Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Predator spyware disables iOS camera and microphone indicators | Kaspersky official blog

0
Medium
Vulnerabilityios
Published: Fri Mar 20 2026 (03/20/2026, 11:17:42 UTC)
Source: Kaspersky Security Blog

Description

Intellexa's Predator spyware for iOS can covertly disable the system's camera and microphone recording indicators, allowing undetected surveillance on infected devices. It achieves this by intercepting and blocking the communication between the system component that detects camera/microphone usage and the SpringBoard process responsible for displaying the indicators. Predator is typically delivered via sophisticated infection chains involving browser and OS exploits or man-in-the-middle attacks at the service provider level. While the spyware is expensive and mainly used in high-stakes espionage, its ability to bypass iOS's privacy safeguards poses a significant risk to targeted individuals. Defending against such threats requires vigilance against phishing links, regular OS updates, device reboots, and use of security solutions. The threat primarily affects iOS users globally, with higher risk in countries with strategic espionage interests or known targeting by advanced spyware. Given the stealthy nature and potential for serious privacy breaches, the threat severity is assessed as high.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/21/2026, 00:45:42 UTC

Technical Analysis

Predator spyware, developed by Intellexa (a Cyprus-based company with ties to former intelligence personnel), is a sophisticated surveillance tool targeting iOS devices. It is part of a two-stage malware system, with the initial infection delivered by Alien or other delivery mechanisms such as Mars and Jupiter, which can exploit browser and OS vulnerabilities or perform man-in-the-middle attacks at the service provider level. Once installed, Predator can record audio and video from the device's microphone and camera. Since iOS 14, Apple devices display green and orange dots to indicate active camera and microphone usage, managed by the SpringBoard process. Predator bypasses these indicators by intercepting the communication between the internal system component that detects camera/microphone activity and SpringBoard, exploiting Objective-C's dynamic features to block the activation signals. This prevents SpringBoard from displaying the recording indicators, enabling covert surveillance. Earlier attempts to hide indicators at the display stage were abandoned due to complexity and unreliability. The spyware's infection vector typically involves phishing links leading to exploit chains, with additional infection methods at the network level. Predator is expensive and primarily used in targeted espionage rather than mass attacks. Defenses include avoiding suspicious links, keeping software updated, rebooting devices to disrupt infections, and deploying security solutions. The research highlights the advanced techniques used to undermine iOS privacy protections and the challenges in detecting such spyware.

Potential Impact

The ability of Predator spyware to disable iOS camera and microphone indicators severely undermines user privacy and device security. Victims can be monitored without any visible signs, enabling espionage, corporate spying, or personal surveillance with high stealth. For organizations, especially those with high-value personnel or sensitive information, this threat can lead to significant data breaches, intellectual property theft, and compromise of confidential communications. The spyware's use of sophisticated infection vectors and network-level attacks increases the difficulty of detection and mitigation. Although the threat is currently targeted and expensive, its presence signals a high level of risk for governments, activists, journalists, and executives worldwide. The stealthy nature of the spyware complicates incident response and forensic analysis, potentially allowing prolonged undetected access. The impact extends beyond individual privacy to national security and corporate espionage, particularly in geopolitically sensitive regions.

Mitigation Recommendations

Mitigation against Predator spyware requires a multi-layered approach tailored to its advanced capabilities: 1) Implement strict user training to avoid clicking on suspicious links, especially from unknown or untrusted sources, as initial infection often relies on phishing. 2) Maintain up-to-date iOS versions and all installed applications to reduce exposure to known vulnerabilities exploited by the malware's delivery chain. 3) Regularly reboot iOS devices to disrupt persistent infections, as Predator requires reinfection after a restart. 4) Deploy advanced mobile threat defense (MTD) solutions capable of detecting anomalous behaviors or known indicators of compromise related to Predator and its delivery mechanisms. 5) Monitor network traffic for signs of man-in-the-middle attacks or unusual connections that could indicate infection vectors like Mars or Jupiter systems. 6) Employ device management policies restricting installation of untrusted profiles or enterprise certificates that could facilitate spyware installation. 7) For high-risk targets, consider hardware-based security features and isolation techniques to limit spyware capabilities. 8) Conduct regular security audits and forensic analysis on devices suspected of compromise. 9) Collaborate with cybersecurity intelligence providers to stay informed about emerging spyware variants and indicators. These measures go beyond generic advice by focusing on the specific infection vectors, persistence mechanisms, and stealth techniques used by Predator.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/predator-spyware-ios-recording-indicator-bypass/55463/","fetched":true,"fetchedAt":"2026-03-21T00:45:31.068Z","wordCount":1638}

Threat ID: 69bdea2bf4197a8e3b3b6143

Added to database: 3/21/2026, 12:45:31 AM

Last enriched: 3/21/2026, 12:45:42 AM

Last updated: 3/21/2026, 12:45:48 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses