Cyber Threat Report: 'Predator Spyware Operators Rebuild Multi-Tier Infrastructure to Target Mobile Devices'

Report Author Recorded Future
Publication Date 2024-03-01
Original Reporting Source
Related Threat Actors Intellexa
Victim Sectors Non Profit

This report from Recorded Future's Insikt Group describes recent TTPs and infrastructure used for the deployment of the Predator spyware. Predator is a sophisticated and invasive spyware product designed for mobile devices, sold by the Intellexa alliance to government customers for counterterrorism and law enforcement purposes. Predator has been used to target civil society groups, such as journalists, activists, and politicians, in various countries, raising ethical and legal concerns. The report outlines the use of a multi-tiered network architecture to deliver spyware to target devices, using spoofed domains, upstream servers, and customer infrastructure. In this report, Insikt Group identify new Predator delivery servers and domains, as well as likely Predator customers in at least eleven countries, some of which were previously unknown.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques

ATT&CK ID Title Associated Tactics
T1583.003 Virtual Private Server Resource Development
T1583.001 Domains Resource Development
T1583.004 Server Resource Development
T1566.002 Spearphishing Link Initial Access
T1203 Exploitation for Client Execution Execution