Emerging Predator Spyware Technique Enables Zero-Click Compromise

 

Intellexa is one of the most controversial and persistent players in the shadowy world of commercial cyber-espionage, even though mounting scrutiny, international sanctions, and ongoing investigations have led to increased scrutiny and investigation. 
Although it is best known for its flagship surveillance solution, the Predator spyware suite, the consortium has demonstrated that it can operate beyond the scope of regulatory control on a number of occasions.

An investigation conducted by more than one party, supported by confidential internal records, leaked sales decks, training materials, and other sensitive corporate documents verified by Amnesty International, shows that Intellexa continues to conduct business at a high level, and has even expanded its activities. 

A vendor has been aggressively pursuing government and corporate clients for years, and the findings indicate the vendor is still leveraging a pipeline of high-value vulnerabilities to do so.

There is one striking feature of the company: its continued reliance on zero-day exploits targeted at mobile browsers. This is reflected in the recent analysis published by Google’s Threat Analysis Group, which recently identified fifteen new zero-day exploits related to Predator deployments. 

Intellexa, according to the investigators, routinely purchases unidentified bugs from independent hackers, weaponizes them in covert operations, and throws them a

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article: