Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Intellexa Faces Scrutiny Over Predator Spyware Remote Access Capabilities
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Technology

Intellexa Faces Scrutiny Over Predator Spyware Remote Access Capabilities

Highlights

  • Intellexa can remotely access customer Predator spyware according to leaked videos.

  • Evidence suggests malware was spread via malicious ads and spoofed news sites.

  • Company founder rejects wrongdoing and states intent to defend his reputation.

Kaan Demirel
Last updated: 5 December, 2025 - 1:49 am 1:49 am
Kaan Demirel 3 weeks ago
Share
SHARE

Contents
What Do the Internal Training Videos Reveal?How Were Victims Targeted Using the Predator Spyware?What Has Been Intellexa’s Response and Ongoing Operations?

Allegations surfaced this week that Intellexa, the company behind the Predator spyware, retained the ability to remotely access clients’ surveillance systems, according to a series of investigative reports and research by Amnesty International, Google, and Recorded Future. The revelations put the spotlight on the broader debate around accountability in the commercial spyware industry, with evidence suggesting global reach and previously undisclosed intrusion methods. Public attention escalated as fresh details outlined how Predator’s deployment techniques exploited digital advertising, while questions surfaced about the company’s oversight and legal exposure in cases of rights abuses. The controversy comes at a time when regulatory pressure is mounting worldwide, and countries are reassessing the responsibility of software vendors whose products become tools for surveillance.

Previously published analyses centered mainly on Predator’s technical abilities and countries of operation, highlighting infections in high-profile cases but offering limited insight into the internal oversight mechanisms of Intellexa. Recent investigations now detail potential remote access retained by the vendor even after deployment, deepening the concern over client autonomy and independent operation of surveillance technology. Continuous research points to a growing sophistication in spyware delivery, with prior reports stopping short of identifying the extensive infrastructure or newly revealed infection vectors, such as malicious advertising. The addition of human rights context and explicit company responses gives current coverage a more multidimensional perspective on corporate accountability.

What Do the Internal Training Videos Reveal?

Internal training materials reportedly uncovered that Intellexa maintained remote access to Predator spyware customer environments even after implementation. Investigators found evidence that company staff could review specific surveillance campaigns and identify targeted individuals. This capability raises ongoing concerns over data privacy and the independence of those purchasing and using Predator.

“The fact that, at least in some cases, Intellexa appears to have retained the capability to remotely access Predator customer logs – allowing company staff to see details of surveillance operations and targeted individuals – raises questions about its own human rights due diligence processes,”

stated Jurre van Bergen of Amnesty International’s Security Lab.

How Were Victims Targeted Using the Predator Spyware?

The investigation revealed “Aladdin,” a newly exposed infection method leveraging malicious mobile advertising to deliver the Predator spyware to targeted devices. Reports also confirmed use of Predator domains that mimicked reputable Kazakhstani news outlets and linked Predator infections to high-profile individuals in Egypt, Greece, and Pakistan. Evidence traced the first reported Predator attack in Pakistan to a human rights lawyer, suggesting geographical expansion and diversified targeting strategies by Intellexa and its linked entities.

What Has Been Intellexa’s Response and Ongoing Operations?

Intellexa’s founder, Tal Dilian, through a legal representative, disputed the allegations and criticized the motives of investigative groups and media involvement.

“I categorically reject any attempt to link me to events in Greece or to the media campaign surrounding them. I protect my rights and will continue pursuing legal action against those who defame me.”

Meanwhile, other security researchers mapped out a web of individuals associated with corporate, technical, and infrastructure roles supporting Intellexa’s global activities. Google also addressed Predator’s advanced use of zero-day vulnerabilities, noting their persistent challenge in combating sophisticated attacks tied to the spyware.

The new findings on Intellexa’s possible retention of remote access into customers’ Predator installations heighten worries about supplier responsibility and oversight in the commercial spyware arena. Retaining such capabilities could mean spyware providers have means to audit or adjust customer activity, complicating the legal and ethical landscape in which these tools operate. Readers following developments in digital surveillance should pay close attention to insights from civil society institutions, as calls for preventative regulation and transparent due diligence intensify. Being informed about the infection vectors, the type of clients targeted, and the supplier’s own monitoring power helps stakeholders—ranging from policy makers to enterprise IT leaders—comprehend operational risks, legal exposures, and the importance of establishing firmer checks on such technology providers moving forward.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Embedded Payments Streamline Commerce and Reshape Customer Expectations

ServiceNow Moves to Acquire Armis in $7.75 Billion Deal

NIST and MITRE Launch $20 Million AI Cybersecurity Centers

AI Voice Cloning Targets U.S. Officials in Persistent Impersonation Scams

Health Insurers and Providers Intensify AI Battle Over Medical Coding

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Developers Expand Slay the Spire 2 with New Features
Next Article Eidos Montreal Reduces Workforce as Project Cancellations Continue

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Users Weigh Best RAM Choices for Work and Gaming PCs
Computing
Tesla Pushes FSD v14.2.2.1 as Rainy LA Puts AI to Test
Electric Vehicle
PC Builders Gather as BYORAM Event Draws Tech Enthusiasts
Computing
Disney Integrates OpenAI’s Sora to Streamline Content Creation
AI
Apple Watch Ultra 2 Draws Attention With Substantial Price Drop
Wearables
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?