Predator Spyware Exploits Zero-Click Infection Vector via Malicious Ads
Summary
Hide ▲
Show ▼
Predator spyware, developed by Intellexa, has been using a zero-click infection mechanism called Aladdin, which infects targets by displaying malicious advertisements. This vector is hidden behind shell companies across multiple countries and leverages the commercial mobile advertising system to deliver malware. The spyware is still operational and actively developed, with additional delivery vectors like Triton targeting Samsung Exynos devices. The infection occurs when a target views a malicious ad, which triggers a redirection to Intellexa’s exploit delivery servers. The ads are served through a complex network of advertising firms, making defense measures challenging. Despite sanctions and investigations, including fines from the Greek Data Protection Authority, Intellexa remains active and prolific in zero-day exploitation. Recent leaks reveal that Intellexa's Predator spyware has been marketed under various names, including Helios, Nova, Green Arrow, and Red Arrow. The spyware exploits multiple zero-day vulnerabilities in Android and iOS devices, and uses frameworks like JSKit for native code execution. Intellexa also has the capability to remotely access the surveillance systems of its customers using TeamViewer. The spyware collects extensive data from targeted devices, including messaging apps, calls, emails, device locations, screenshots, passwords, and other on-device information.
Timeline
-
05.12.2025 13:47 1 articles · 23h ago
Intellexa Targets Human Rights Lawyer in Pakistan
A human rights lawyer from Pakistan's Balochistan province received a suspicious WhatsApp link, marking the first time a civil society member in the country was targeted by Intellexa's Predator spyware. The link was identified as a Predator attack attempt based on the technical behavior of the infection server and specific characteristics of the one-time infection link.
Show sources
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
04.12.2025 22:47 3 articles · 1d ago
Predator Spyware Uses Zero-Click Infection Vector via Malicious Ads
Predator spyware, developed by Intellexa, has been using a zero-click infection mechanism called Aladdin, which infects targets by displaying malicious advertisements. The infection occurs when a target views the ad, triggering a redirection to Intellexa’s exploit delivery servers. The ads are served through a complex network of advertising firms across multiple countries. Another delivery vector, Triton, targets Samsung Exynos devices with baseband exploits, forcing 2G downgrades for infection. Intellexa remains active and prolific in zero-day exploitation despite sanctions and investigations, including fines from the Greek Data Protection Authority. Recent leaks reveal that Intellexa's Predator spyware has been marketed under various names, including Helios, Nova, Green Arrow, and Red Arrow. The spyware exploits multiple zero-day vulnerabilities in Android and iOS devices, and uses frameworks like JSKit for native code execution. Intellexa also has the capability to remotely access the surveillance systems of its customers using TeamViewer. The spyware collects extensive data from targeted devices, including messaging apps, calls, emails, device locations, screenshots, passwords, and other on-device information.
Show sources
- Predator spyware uses new infection vector for zero-click attacks — www.bleepingcomputer.com — 04.12.2025 22:47
- Predator Spyware Maker Intellexa Evades Sanctions, New Victims Identified — www.infosecurity-magazine.com — 05.12.2025 11:15
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
Information Snippets
-
Aladdin is a zero-click infection mechanism used by Predator spyware, which infects targets by displaying malicious advertisements.
First reported: 04.12.2025 22:473 sources, 3 articlesShow sources
- Predator spyware uses new infection vector for zero-click attacks — www.bleepingcomputer.com — 04.12.2025 22:47
- Predator Spyware Maker Intellexa Evades Sanctions, New Victims Identified — www.infosecurity-magazine.com — 05.12.2025 11:15
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
The malicious ads are served through a network of advertising firms across multiple countries, including Ireland, Germany, Switzerland, Greece, Cyprus, the UAE, and Hungary.
First reported: 04.12.2025 22:473 sources, 3 articlesShow sources
- Predator spyware uses new infection vector for zero-click attacks — www.bleepingcomputer.com — 04.12.2025 22:47
- Predator Spyware Maker Intellexa Evades Sanctions, New Victims Identified — www.infosecurity-magazine.com — 05.12.2025 11:15
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
The infection occurs when a target views the ad, triggering a redirection to Intellexa’s exploit delivery servers.
First reported: 04.12.2025 22:473 sources, 3 articlesShow sources
- Predator spyware uses new infection vector for zero-click attacks — www.bleepingcomputer.com — 04.12.2025 22:47
- Predator Spyware Maker Intellexa Evades Sanctions, New Victims Identified — www.infosecurity-magazine.com — 05.12.2025 11:15
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
Another delivery vector, Triton, targets Samsung Exynos devices with baseband exploits, forcing 2G downgrades for infection.
First reported: 04.12.2025 22:473 sources, 3 articlesShow sources
- Predator spyware uses new infection vector for zero-click attacks — www.bleepingcomputer.com — 04.12.2025 22:47
- Predator Spyware Maker Intellexa Evades Sanctions, New Victims Identified — www.infosecurity-magazine.com — 05.12.2025 11:15
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
Intellexa is responsible for 15 out of 70 cases of zero-day exploitation documented by Google’s TAG since 2021.
