Global Corporate Web
This analysis explores the corporate structure and operations of Intellexa, a mercenary spyware vendor. It reveals new companies likely tied to Intellexa's network, particularly within a Czech cluster, and examines their roles in product shipment and potential infection vectors. The report traces Intellexa's activities across multiple countries, including new evidence of Predator spyware deployment in Iraq. It highlights the challenges in tracking such operations due to complex corporate structures and evolving techniques. The analysis also discusses broader trends in the spyware ecosystem, including geopolitical fragmentation, persistent facilitators, and expanding targeting beyond traditional victims to include corporate leaders.
AI Analysis
Technical Summary
This threat analysis centers on Intellexa, a mercenary spyware vendor known for its Predator spyware product. Intellexa operates through a complex global corporate web, including newly uncovered companies clustered in the Czech Republic, which appear to play roles in product shipment and infection vector facilitation. The spyware is delivered through sophisticated infection methods, notably ad-based infection campaigns (MITRE ATT&CK T1566.002), and infrastructure deployment tactics (T1583.001, T1583.003, T1583.004), as well as exploitation of software vulnerabilities (T1203). The Predator spyware has been confirmed deployed in Iraq and likely other countries, indicating a broad operational footprint. Intellexa’s corporate structure complicates attribution and tracking, leveraging multiple shell companies and infrastructure domains such as badinigroup.com, birura.com, gardalul.com, and keep-badinigroups.com, alongside IP 5.253.43.92. The spyware ecosystem is undergoing geopolitical fragmentation, with persistent facilitators enabling ongoing operations and expanding targeting beyond traditional political or activist victims to include corporate executives and leaders. This evolution increases the risk profile for corporate espionage and data exfiltration. The threat does not currently have known exploits in the wild but remains a significant espionage risk due to its stealthy infection vectors and targeting scope.
Potential Impact
For European organizations, the Intellexa spyware threat presents a significant risk to confidentiality and integrity of sensitive corporate data and communications. The targeting of corporate leaders and executives suggests potential for high-impact espionage, intellectual property theft, and strategic information compromise. The complex infection vectors, including ad-based campaigns, increase the likelihood of successful infiltration, especially in organizations with less mature security awareness or ad filtering. The presence of a Czech cluster in Intellexa’s corporate network raises concerns for organizations in Central Europe, potentially increasing regional targeting or collateral risk. The geopolitical fragmentation of spyware operations means European entities may face increased targeting as part of broader intelligence or mercenary operations. The threat could disrupt business operations, damage reputations, and lead to regulatory and compliance consequences under GDPR if personal or corporate data is exfiltrated.
Mitigation Recommendations
European organizations should implement targeted threat intelligence integration to detect and block known Intellexa infrastructure indicators such as the listed domains and IP addresses. Deploy advanced ad-blocking and web filtering solutions to reduce exposure to ad-based infection vectors. Enhance email security with phishing detection and user training focused on recognizing sophisticated social engineering tactics (T1566.002). Conduct regular network traffic analysis to identify anomalous communications with suspicious domains or IPs linked to Intellexa. Employ endpoint detection and response (EDR) tools capable of detecting exploitation attempts (T1203) and lateral movement. Collaborate with regional cybersecurity information sharing organizations to stay updated on evolving Intellexa tactics and infrastructure changes. Given the complex corporate structures, legal and compliance teams should monitor for suspicious business relationships or shipments that could facilitate spyware deployment. Finally, enforce strict access controls and multi-factor authentication for high-value targets such as corporate leaders to limit potential compromise impact.
Affected Countries
Czech Republic, Germany, France, United Kingdom, Poland, Italy
Indicators of Compromise
- ip: 5.253.43.92
- domain: badinigroup.com
- domain: birura.com
- domain: gardalul.com
- domain: keep-badinigroups.com
Global Corporate Web
Description
This analysis explores the corporate structure and operations of Intellexa, a mercenary spyware vendor. It reveals new companies likely tied to Intellexa's network, particularly within a Czech cluster, and examines their roles in product shipment and potential infection vectors. The report traces Intellexa's activities across multiple countries, including new evidence of Predator spyware deployment in Iraq. It highlights the challenges in tracking such operations due to complex corporate structures and evolving techniques. The analysis also discusses broader trends in the spyware ecosystem, including geopolitical fragmentation, persistent facilitators, and expanding targeting beyond traditional victims to include corporate leaders.
