Categorie: News

iPhone at risk, Predator spyware can render itself invisible

Apple devices have long enjoyed a solid reputation for security and user privacy, however the recent findings by researchers at the software company Jamf paint a decidedly alarming picture.

The commercial spyware Predator, developed by the surveillance company Intellexa (currently sanctioned by U.S. authorities), has proven capable of bypassing one of the most well-known visual alert mechanisms in Apple’s operating systems.

Predator spyware, here’s how it renders itself invisible to the user

Starting with iOS 14, the California-based company introduced visual indicators on the status bar, a green dot for the camera and an orange one for the microphone, designed precisely to signal at a glance the activation of the sensors.

The malicious software in question manages to completely hide these indicators, covertly transmitting audio and video streams to its operators without raising the slightest suspicion.

This particular capability does not derive from exploiting an as-yet-unknown vulnerability in the operating system to conceal the interface, but rather from using a deeper system privileges access, previously obtained through other flaws or extremely sophisticated infection mechanisms that do not require any interaction from the victim.

Security experts have thoroughly analyzed malware samples to understand the complex logic behind this invisibility. The technique is based on a specific software hooking function, inserted inside SpringBoard, the essential component that manages the home screen and the user interface of Apple’s mobile devices.

The malicious code intercepts any variation in sensor activity even before the information can travel to the level of the interface visible on screen. Specifically, the malware invalidates the object responsible for communicating status updates.

By making the data target appear null, the operating system silently ignores calls that would otherwise turn on the warning lights. Since this single element aggregates all sensor communications, its invisible manipulation simultaneously turns off both the camera alert and the microphone alert.

During investigations, researchers also identified portions of deprecated code, a sign of previous attempts to directly disable the visual indicator manager, a path presumably discarded in favor of this far more stealthy and effective structural approach.

Advanced techniques to evade detection

The malware’s action is not limited to direct control of traditional hardware, but also extends to call recordings made over Internet protocols.

The VoIP spying module does not possess its own independent system to suppress alerts, therefore it relies entirely on the main concealment function to maintain absolute secrecy of operations.

Regarding camera access, this is granted by a separate component that identifies internal instructions using advanced techniques of code recognition and redirection of authentication pointers, in order to bypass the strict permission checks imposed by iOS.

With the essential status bar indicators removed, the phone user remains completely unaware of the deep surveillance underway.

Only a thorough technical investigation of the device logs can reveal signs of infection, bringing to light anomalous processes in the system, writes to audio files in unusual paths, or unwarranted memory mappings that impair the normal operation of the terminal.

Luca Zaninello

Appassionato del mondo della telefonia da sempre, da oltre un decennio si occupa di provare con mano i prodotti e di raccontare le sue esperienze al pubblico del web. Fotografo amatoriale, ha un occhio di riguardo per i cameraphone più esagerati.

Recent Posts

100 countries can hack your smartphone, UK government confirms

More than half of the world's governments today have at their disposal sophisticated commercial spyware…

9 hours ago

OnePlus Watch 4 is official with Wear OS and titanium case

A few hours after OPPO's event (which saw the launch of a slew of novelties…

9 hours ago

Amazon Tech Week: 7 days of deals across smartphones, tablets, PCs and more!

The period from April 22 to April 28 is dedicated to the best tech products…

10 hours ago

Motorola Edge 70 Pro Official: 144 Hz display, larger battery and many improvements

After the debut of Edge 70 and Edge 70 Fusion, it is time to say…

11 hours ago

DJI Mic 3 is a real gem for creators, now at an unbeatable price!

Lightness and versatility, without sacrificing professional performance: these are the characteristics of DJI Mic 3,…

14 hours ago

ASUS set to return to the tablet market with a competitor to the iPad Pro

The latest rumors reveal that the Taiwanese company is developing a high-end product named ASUS…

14 hours ago