First reported: 04.12.2025 22:473 sources, 3 articlesShow sources
- Predator spyware uses new infection vector for zero-click attacks — www.bleepingcomputer.com — 04.12.2025 22:47
- Predator Spyware Maker Intellexa Evades Sanctions, New Victims Identified — www.infosecurity-magazine.com — 05.12.2025 11:15
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
Intellexa develops its own exploits and purchases exploit chains from external entities to cover a full spectrum of targeting.
First reported: 04.12.2025 22:472 sources, 2 articlesShow sources
- Predator spyware uses new infection vector for zero-click attacks — www.bleepingcomputer.com — 04.12.2025 22:47
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
Intellexa has been fined by the Greek Data Protection Authority in 2023 for failing to comply with investigations.
First reported: 05.12.2025 11:151 source, 1 articleShow sources
- Predator Spyware Maker Intellexa Evades Sanctions, New Victims Identified — www.infosecurity-magazine.com — 05.12.2025 11:15
-
Intellexa's spyware products are still thriving despite extensive US sanctions.
First reported: 05.12.2025 11:152 sources, 2 articlesShow sources
- Predator Spyware Maker Intellexa Evades Sanctions, New Victims Identified — www.infosecurity-magazine.com — 05.12.2025 11:15
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
Intellexa's spyware, Predator, is sometimes marketed as Helios, Nova, Green Arrow, or Red Arrow.
First reported: 05.12.2025 11:152 sources, 2 articlesShow sources
- Predator Spyware Maker Intellexa Evades Sanctions, New Victims Identified — www.infosecurity-magazine.com — 05.12.2025 11:15
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
A human rights lawyer from Pakistan's Balochistan province was targeted by Intellexa's Predator spyware via a suspicious WhatsApp link.
First reported: 05.12.2025 13:471 source, 1 articleShow sources
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
Intellexa's Predator spyware has been marketed as Helios, Nova, Green Arrow, and Red Arrow.
First reported: 05.12.2025 13:471 source, 1 articleShow sources
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
Intellexa uses various initial access vectors, including messaging platforms, to deliver Predator spyware via zero-click or 1-click approaches.
First reported: 05.12.2025 13:471 source, 1 articleShow sources
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
Predator spyware exploits multiple zero-day vulnerabilities in Android and iOS devices, including CVE-2025-48543, CVE-2025-6554, CVE-2023-41993, and others.
First reported: 05.12.2025 13:471 source, 1 articleShow sources
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
The JSKit framework is used by Intellexa to perform native code execution on iOS devices.
First reported: 05.12.2025 13:471 source, 1 articleShow sources
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
Predator spyware collects data from messaging apps, calls, emails, device locations, screenshots, passwords, and other on-device information.
First reported: 05.12.2025 13:471 source, 1 articleShow sources
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
Intellexa has the capability to remotely access the surveillance systems of its customers using TeamViewer.
First reported: 05.12.2025 13:471 source, 1 articleShow sources
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
Intellexa uses strategic vectors like Mars, Jupiter, and Aladdin for delivering Predator spyware.
First reported: 05.12.2025 13:471 source, 1 articleShow sources
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
The Aladdin system exploits the mobile advertising ecosystem to carry out zero-click attacks.
First reported: 05.12.2025 13:471 source, 1 articleShow sources
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
-
Companies like Pulse Advertise and MorningStar TEC are likely tied to the Aladdin infection vector.
First reported: 05.12.2025 13:471 source, 1 articleShow sources
- Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery — thehackernews.com — 05.12.2025 13:47
Similar Happenings
Active Spyware Campaigns Targeting High-Value Signal and WhatsApp Users
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert warning of active spyware campaigns targeting high-value Signal and WhatsApp users. These campaigns leverage sophisticated social engineering and zero-click exploits to compromise mobile devices and exfiltrate sensitive data. The targets include government officials, military personnel, political figures, and civil society organizations across the U.S., Middle East, and Europe. CISA has identified multiple campaigns, including the hijacking of Signal accounts via linked devices, Android spyware campaigns like ProSpy and ToSpy, and the exploitation of iOS and WhatsApp vulnerabilities to target fewer than 200 users. The agency recommends several best practices to mitigate these threats.
Sturnus Android Malware Targets Encrypted Messaging Apps and Banking Credentials
Sturnus, a new Android banking trojan, steals messages from encrypted apps like Signal, WhatsApp, and Telegram by capturing screen content post-decryption. It performs full device takeover via VNC and overlays to steal banking credentials. The malware is under development but fully functional, targeting European financial institutions with region-specific overlays. It uses a mix of encryption methods for C2 communication and abuses Accessibility services for extensive control. The malware is disguised as legitimate apps like Google Chrome or Preemix Box, but distribution methods remain unknown. It establishes encrypted channels for commands and data exfiltration, and gains Device Administrator privileges to prevent removal. ThreatFabric reports low-volume attacks in Southern and Central Europe, suggesting testing for larger campaigns. New details reveal Sturnus uses WebSocket and HTTP channels for communication, displays full-screen overlays mimicking OS updates, and collects extensive device data for continuous feedback.
