Predator spyware is still active and more difficult to track – here's how to stay safe

Smartphone hacked with data flow in the background
(Image credit: Shutterstock)

After going quiet for a few months amid public exposure and US sanctions, the Predator spyware is back and is even better to evade detection.

This is the worrying revelation coming from experts at Insikt Group as they detect the new infrastructure of the mercenary spyware toll in multiple countries, including in the Democratic Republic of the Congo (DRC) and Angola.

"Predator is far from disappearing," wrote experts. "Recent findings by Insikt Group reveal that Predator's infrastructure is back with modifications to evade detection and anonymize users."

Developed by the Intellexa Alliance – a group of companies among which many are EU-based – Predator spyware is a highly invasive mobile hacking software (for both Android and iPhone) designed to leave minimal traces on affected devices. It uses both one-click and zero-click attack vectors to install itself on targeted phones, taking advantage of browser vulnerabilities and network access. 

Investigations suggest that this sophisticated mercenary spyware, similar to the infamous Pegasus developed by Israeli firm NSO Group, has been largely used by government actors since at least 2019.

Predator is highly dangerous due to its level of intrusiveness. Once the device is infected, the spyware has unrestricted access to the microphone, camera, and all users' data, such as contacts, messages, photos, and videos, without their knowledge.

Did you know?

As the spyware problem keeps getting bigger, a group of civil societies is calling on European regulators for "an EU-wide ban on the production, export, sale, import, acquisition, transfer, servicing and use of spyware."

The latest report found that Predator's operators "significantly enhanced their infrastructure" by adding layers of complexity that make it even more difficult to trace it. The malicious software now has an additional tier in its delivery system which anonymizes customer operations. Put simply, it's now even harder for researchers to identify the countries using Predator and track how its usage spread.

"The re-emergence of Predator spyware is a stark reminder of the growing dangers posed by mercenary spyware," wrote experts. "Public reporting, ongoing research, and stronger regulations are critical in minimizing the damage caused by tools like Predator."

How to protect yourself from Predator spyware

It's true that spyware tools are powerful malware and full protection against them is very difficult. Simply connecting to security software like the best VPN and antivirus apps, for instance, isn't enough to fight back the spyware threat. Yet, there are still some steps you can take to considerably reduce the risk of becoming a target.

As experts pointed out: "[Predator] infrastructure has evolved, making it harder to track and identify users, but with the right cybersecurity practices in place, individuals and organizations can reduce their risk of becoming targets."

Hence, if you are a high-profile individual – like a politician, journalist, activist, or company's executive – you need to be vigilant at all times. Below are Insikt Group's suggested defensive measures you should  take to mitigate the risk of a Predator's attack:

  • Keep your software updated at all times. A piece of advice that never gets old, staying on top of your device updates considerably reduces potential vulnerabilities that Predator might exploit. 
  • Regularly reboot your device. Rebooting your device can also help in disrupting spyware operations, so experts suggest doing that periodically. Bear in mind that a reboot may not be enough to completely eliminate advanced spyware.
  • Enable lockdown mode. Both available on iPhones and Android phones, lockdown mode is a security feature that boosts device protection with stringent controls, such as disabling biometrics access.  
  • Boost your organization's security. If you're looking to protect your workforce, experts suggest implementing a mobile device management (MDM) system while investing in security awareness training to educate employees against online risks.
Chiara Castro
News Editor (Tech Software)

Chiara is a multimedia journalist committed to covering stories to help promote the rights and denounce the abuses of the digital side of life – wherever cybersecurity, markets, and politics tangle up. She writes news, interviews, and analysis on data privacy, online censorship, digital rights, cybercrime, and security software, with a special focus on VPNs, for TechRadar and TechRadar Pro. Got a story, tip-off, or something tech-interesting to say? Reach out to chiara.castro@futurenet.com

Read more
 In this photo illustration a Google Play logo seen displayed on a smartphone.
Why is there so much spyware hidden in the Play Store?
Spyware
Government-linked Italian spyware maker caught distributing malicious Android apps
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Kaspersky Report on Stalkerware
Security flaw in popular stalkerware apps is exposing phone data of millions
Hands typing on a keyboard surrounded by security icons
Infostealers on the rise: the latest concern for organizational defenses
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
Latest in Cyber Security
View on National Assembly building in Paris, France, with French and European flags flying.
France rejects controversial encryption backdoor provision
ignal messaging application President Meredith Whittaker poses for a photograph before an interview at the Europe's largest tech conference, the Web Summit, in Lisbon on November 4, 2022.
"We will not walk back" – Signal would rather leave the UK and Sweden than remove encryption protections
Man uses a laptop in a hotel room
4 ways to avoid misinformation on social media and retain control of your newsfeed
An AI face in profile against a digital background.
Worried about DeepSeek? Well, Google Gemini collects even more of your personal data
Apple
"We will never build a backdoor" – Apple kills its iCloud's end-to-end encryption feature in the UK
DeepSeek
DeepSeek accused of sharing users' data with TikTok's ByteDance in another blow around privacy concerns
Latest in News
Google Gemini Flash 2.0 Images
I tried Gemini's new AI image generation tool - here are 5 ways to get the best art from Google's Flash 2.0
An image of the Samsung Galaxy S25 Ultra from a hands-on event
Samsung Galaxy S26 Ultra could resurrect an intriguing camera feature
Eurocom Raptor X18
At $15,000, this massive 256GB RAM laptop makes Apple's MacBook Pro look affordable, tiny and very, very slow
Cristin Milioti in Black Mirror season 7
Netflix launches trailer for Black Mirror season 7, giving us a look at its first-ever sequel episode and an unexpected returning character
A graphic of the PC Gaming Show
Get ready for a bounty of PC games on June 8, as the PC Gaming show is back
A close up of The Daily podcast from Pocket Casts' web page
‘Podcasting shouldn’t be locked behind walled gardens’: Pocket Casts slams Spotify and makes its web player free to all