{"id":226522,"date":"2025-12-05T00:26:56","date_gmt":"2025-12-05T06:26:56","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/12\/predator-spyware-uses-new-infection-vector-for-zero-click-attacks"},"modified":"2025-12-05T00:26:56","modified_gmt":"2025-12-05T06:26:56","slug":"predator-spyware-uses-new-infection-vector-for-zero-click-attacks","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/12\/predator-spyware-uses-new-infection-vector-for-zero-click-attacks","title":{"rendered":"Predator spyware uses new infection vector for zero-click attacks"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/predator-spyware-uses-new-infection-vector-for-zero-click-attacks2.jpg\"><\/a><\/p>\n<p>The Predator spyware from surveillance company Intellexa has been using a zero-click infection mechanism dubbed \u201cAladdin,\u201d which compromised specific targets by simply viewing a malicious advertisement.<\/p>\n<p>This powerful and previously unknown infection vector is meticulously hidden behind shell companies spread across multiple countries, now uncovered in a new joint investigation by <a href=\"https:\/\/insidestory.gr\/article\/intellexa-leaks-nea-thymata-toy-predator-para-tis-amerikanikes-kyroseis?token=VvhXd6gD6X\" target=\"_blank\" rel=\"nofollow noopener\">Inside Story<\/a>, <a href=\"https:\/\/www.haaretz.com\/israel-news\/security-aviation\/2025-12-03\/ty-article-magazine\/.premium\/israeli-spyware-firm-intellexa-owned-by-ex-intel-officer-still-active-amid-us-sanctions\/0000019a-e3e8-db35-afbf-ebfcb8bb0000\" target=\"_blank\" rel=\"nofollow noopener\">Haaretz<\/a>, and <a href=\"https:\/\/www.inside-it.ch\/intellexa-leaks-beruechtigte-spionagefirma-weiterhin-aktiv-20251203\" target=\"_blank\" rel=\"nofollow noopener\">WAV Research Collective<\/a>.<\/p>\n<p>The investigation is based on \u2018Intellexa Leaks\u2019 \u2014 a collection of leaked internal company documents and marketing material, and is corroborated by technical research from forensic and security experts at Amnesty International, Google, and Recorded Future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Predator spyware from surveillance company Intellexa has been using a zero-click infection mechanism dubbed \u201cAladdin,\u201d which compromised specific targets by simply viewing a malicious advertisement. This powerful and previously unknown infection vector is meticulously hidden behind shell companies spread across multiple countries, now uncovered in a new joint investigation by Inside Story, Haaretz, and [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,1511],"tags":[],"class_list":["post-226522","post","type-post","status-publish","format-standard","hentry","category-military","category-surveillance"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/226522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=226522"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/226522\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=226522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=226522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=226522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}