Research: Predator spyware can turn off Apple indicators showing when microphone, camera are in use

Spyware linked to the surveillance of politicians and activists around the world can block iOS camera and microphone recording indicators, overcoming a key Apple security feature, according to new research published Wednesday.

Starting with iOS 14, Apple has shown users a green dot to indicate an app is accessing their camera and an orange dot indicating the same for device microphones.

The new research from Jamf Threat Labs demonstrates how Predator spyware can stay hidden on targeted phones by “intercepting sensor activity” to hide the indicators.

Predator spyware has powerful “zero-click” capabilities and can infect phones with no engagement from the device owner. In July 2023, the U.S. Commerce Department placed its parent company Intellexa on its Entity List, a designation used to limit business activities by companies believed to pose risks to national security.

In December, Recorded Future’s Insikt Group published research showing that while use of Predator appears to have slowed, it is still active in some countries, including “likely” in Pakistan. Researchers also surfaced evidence of Intellexa operators in Mongolia, Angola, Saudi Arabia and Kazakhstan. The Record is an editorially independent unit of Recorded Future.

The capability to turn off indicators effectively blocks users from detecting spyware, keeping Predator stealth and enabling operators to spy on people through their microphones and cameras without their knowledge.

“A single interception point defeats both the green camera dot AND orange microphone dot simultaneously,” the report says. “The actual suppression mechanism is elegantly simple.” 

Legitimate applications cannot turn off the indicators, which are shown in the status bar.

“Rather than simulating device shutdown, [Predator] selectively suppresses only the recording indicators while the device remains fully operational,” the report says. “This is more subtle — the user’s phone works normally, but they receive no visual warning that surveillance is occurring.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering digital privacy, surveillance technologies and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

Next Post

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

Related Posts

Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access

A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild, according to Patchstack. The vulnerability, tracked as CVE-2026-23550 (CVSS score: 10.0), has been described as a case of unauthenticated privilege escalation impacting all versions of the plugin prior to and including 2.5.1. It has been patched in version 2.5.2. The plugin
Read More

Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices

Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of social engineering and WhatsApp hijacking to distribute a Delphi-based banking trojan named Eternidade Stealer as part of attacks targeting users in Brazil. "It uses Internet Message Access Protocol (IMAP) to dynamically retrieve command-and-control (C2) addresses, allowing the threat actor to
Read More

Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time

Modern security teams often feel like they’re driving through fog with failing headlights. Threats accelerate, alerts multiply, and SOCs struggle to understand which dangers matter right now for their business. Breaking out of reactive defense is no longer optional. It’s the difference between preventing incidents and cleaning up after them. Below is the path from reactive firefighting to a
Read More