AI-Powered Analysis
Technical Analysis
This threat analysis centers on Intellexa, a mercenary spyware vendor known for its Predator spyware product. Intellexa operates through a complex global corporate web, including newly uncovered companies clustered in the Czech Republic, which appear to play roles in product shipment and infection vector facilitation. The spyware is delivered through sophisticated infection methods, notably ad-based infection campaigns (MITRE ATT&CK T1566.002), and infrastructure deployment tactics (T1583.001, T1583.003, T1583.004), as well as exploitation of software vulnerabilities (T1203). The Predator spyware has been confirmed deployed in Iraq and likely other countries, indicating a broad operational footprint. Intellexa’s corporate structure complicates attribution and tracking, leveraging multiple shell companies and infrastructure domains such as badinigroup.com, birura.com, gardalul.com, and keep-badinigroups.com, alongside IP 5.253.43.92. The spyware ecosystem is undergoing geopolitical fragmentation, with persistent facilitators enabling ongoing operations and expanding targeting beyond traditional political or activist victims to include corporate executives and leaders. This evolution increases the risk profile for corporate espionage and data exfiltration. The threat does not currently have known exploits in the wild but remains a significant espionage risk due to its stealthy infection vectors and targeting scope.
Potential Impact
For European organizations, the Intellexa spyware threat presents a significant risk to confidentiality and integrity of sensitive corporate data and communications. The targeting of corporate leaders and executives suggests potential for high-impact espionage, intellectual property theft, and strategic information compromise. The complex infection vectors, including ad-based campaigns, increase the likelihood of successful infiltration, especially in organizations with less mature security awareness or ad filtering. The presence of a Czech cluster in Intellexa’s corporate network raises concerns for organizations in Central Europe, potentially increasing regional targeting or collateral risk. The geopolitical fragmentation of spyware operations means European entities may face increased targeting as part of broader intelligence or mercenary operations. The threat could disrupt business operations, damage reputations, and lead to regulatory and compliance consequences under GDPR if personal or corporate data is exfiltrated.
Mitigation Recommendations
European organizations should implement targeted threat intelligence integration to detect and block known Intellexa infrastructure indicators such as the listed domains and IP addresses. Deploy advanced ad-blocking and web filtering solutions to reduce exposure to ad-based infection vectors. Enhance email security with phishing detection and user training focused on recognizing sophisticated social engineering tactics (T1566.002). Conduct regular network traffic analysis to identify anomalous communications with suspicious domains or IPs linked to Intellexa. Employ endpoint detection and response (EDR) tools capable of detecting exploitation attempts (T1203) and lateral movement. Collaborate with regional cybersecurity information sharing organizations to stay updated on evolving Intellexa tactics and infrastructure changes. Given the complex corporate structures, legal and compliance teams should monitor for suspicious business relationships or shipments that could facilitate spyware deployment. Finally, enforce strict access controls and multi-factor authentication for high-value targets such as corporate leaders to limit potential compromise impact.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.recordedfuture.com/research/intellexas-global-corporate-web"]
- Adversary
- Intellexa
- Pulse Id
- 69314232f6063212ebbd030f
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip5.253.43.92 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainbadinigroup.com | — | |
domainbirura.com | — | |
domaingardalul.com | — | |
domainkeep-badinigroups.com | — |
Threat ID: 69316f2803f8574ee0f61229
Added to database: 12/4/2025, 11:23:20 AM
Last enriched: 12/4/2025, 11:34:57 AM
Last updated: 1/18/2026, 12:12:03 PM
Views: 123
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-01-17
MediumLOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing
MediumGootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection
MediumThreatFox IOCs for 2026-01-16
MediumThreatFox IOCs for 2026-01-15
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.