Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 849

Predator Spyware (Intellexa)

What is Predator Spyware (Intellexa)?

Predator Spyware (Intellexa)Commercial mobile spyware developed by Cytrox and marketed by the Intellexa consortium, used by government customers against journalists, opposition politicians, and civil society on iOS and Android.


Predator is delivered through one-click links and zero-click exploit chains, sometimes paired with network-injection devices reportedly using Sandvine middleboxes to redirect targets to exploit servers. Citizen Lab and Amnesty Security Lab have documented infections of European politicians, US-based journalists, and exiled activists; Reuters and Haaretz have reported on Intellexa's operations and clients. Apple and Google patched several Predator-linked vulnerabilities in 2023, including iOS CVE-2023-41991/41992/41993 and Chrome CVE-2023-4762. The U.S. Treasury sanctioned Intellexa-related entities and individuals in 2024, citing the spyware's role in targeting U.S. officials and dissidents.

Examples

  1. 01

    Citizen Lab documented Predator delivered through SMS one-click links to political figures and journalists.

  2. 02

    Apple shipped iOS 16.7 / 17.0.1 to close zero-days used in an Intellexa Predator chain in September 2023.

Frequently asked questions

What is Predator Spyware (Intellexa)?

Commercial mobile spyware developed by Cytrox and marketed by the Intellexa consortium, used by government customers against journalists, opposition politicians, and civil society on iOS and Android. It belongs to the Mobile Security category of cybersecurity.

What does Predator Spyware (Intellexa) mean?

Commercial mobile spyware developed by Cytrox and marketed by the Intellexa consortium, used by government customers against journalists, opposition politicians, and civil society on iOS and Android.

How does Predator Spyware (Intellexa) work?

Predator is delivered through one-click links and zero-click exploit chains, sometimes paired with network-injection devices reportedly using Sandvine middleboxes to redirect targets to exploit servers. Citizen Lab and Amnesty Security Lab have documented infections of European politicians, US-based journalists, and exiled activists; Reuters and Haaretz have reported on Intellexa's operations and clients. Apple and Google patched several Predator-linked vulnerabilities in 2023, including iOS CVE-2023-41991/41992/41993 and Chrome CVE-2023-4762. The U.S. Treasury sanctioned Intellexa-related entities and individuals in 2024, citing the spyware's role in targeting U.S. officials and dissidents.

How do you defend against Predator Spyware (Intellexa)?

Defences for Predator Spyware (Intellexa) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Predator Spyware (Intellexa)?

Common alternative names include: Predator, Cytrox Predator.

Related terms