Landfall Android Spyware Exploits Samsung Zero-Day via WhatsApp
The Landfall Android spyware targeted Samsung devices through a zero-day vulnerability (CVE-2025-21042) in a Samsung image processing library. The exploit was delivered via a malicious DNG image sent through WhatsApp, affecting Samsung Galaxy S22, S23, S24, Z Fold4, and Z Flip4 phones. The spyware enables microphone recording, location tracking, and data exfiltration. The attacks have been ongoing since at least July 2024, and the vulnerability was patched by Samsung in April. The threat actor, tracked as CL-UNK-1054, remains unidentified, with potential links to the Stealth Falcon group and other surveillance vendors. The attacks primarily targeted individuals in the Middle East and North Africa. The exploit involved a zero-click approach, and the malicious DNG files contained an embedded ZIP file with a shared object library to run the spyware. The spyware manipulated the device's SELinux policy to gain elevated permissions and facilitate persistence, and communicated with a command-and-control (C2) server over HTTPS for beaconing and receiving next-stage payloads. The spyware can fingerprint devices based on hardware and SIM IDs and targets a broad range of Samsung’s latest flagship models, excluding the latest S25 series devices. Unit 42 identified six C2 servers linked to the LandFall campaign, with some flagged by Turkey’s CERT. C2 domain registration and infrastructure patterns share similarities with those seen in Stealth Falcon operations, originating from the United Arab Emirates. CISA has added CVE-2025-21042 to its Known Exploited Vulnerabilities catalog, ordering federal agencies to patch within three weeks.
AI-Powered Malware Families Deployed in the Wild
Google's Threat Intelligence Group (GTIG) has identified new malware families that leverage artificial intelligence (AI) and large language models (LLMs) for dynamic self-modification during execution. These malware families, including PromptFlux, PromptSteal, FruitShell, QuietVault, and PromptLock, demonstrate advanced capabilities for evading detection and maintaining persistence. PromptFlux, an experimental VBScript dropper, uses Google's LLM Gemini to generate obfuscated VBScript variants and evade antivirus software. It attempts persistence via Startup folder entries and spreads laterally on removable drives and mapped network shares. The malware is under development or testing phase and is assessed to be financially motivated. PromptSteal is a data miner written in Python that queries the LLM Qwen2.5-Coder-32B-Instruct to generate one-line Windows commands to collect information and documents in specific folders and send the data to a command-and-control (C2) server. It is used by the Russian state-sponsored actor APT28 in attacks targeting Ukraine. The use of AI in malware enables adversaries to create more versatile and adaptive threats, posing significant challenges for cybersecurity defenses. Various threat actors, including those from China, Iran, and North Korea, have been observed abusing AI models like Gemini across different stages of the attack lifecycle. The underground market for AI-powered cybercrime tools is also growing, with offerings ranging from deepfake generation to malware development and vulnerability exploitation.
Memento Labs linked to Chrome zero-day exploitation in Operation ForumTroll
Operation ForumTroll, discovered in March 2025, targeted Russian organizations using a zero-day vulnerability in Google Chrome (CVE-2025-2783). The campaign, also tracked as TaxOff/Team 46 by Positive Technologies and Prosperous Werewolf by BI.ZONE, delivered malware linked to the Italian spyware vendor Memento Labs. The attacks used phishing emails with malicious links to infect victims, targeting media outlets, universities, research centers, government organizations, financial institutions, and other organizations in Russia and Belarus. The malware, identified as LeetAgent and Dante, was used to steal data and maintain persistence on compromised systems. Memento Labs, formed after InTheCyber Group acquired Hacking Team, presented its Dante spyware at a conference in 2023. The malware was used in attacks dating back to at least 2022. The attacks involved sophisticated techniques to ensure only targeted victims were compromised. The zero-day vulnerability (CVE-2025-2783) was discovered and reported to Google by researchers at Kaspersky Lab earlier in 2025. The exploit bypassed Chrome's sandbox protections by exploiting a logic vulnerability in Chrome caused by an obscure quirk in the Windows OS. The exploit used pseudo handles to disable sandbox functionality, allowing unauthorized access to privileged processes. The exploit represents a new class of vulnerabilities that could affect other applications and Windows services. The group known as Mem3nt0 mori, also referred to as ForumTroll APT, is linked to Operation ForumTroll. The attacks began in March 2025 with highly personalized phishing emails inviting victims to the Primakov Readings forum. The flaw in Chrome stemmed from a logical oversight in Windows' handling of pseudo handles, allowing attackers to execute code in Chrome's browser process. Google patched the issue in version 134.0.6998.177/.178. Firefox developers found a related issue in their browser, addressed as CVE-2025-2857. Kaspersky's researchers concluded that Mem3nt0 mori leveraged Dante-based components in the ForumTroll campaign, marking the first observed use of this commercial spyware in the wild. The discovery underscores ongoing risks from state-aligned and commercial surveillance vendors. Kaspersky urged security researchers to examine other software and Windows services for similar pseudo-handle vulnerabilities.