The Predator spyware from surveillance company Intellexa has been using a zero-click infection mechanism dubbed "Aladdin," which compromised specific targets by simply viewing a malicious advertisement. This powerful and previously unknown infection vector is meticulously hidden behind shell companies spread across multiple countries, now uncovered in a new joint investigation by Inside Story, Haaretz, and WAV Research Collective. Leaked Intellexa marketing materialSource: Amnesty International
Perhaps the most striking revelation is that people working at Intellexa could allegedly remotely access the surveillance systems of at least some of its customers via TeamViewer, an off-the-shelf tool that allows users to connect to other computers over the internet. The remote access is shown in a leaked training video revealing privileged parts of the Predator spyware system, including its dashboard, as well as the "storage system containing photos, messages and all other surveillance data gathered from victims of the Predator spyware,"