Researchers find Predator spyware is being used in several countries, including Iraq

Use of spyware from a developer sanctioned by the U.S. last year appears to have slowed in 2025, though it is possible that changes in domain naming conventions may be masking increased activity by making it harder for experts to detect infrastructure, according to new research.

New evidence suggests that the company, Intellexa, is also currently being deployed in Iraq, according to the report from Recorded Future’s Insikt Group. The Record is an editorially independent unit of Recorded Future.

Researchers also found indicators “likely associated” with the use of Predator spyware by an entity tied to Pakistan. It is unclear if this activity involved targets within or tied to Pakistan or if a customer was operating from inside Pakistan, the report says. 

Intellexa manufactures Predator spyware, which has been used against members of civil society and business executives worldwide. Three former Intellexa executives are currently on trial in Greece, where scores of victims of Predator spying are located.

Researchers found evidence of Intellexa customers currently operating in Saudi Arabia, Kazakhstan, Angola and Mongolia, the report said. Meanwhile, the report said, it appears that customers in Egypt, Botswana and Trinidad and Tobago have “ceased communication” as of this spring and summer.

That could indicate customers are no longer using Intellexa in those countries or that they changed their infrastructure setups, the report said.

A Mozambique-linked cluster discovered by Insikt earlier this year remained operative until at least late June 2025, the report says.

The report builds on earlier research Insikt released on Intellexa in June — the spyware maker has changed its infrastructure setups as a result of increased scrutiny in recent years, making detection more difficult. 

Researchers also found several new companies believed to be tied to Intellexa, which like other spyware vendors has long obfuscated its activities by hiding operations inside shell companies and complex webs of interconnected firms.

At least one of the newly-detected companies appears to be charged with shipping Intellexa products to clients, the report says. Two other newly-identified companies are believed to be in the advertising sector and may be connected to a known threat vector which uses ads to deliver spyware.

Two more companies linked to Intellexa were found in Kazakhstan and the Philippines, the report says. The findings indicate an “expanding network footprint,” according to the report.

In July 2023, the Commerce Department placed Intellexa on its Entity List, which identifies organizations or individuals believed to pose risks to the national security or foreign policy interests of the United States.

In March 2024, Commerce sanctioned company founder Tal Jonathan Dilian, a former Israeli intelligence officer. Six months later, five more people and one entity linked to Intellexa were also sanctioned.

Senior administration officials told reporters at the time that more action was needed to target the company’s “opaque web of corporate entities, which are designed to avoid accountability.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories

Next Post

Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China

Related Posts

CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting WatchGuard Fireware to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-9242 (CVSS score: 9.3), an out-of-bounds write vulnerability affecting Fireware OS 11.10.2 up to and including
Read More

Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike

A suspected cyber espionage activity cluster that was previously found targeting global government and private sector organizations spanning Africa, Asia, North America, South America, and Oceania has been assessed to be a Chinese state-sponsored threat actor. Recorded Future, which was tracking the activity under the moniker TAG-100, has now graduated it to a hacking group dubbed RedNovember.
Read More

When Browsers Become the Attack Surface: Rethinking Security for Scattered Spider

As enterprises continue to shift their operations to the browser, security teams face a growing set of cyber challenges. In fact, over 80% of security incidents now originate from web applications accessed via Chrome, Edge, Firefox, and other browsers. One particularly fast-evolving adversary, Scattered Spider, has made it their mission to wreak havoc on enterprises by specifically targeting
Read More