Categorie: News

iPhone at risk, Predator spyware can render itself invisible

Apple devices have long enjoyed a solid reputation for security and user privacy, however the recent findings by researchers at the software company Jamf paint a decidedly alarming picture.

The commercial spyware Predator, developed by the surveillance company Intellexa (currently sanctioned by U.S. authorities), has proven capable of bypassing one of the most well-known visual alert mechanisms in Apple’s operating systems.

Predator spyware, here’s how it renders itself invisible to the user

Starting with iOS 14, the California-based company introduced visual indicators on the status bar, a green dot for the camera and an orange one for the microphone, designed precisely to signal at a glance the activation of the sensors.

The malicious software in question manages to completely hide these indicators, covertly transmitting audio and video streams to its operators without raising the slightest suspicion.

This particular capability does not derive from exploiting an as-yet-unknown vulnerability in the operating system to conceal the interface, but rather from using a deeper system privileges access, previously obtained through other flaws or extremely sophisticated infection mechanisms that do not require any interaction from the victim.

Security experts have thoroughly analyzed malware samples to understand the complex logic behind this invisibility. The technique is based on a specific software hooking function, inserted inside SpringBoard, the essential component that manages the home screen and the user interface of Apple’s mobile devices.

The malicious code intercepts any variation in sensor activity even before the information can travel to the level of the interface visible on screen. Specifically, the malware invalidates the object responsible for communicating status updates.

By making the data target appear null, the operating system silently ignores calls that would otherwise turn on the warning lights. Since this single element aggregates all sensor communications, its invisible manipulation simultaneously turns off both the camera alert and the microphone alert.

During investigations, researchers also identified portions of deprecated code, a sign of previous attempts to directly disable the visual indicator manager, a path presumably discarded in favor of this far more stealthy and effective structural approach.

Advanced techniques to evade detection

The malware’s action is not limited to direct control of traditional hardware, but also extends to call recordings made over Internet protocols.

The VoIP spying module does not possess its own independent system to suppress alerts, therefore it relies entirely on the main concealment function to maintain absolute secrecy of operations.

Regarding camera access, this is granted by a separate component that identifies internal instructions using advanced techniques of code recognition and redirection of authentication pointers, in order to bypass the strict permission checks imposed by iOS.

With the essential status bar indicators removed, the phone user remains completely unaware of the deep surveillance underway.

Only a thorough technical investigation of the device logs can reveal signs of infection, bringing to light anomalous processes in the system, writes to audio files in unusual paths, or unwarranted memory mappings that impair the normal operation of the terminal.

Luca Zaninello

Appassionato del mondo della telefonia da sempre, da oltre un decennio si occupa di provare con mano i prodotti e di raccontare le sue esperienze al pubblico del web. Fotografo amatoriale, ha un occhio di riguardo per i cameraphone più esagerati.

Recent Posts

Google aims to go head-to-head with WHOOP, Stephen Curry previews the new Fitbit

Google is preparing to introduce a brand-new device for its wearables lineup, entering direct competition…

14 hours ago

vivo X300 Ultra: less battery in Europe, but you won’t be disappointed

Recently Vivo announced its new Camera Phone for the Chinese market, with a major novelty…

15 hours ago

Will Google block Android downgrades with the next Pixel 10 update?

Google seems intent on tightening protection measures related to software on its newer smartphones. According…

15 hours ago

Review Realme Buds Air8: the new benchmark at 50 euros

The market for TWS headphones is now saturated, with fierce competition among brands to offer…

15 hours ago

Nothing beyond the boundaries of smartphones: it will target AI glasses

The company founded by Carl Pei aims to expand its product ecosystem well beyond smartphones.…

15 hours ago

Pixel 11 Pro in render images: the winning design doesn’t change (but can be improved)

A few days after the renders dedicated to the standard model, we are back to…

16 hours ago