets in Egypt in 2023 leveraged CVE-2023-41993 and a framework called JSKit for native code execution. GTIG also observed this exact exploit and framework being used by Russian government-backed hackers in an attack against Mongolian government websites, which raises the possibility that the sophisticated exploits are being sourced from a common third-party entity.

Reference:

  • Intellexa Leak Reveals Zero Days And Ads Based Method Used For Predator Spyware Delivery
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityDecember 2025
ADVERTISEMENT

Related Posts

Intellexa Leak Exposes Predator Zero Days

Silver Fox Spreads ValleyRAT In China

December 5, 2025
Hackers Exploit ArrayOS AG VPN Flaw

Hackers Exploit ArrayOS AG VPN Flaw

December 5, 2025
WordPress Elementor Addon Flaw Exploited

Record DDoS Linked To Massive Botnet

December 4, 2025
WordPress Elementor Addon Flaw Exploited

RSC Bugs Let Hackers Run Remote Code Now

December 4, 2025
WordPress Elementor Addon Flaw Exploited

WordPress Elementor Addon Flaw Exploited

December 4, 2025
Illuminate Must Delete Student Data

Lazarus APT Remote Worker Scheme Caught

December 3, 2025

Latest Alerts

Silver Fox Spreads ValleyRAT In China

Intellexa Leak Exposes Predator Zero Days

Hackers Exploit ArrayOS AG VPN Flaw

Record DDoS Linked To Massive Botnet

RSC Bugs Let Hackers Run Remote Code Now

WordPress Elementor Addon Flaw Exploited

Subscribe to our newsletter

    Latest Incidents

    ASUS Confirms Vendor Breach By Everest

    Marquis Breach Hits Over 780,000 People

    Leroy Merlin Reports Data Breach

    Freedom Mobile Customer Data Breach Exposed

    Penn Phoenix Data Breach Oracle Hack Now

    Defender Outage Disrupts Threat Alerting

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial