A report published on February 24, 2026, details a new, highly evasive technique employed by the Predator spyware, which is developed and sold by the commercial surveillance vendor Intellexa. The research shows that Predator can completely bypass the privacy indicators on Apple's iOS. These indicators (an orange dot for microphone use and a green dot for camera use) are a fundamental privacy feature designed to alert users to sensor activity. By intercepting and manipulating a core graphical interface process, Predator can prevent these dots from ever appearing, allowing the spyware to record audio and video from an infected iPhone without providing any visual cue to the victim. This capability marks a significant advancement in spyware stealth and poses a serious threat to targeted individuals like journalists, activists, and dissidents.
Predator is a sophisticated piece of commercial spyware sold to government and law enforcement agencies. Like NSO Group's Pegasus, it is typically used to target specific individuals for surveillance. The discovery of its ability to disable privacy indicators demonstrates the high level of resources and technical skill invested in its development.
The attack targets a core trust component of the iOS operating system. Users are trained to look for the green and orange dots as a sign of sensor activity. By subverting this mechanism, Predator makes the user's own senses an unreliable method of detecting compromise.
The mechanism for disabling the privacy indicators is both elegant and powerful:
T1456 - Drive-by Compromise).T1055 - Process Injection): The core of the technique involves injecting code into SpringBoard. SpringBoard is the core iOS process that manages the home screen and other user interface elements. Predator reportedly uses a single 'hook' to intercept the function call responsible for displaying the camera and microphone indicators.T1429 - Audio Capture & T1125 - Video Capture): With the indicators disabled, the spyware can freely capture audio and video and exfiltrate it to its C2 server.The impact of this capability is profound for high-risk individuals targeted by this spyware. It completely erodes the trust between the user and their device. A journalist conducting a sensitive interview or a human rights activist meeting with a source could have their conversations secretly recorded, believing their device to be secure. This has a chilling effect on free speech, journalism, and political dissent. For Apple, it represents a significant security and privacy challenge, forcing them to find new ways to harden these core OS components against tampering by highly privileged malware.
Detecting such a deeply embedded and stealthy piece of spyware is extremely difficult for the average user.
SpringBoard have not been tampered with. D3FEND's D3-TBI - TPM Boot Integrity is the conceptual equivalent for mobile devices.For most users, standard security hygiene is the best defense.
D3-SU - Software Update.Promptly install all iOS updates from Apple, as they contain patches for the vulnerabilities exploited by spyware.
Apple's OS architecture sandboxes applications, but Predator bypasses this through privilege escalation. Hardening this sandbox is a key vendor-side mitigation.
For high-risk users, enabling Apple's Lockdown Mode disables features commonly used in exploit chains, reducing the attack surface.
The primary defense against sophisticated spyware like Predator is to minimize the attack surface by keeping the device's operating system fully updated. The exploits used to deliver and execute the spyware rely on vulnerabilities, often zero-days, in iOS. Apple continuously works to patch these flaws. By enabling automatic updates or manually applying them the moment they are released, users close the security holes that Predator needs to function. While a determined attacker might use a fresh zero-day, most large-scale campaigns rely on exploits for which patches are already available. This is the most effective action any iPhone user can take to protect themselves.
For users at high risk of being targeted by Predator (journalists, activists, etc.), Apple's Lockdown Mode is a critical hardening measure. This feature is a direct implementation of Application Configuration Hardening. It dramatically reduces the device's attack surface by disabling features commonly targeted by spyware exploits. This includes blocking most message attachment types, disabling complex web technologies like just-in-time (JIT) JavaScript compilation, and preventing the installation of configuration profiles. By proactively turning off these high-risk features, Lockdown Mode makes it significantly more difficult for the initial exploit to succeed, providing a powerful layer of protection against zero-click and one-click attacks.
To counter Predator's ability to modify core OS processes like SpringBoard, Apple can leverage hardware-based integrity checks using the iPhone's Secure Enclave, which functions similarly to a TPM. During boot and at runtime, the Secure Enclave can verify the cryptographic signatures of critical system processes. If the signature of SpringBoard does not match Apple's official signature (indicating it has been tampered with or hooked by Predator), the system can either refuse to boot, terminate the process, or enter a safe mode and alert the user. This hardware-rooted trust model makes it much harder for even highly privileged malware to operate with stealth, as it cannot modify protected processes without breaking the chain of trust.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats