Research: Predator spyware can turn off Apple indicators showing when microphone, camera are in use

Spyware linked to the surveillance of politicians and activists around the world can block iOS camera and microphone recording indicators, overcoming a key Apple security feature, according to new research published Wednesday.

Starting with iOS 14, Apple has shown users a green dot to indicate an app is accessing their camera and an orange dot indicating the same for device microphones.

The new research from Jamf Threat Labs demonstrates how Predator spyware can stay hidden on targeted phones by “intercepting sensor activity” to hide the indicators.

Predator spyware has powerful “zero-click” capabilities and can infect phones with no engagement from the device owner. In July 2023, the U.S. Commerce Department placed its parent company Intellexa on its Entity List, a designation used to limit business activities by companies believed to pose risks to national security.

In December, Recorded Future’s Insikt Group published research showing that while use of Predator appears to have slowed, it is still active in some countries, including “likely” in Pakistan. Researchers also surfaced evidence of Intellexa operators in Mongolia, Angola, Saudi Arabia and Kazakhstan. The Record is an editorially independent unit of Recorded Future.

The capability to turn off indicators effectively blocks users from detecting spyware, keeping Predator stealth and enabling operators to spy on people through their microphones and cameras without their knowledge.

“A single interception point defeats both the green camera dot AND orange microphone dot simultaneously,” the report says. “The actual suppression mechanism is elegantly simple.” 

Legitimate applications cannot turn off the indicators, which are shown in the status bar.

“Rather than simulating device shutdown, [Predator] selectively suppresses only the recording indicators while the device remains fully operational,” the report says. “This is more subtle — the user’s phone works normally, but they receive no visual warning that surveillance is occurring.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering digital privacy, surveillance technologies and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

Related Posts

Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers

The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2) nodes associated with the AISURU/Kimwolf botnet since early October 2025. AISURU and its Android counterpart, Kimwolf, have emerged as some of the biggest botnets in recent times, capable of directing enslaved devices to participate in distributed denial-of-service (DDoS)
Read More

Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas

A critical security flaw has been disclosed in Grist‑Core, an open-source, self-hosted version of the Grist relational spreadsheet-database, that could result in remote code execution. The vulnerability, tracked as CVE-2026-24002 (CVSS score: 9.1), has been codenamed Cellbreak by Cyera Research Labs. "One malicious formula can turn a spreadsheet into a Remote Code Execution (RCE) beachhead,"
Read More