Intellexa Leaks Unveil Zero-Day Exploits and Ad-Based Delivery Methods for Predator Spyware
Recent disclosures have shed light on the operations of Intellexa, a commercial spyware vendor, revealing their use of zero-day vulnerabilities and innovative delivery methods to deploy their flagship spyware, Predator. These revelations underscore the evolving landscape of cyber surveillance and the persistent threats posed by sophisticated spyware tools.
Targeting Human Rights Advocates
A notable incident involved a human rights lawyer from Pakistan’s Balochistan province who received a suspicious link via WhatsApp from an unknown number. This marked the first documented attempt to target a civil society member in Pakistan using Intellexa’s Predator spyware. Amnesty International identified the link as a Predator attack attempt, based on the technical behavior of the infection server and specific characteristics of the one-time infection link consistent with previously observed Predator 1-click links. The Pakistani government has dismissed these allegations, stating there is no truth to them.
Insights from Leaked Documents
A collaborative investigation by Amnesty International, Haaretz, Inside Story, and Inside IT, based on leaked internal documents, sales materials, and training videos from Intellexa, has provided deeper insights into the company’s operations. Intellexa’s Predator spyware, also marketed under names like Helios, Nova, Green Arrow, and Red Arrow, is designed to covertly infiltrate Android and iOS devices, enabling unauthorized access to sensitive data without the user’s knowledge.
Exploitation of Zero-Day Vulnerabilities
Intellexa’s approach often involves exploiting zero-day vulnerabilities—previously unknown software flaws—to gain initial access to target devices. These exploits are either developed in-house or acquired from external sources. According to data from Google’s Threat Intelligence Group (GTIG), Intellexa has been linked to the exploitation of several zero-day vulnerabilities, including:
– CVE-2025-48543: Use-after-free in Android Runtime (Google)
– CVE-2025-6554: Type confusion in V8 (Google Chrome)
– CVE-2023-41993: WebKit JIT RCE (Apple Safari)
– CVE-2023-41992: Kernel IPC Use-After-Free (Apple)
– CVE-2023-41991: Certificate validation bypass in Security framework (Apple)
– CVE-2024-4610: Use-after-free in Bifrost GPU and Valhall GPU Kernel Driver (Arm)
– CVE-2023-4762: Type confusion in V8 (Google Chrome)
– CVE-2023-3079: Type Confusion in V8 (Google Chrome)
– CVE-2023-2136: Integer overflow in Skia (Google Chrome)
– CVE-2023-2033: Use-After-Free in V8 (Google Chrome)
– CVE-2021-38003: Inappropriate implementation in V8 (Google Chrome)
– CVE-2021-38000: Insufficient validation of untrusted input in Intents (Google Chrome)
– CVE-2021-37976: Information leak in memory_instrumentation (Google Chrome)
– CVE-2021-37973: Use-after-free in Portals (Google Chrome)
– CVE-2021-1048: Use-After-Free in Android Kernel (Google)
Innovative Delivery Mechanisms
Intellexa employs various initial access vectors to deploy Predator, including messaging platforms that leverage these zero-day vulnerabilities. The attack methods can be categorized into:
– Zero-Click Attacks: These require no user interaction. The spyware is installed automatically upon receipt of a malicious message or call, exploiting vulnerabilities that allow code execution without user engagement.
– One-Click Attacks: These necessitate the target to click on a malicious link. Once clicked, the link redirects the user to a compromised website that exploits browser vulnerabilities to install the spyware.
A particularly concerning delivery method involves the use of online advertisements. By compromising ad networks or embedding malicious code within ads, attackers can deliver the spyware to a broad audience. When a target clicks on an infected ad, it can trigger the exploitation process, leading to the installation of Predator without the user’s awareness.
Case Study: Exploitation in Egypt
In 2023, an iOS zero-day exploit chain was used against targets in Egypt. This attack leveraged CVE-2023-41993 and a framework named JSKit to execute native code. GTIG observed the same exploit and framework used in a watering hole attack orchestrated by Russian government-backed hackers against Mongolian government websites, suggesting that these exploits may be sourced from third-party vendors.
Global Implications and Responses
The revelations about Intellexa’s activities have significant global implications. The use of commercial spyware by state and non-state actors to target journalists, activists, and political figures poses a serious threat to privacy and human rights. In response, various governments and organizations have taken steps to curb the proliferation of such tools.
In July 2023, the U.S. government added Cytrox and Intellexa, along with their corporate holdings in Hungary, Greece, and Ireland, to the Entity List, effectively blacklisting them for enabling campaigns of repression and other human rights abuses. This move prohibits U.S. companies from transacting with these businesses.
Furthermore, in September 2024, the U.S. Department of Treasury imposed sanctions against five executives and one entity associated with the Intellexa Consortium for their roles in developing, operating, and distributing Predator spyware. The sanctioned individuals include:
– Felix Bitzios: Beneficial owner of an Intellexa Consortium company believed to have supplied Predator to a foreign government client and manager of Intellexa S.A.
– Andrea Nicola Constantino Hermes Gambazzi: Beneficial owner of Thalestris Limited and Intellexa Limited, both members of the Intellexa Consortium.
– Merom Harpaz: Top executive of the Intellexa Consortium and manager of Intellexa S.A.
– Panagiota Karaoli: Director of multiple Intellexa Consortium entities controlled by or subsidiaries of Thalestris Limited.
– Artemis Artemiou: Employee of Intellexa S.A., general manager, and board member of Cytrox Holdings, another member of the Intellexa Consortium.
– Aliada Group Inc.: A British Virgin Islands-based company and member of the Intellexa Consortium that has facilitated tens of millions of dollars in transactions.
The Broader Context of Commercial Spyware
The Intellexa leaks highlight a broader issue within the cybersecurity landscape: the proliferation of commercial spyware and its misuse. Companies like Intellexa, NSO Group, and others have developed sophisticated tools that, while marketed for lawful purposes such as law enforcement and counter-terrorism, have been misused to target dissidents, journalists, and human rights defenders.
The use of zero-day vulnerabilities by these vendors raises ethical and security concerns. By stockpiling and exploiting these vulnerabilities, spyware vendors contribute to a more insecure digital environment. Their activities underscore the need for robust international regulations and oversight to prevent the misuse of surveillance technologies.
Conclusion
The Intellexa leaks provide a rare glimpse into the inner workings of a commercial spyware vendor, revealing the exploitation of zero-day vulnerabilities and innovative delivery methods to deploy Predator spyware. These findings underscore the urgent need for global cooperation to regulate the development and use of surveillance technologies, ensuring they do not infringe upon human rights or compromise digital security.