This spyware program watches and listens to everything you do on your mobile phone without your knowledge.
Spyware and other security threats can compromise your devices, including your mobile phone. This type of malware can access your personal information and spy on you. In this article, we'll talk about the Predator spyware, which can activate the microphone and camera on iOS without the user's knowledge.
This discovery was made by Jamf security researchers, as detailed in a post on February 19. They claim that the Predator malware conceals recording indicators on iOS, allowing attackers to record with the camera or microphone without the user's knowledge.
According to reports, this malware does not exploit any of iOS's existing security vulnerabilities. Instead, it uses pre-existing kernel access to compromise system indicators. It is worth noting that Apple specifically added these indicators to alert users if they are being spied upon. These indicators are displayed in the status bar as a green or orange dot, depending on whether the camera or microphone is active.
Intelexa, a US government-approved cyber-surveillance consortium, developed the Predator spyware. It spread through attacks that targeted previously unknown vulnerabilities in the Apple and Google Chrome operating systems, as well as clickless infection mechanisms. However, it was unclear how this mechanism would conceal the use of a microphone or camera.
Jamf has documented that the Predator malware hides indicators in iOS 14 by calling a single hook function ('HiddenDot::setupHook()') in SpringBoard. This function is triggered whenever sensor activity changes, such as when the camera or microphone is turned on. Predator intercepts this function, ensuring that the hidden dot never appears.
All of this implies that the spyware's activity is hidden from the victim, which is a major issue because it prevents them from interacting. Therefore, it is essential to prevent this malware from operating in the first place.
How to protect yourself
Security threats of this type can infect your device in multiple ways. For example, if you download applications from unofficial sources, download a malicious file from a dangerous website, or click on a link sent via email or social media, etc.
It's essential to use common sense and not make things easy for hackers. Make sure you only install genuine software from official sources, and carefully examine any file you download from the internet.
Furthermore, having good security software is crucial. It helps you detect and eliminate threats that could affect your privacy and system performance. It's also essential to keep your device updated to the latest available versions.
You can also activate isolation mode on iOS by following these steps:
Go to Settings → Privacy and Security.
Scroll down and select the insulation mode.
Click on Power and Restart.
This feature greatly restricts attack methods and limits functions such as iMessage attachments or wired communications, but it provides the highest level of security available on iPhones.
In short, beware of the Predator spyware, which infects iOS systems and can record using the camera or microphone without any signal. It's crucial to thoroughly check everything and not grant attackers easy access.

