Recent leaks have uncovered the inner workings of Intellexa, an Israeli-linked company behind the powerful Predator spyware. This tool has targeted journalists, activists, and others worldwide, raising alarms about privacy invasions and human rights violations in 2025.
Major Leaks Reveal Spyware Operations
A joint investigation by Amnesty International and other groups has exposed leaked documents, videos, and marketing materials from Intellexa. These files show how the company sells advanced surveillance tech to governments, often used against critics and dissidents.
The leaks, published in early December 2025, highlight Predator’s role in attacks on devices in countries like Pakistan, Egypt, and Saudi Arabia. Researchers found evidence of zero-click exploits, where spyware installs without user action. This method uses flaws in phone software to gain access quietly.
One key discovery involves ad-based infections. Users get hit just by viewing online ads, turning everyday browsing into a risk. The investigation also uncovered training videos showing Intellexa staff accessing live customer systems, viewing victim data in real time.
Experts say these revelations build on past scandals, like the Pegasus spyware case. They point to a growing industry of mercenary spyware that evades detection and exploits global tech vulnerabilities.
How Predator Spyware Invades Devices
Predator spyware stands out for its sneaky tactics. It breaks into smartphones to steal data from cameras, microphones, messages, and more. Once inside, it hides its tracks to avoid alerting users.
The tool uses one-click and zero-click methods. In one-click attacks, victims open a fake link, often disguised as news or job offers. Zero-click versions infect through ads or system weaknesses, needing no interaction.
Here are some key features of Predator spyware:
- Access to encrypted chats on apps like WhatsApp and Signal.
- Real-time tracking of GPS locations and browsing history.
- Ability to record audio and capture photos without notice.
- Self-destruct mode if detection seems likely.
To deliver spyware, Intellexa exploits ad networks. Leaked files show they create fake companies to place malicious ads on trusted sites. This approach has infected hundreds of devices, according to Google reports from December 2025.
The spyware routes stolen data through anonymous servers. This makes tracing hard, protecting both the company and its clients from scrutiny.
Security firms note that Predator evolves quickly. Updates in 2025 include better evasion of antivirus tools and integration with telecom systems for wider reach.
Global Targets and Human Rights Concerns
Predator has hit targets in at least a dozen countries, focusing on civil society. In Pakistan, a lawyer’s phone was infected via a WhatsApp link in 2025, marking the first confirmed case there.
Other nations include Angola, Kazakhstan, Uzbekistan, and Iraq. Activists, journalists, and politicians face risks, with spyware used to silence opposition.
| Country | Known Targets | Infection Methods |
|---|---|---|
| Pakistan | Lawyers, Politicians | WhatsApp links, Ads |
| Egypt | Journalists, Activists | Zero-click exploits |
| Saudi Arabia | Dissidents | Malicious websites |
| Kazakhstan | Youth Activists | Fake news domains |
| Iraq | Civil Society Members | Ad-based delivery |
Human rights groups report abuses, such as tracking protesters or harassing critics. In Saudi Arabia, evidence links Predator to ongoing surveillance despite international sanctions.
These cases show a pattern of misuse by authoritarian regimes. The leaks confirm Intellexa knows about some operations, raising questions about their role in violations.
Israeli Ties and Ongoing Sanctions
Intellexa was founded by Tal Dilian, a former Israeli intelligence officer. Many staff come from Israel’s military tech units, tying the company to the nation’s cyber industry.
Despite U.S. sanctions in 2024, operations continue. The Treasury targeted Dilian and related firms for enabling abuses, but leaks show activity into 2025.
Israel’s tech sector boosts such tools, with government support for exports. Critics argue this creates a market for unchecked surveillance, harming global privacy.
Recent reports indicate clients in Egypt and Saudi Arabia remain active. This defies bans and highlights weak enforcement in the spyware trade.
Broader Implications for Digital Security
The Intellexa scandal underscores risks in the digital ad ecosystem. Spyware firms exploit it to target users, calling for better regulations from tech giants.
Experts warn of a spyware arms race. Multiple companies develop similar tools, threatening free speech and privacy worldwide.
In 2025, this ties to trends like rising cyber threats and debates over encryption. Events such as data breaches at major firms amplify fears of unchecked surveillance.
To protect yourself, update devices regularly and use secure apps. Avoid suspicious links and consider ad blockers to reduce risks.
What Happens Next in the Spyware Battle
Investigations continue, with calls for stronger laws against mercenary spyware. Groups like Amnesty push for global bans on such sales.
The leaks may lead to lawsuits and further sanctions. They expose how tech can enable repression, urging action from governments and companies.
Share your thoughts on this spyware threat in the comments below. If this article helped you understand the risks, pass it along to friends and stay informed on digital privacy issues.








