Friday, March 01 2024
Scattered Clouds
35.96°F New York

1 € = $ 1.0848
1 $ = € 0.9218

Predator spyware scandal: Police raided the home of a female suspect

 predator spyware
Officers from the police’s cybercrime division have raided the home of a female suspect connected to the Predator spyware scandal. The suspect, who was not named, was reportedly an employee and shareholder of Intellexa, the Athens-based company that sells the tracking software.
The raids have been ordered by the prosecutor responsible for investigating the tapping and attempted tapping of telephones belonging to politicians, journalists, high-profile businesspeople and others.
During the search, officers seized computers and hard disks that will be sent to the Criminal Investigation Department for further investigation.
The exact date of the operation, which took place at a home in the southern Athens suburb of Glyfada, was not disclosed. It was the 12th such operation in the case.
What is the Predator?
Predator spyware is a phone hacking software believed to be developed by Cytrox, based in Skopje, North Macedonia.
Predator shares similar features with Pegasus spyware. Once on your phone, Predator can access every message, call, photo, and password and has the ability to hide apps it doesn’t want you to find. Predator can add a certificate authority (CA) to your phone, tricking your device into trusting malicious apps and websites. It also can open the phone’s camera and microphone, turning it into a surveillance tool.
Sold as a commercial surveillance-for-hire tool, it is reported that governments worldwide are customers of Cytrox’s spyware. Predator is used to surveil political opponents and government critics.
By exploiting zero-day vulnerabilities, malicious actors could install Predator on their target’s phones. It’s executed by sending a link via email or text, directing the target to a domain that downloads malware before directing again to a legitimate page.
How to check if your device is infected with the Predator spyware
- Spyware like Predator can make itself hard to find on your devices, but you can look for signs of a spyware infection. These include:
- Your device is experiencing a decrease in performance. Spyware can cause your device to slow down as it increases the consumption of your device’s resources.
- A barrage of pop-up windows. Spyware is often packaged with adware. Your device is likely infected if you receive a barrage of unexpected pop-up advertisements.
- New programs and features appear at random. You notice apps, browser toolbars, and search engines you don’t recognize.
- Difficulty accessing secure sites. If you get directed to a login page after your login attempt, it may mean your first attempt was on a spoofed site that communicates your password to a third party. Always check the browser link of the page you intend to visit is the correct one.
- Unexplained increase in data usage. If you’ve found that your data usage has increased sharply on your latest phone bill, chances are there’s a malicious code or program sending data from your phone to unknown servers.
- Your antivirus isn’t working properly. Spyware can search for cybersecurity tools like antivirus software and try to block them to evade detection and removal.
How to protect yourself from the Predator spyware
To protect yourself from Predator spyware and other computer viruses, you should stay ahead of cybercriminals by keeping up with cybersecurity best practices.
- Use the full range of cybersecurity and network tools. Tools like an antivirus program, firewalls, ad blockers, anti-tracking browser extensions, and a VPN are your line of defense against cyberattacks, including spyware.
- Use genuine antivirus software. Antivirus from a trusted provider will alert you to threats, swiftly quarantine malware, and remove it from your computer.
Never root or jailbreak your devices. Spyware usually requires a phone to be rooted or jailbroken for it to work. If your phone is rooted or jailbroken, undoing it could render spyware like Predator useless.
- Keep your devices up to date. Declining software updates increase the risks of zero-day exploits. Keeping your devices updated ensures that all known bugs are squashed and cannot be exploited.
- Don’t download files or open links from unknown sources. If you’re unsure of a link’s destination or the source of an email attachment, it’s best not to click on them.
- Use Safe Mode to remove spyware. On Android phones, Safe Mode is your best bet to remove spyware completely. Safe Mode prevents spyware from activating on boot and blocks it from networks it can use to reinstall itself.