{"id":25357,"date":"2026-03-20T15:40:14","date_gmt":"2026-03-20T11:40:14","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=25357"},"modified":"2026-03-27T22:31:06","modified_gmt":"2026-03-27T18:31:06","slug":"predator-spyware-ios-recording-indicator-bypass","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/predator-spyware-ios-recording-indicator-bypass\/25357\/","title":{"rendered":"Predator vs. iPhone: the art of invisible surveillance"},"content":{"rendered":"<p>Cybersecurity researchers have taken a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/predator-spyware-hooks-ios-springboard-to-hide-mic-camera-activity\/\" target=\"_blank\" rel=\"noopener nofollow\">close look<\/a> at the inner workings of the Predator spyware, developed by the Cyprus-based company Intellexa. Rather than focusing on how the spyware initially infects a device, this latest research zooms in on how the malware behaves once a device has already been compromised.<\/p>\n<p>The most fascinating discovery involves the mechanisms the Trojan uses to hide iOS camera and microphone indicators. By doing so, it can covertly spy on the infected user. In today\u2019s post, we break down what Predator spyware actually is, how the iOS indicator system is designed to work, and how this malware manages to disable these indicators.<\/p>\n<h2>What Predator is, how it works, and what\u2026 Alien has to do with it<\/h2>\n<p>We previously took a deep dive into the most notorious commercial spyware out there in a dedicated feature \u2014 where we discussed the star of today\u2019s post, Predator, among the others. You can check out that <a href=\"https:\/\/www.kaspersky.com\/blog\/commercial-spyware\/50813\/\" target=\"_blank\" rel=\"noopener nofollow\">earlier post<\/a> for a detailed review of this spyware, but for now, here\u2019s a quick refresher on the essentials.<\/p>\n<p>Predator was originally developed by a North Macedonian company named Cytrox. It was later acquired by the aforementioned Intellexa, a Cyprus-registered firm owned by a former Israeli intelligence officer \u2014 a truly international spy games collaboration.<\/p>\n<p>Strictly speaking, Predator is the second half of a spyware duo designed to monitor iOS and Android users. The first component is named Alien; it\u2019s responsible for compromising a device and installing Predator. As you might\u2019ve guessed, these pieces of malware are named after the famous <a href=\"https:\/\/en.wikipedia.org\/wiki\/Alien_vs._Predator\" target=\"_blank\" rel=\"noopener nofollow\">Alien vs. Predator<\/a> franchise.<\/p>\n<p>An attack using Intellexa\u2019s software typically begins with a message containing a malicious link. When the victim clicks it, they\u2019re directed to a site that leverages a chain of browser and OS vulnerabilities to infect the device. To keep things looking normal and avoid raising suspicion, the user is then redirected to a legitimate website.<\/p>\n<p>Besides Alien, Intellexa offers several other delivery vehicles for landing Predator on a target\u2019s device. These include the Mars and Jupiter systems, which are installed on the service provider\u2019s side to infect devices through a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/man-in-the-middle-attack\/\" target=\"_blank\" rel=\"noopener\">man-in-the-middle<\/a> attack.<\/p>\n<p>Predator spyware for iOS comes packed with a wide array of surveillance tools. Most notably, it can record and transmit data from the device\u2019s camera and microphone. Naturally, to keep the user from catching on to this suspicious activity, the system\u2019s built-in recording indicators \u2014 the green and orange dots at the top of the screen \u2014 must be disabled. While it\u2019s been known for some time that Predator could somehow hide these alerts, it\u2019s only thanks to this research that we know how exactly it pulls it off.<\/p>\n<h2>How the iOS camera and microphone indicator system works<\/h2>\n<p>To understand how Predator disables these indicators, we first need to look at how iOS handles them. Since the release of iOS 14 in 2020, Apple devices have <a href=\"https:\/\/support.apple.com\/en-us\/108331\" target=\"_blank\" rel=\"noopener nofollow\">alerted users<\/a> whenever the microphone or camera is active by displaying an orange or green dot at the top of the screen. If both are running simultaneously, only the green dot is shown.<\/p>\n<div id=\"attachment_55468\" style=\"width: 770px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/03\/20152939\/predator-spyware-ios-recording-indicator-bypass-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55468\" class=\"wp-image-55468 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/03\/20152939\/predator-spyware-ios-recording-indicator-bypass-1.png\" alt=\"Microphone usage indicator in iOS \" width=\"760\" height=\"264\"><\/a><p id=\"caption-attachment-55468\" class=\"wp-caption-text\">In iOS 14 and later, an orange dot appears at the top of the screen when the microphone is in use. <a href=\"https:\/\/support.apple.com\/en-us\/108331\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Just like other iOS user interface elements, recording indicators are managed by a process called <a href=\"https:\/\/en.wikipedia.org\/wiki\/SpringBoard\" target=\"_blank\" rel=\"noopener nofollow\">SpringBoard<\/a>, which is responsible for the device\u2019s system-wide UI. When an app starts using the camera or microphone, the system registers the change in that specific module\u2019s state. This activity data is then gathered by an internal system component, which passes the information to SpringBoard for processing. Once SpringBoard receives word that the camera or microphone is active, it toggles the green or orange dot on or off based on that data.<\/p>\n<div id=\"attachment_55466\" style=\"width: 770px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/03\/20152942\/predator-spyware-ios-recording-indicator-bypass-2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55466\" class=\"wp-image-55466 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/03\/20152942\/predator-spyware-ios-recording-indicator-bypass-2.png\" alt=\"Camera usage indicator in iOS \" width=\"760\" height=\"264\"><\/a><p id=\"caption-attachment-55466\" class=\"wp-caption-text\">If the camera is in use (or both the camera and microphone are), a green dot appears. <a href=\"https:\/\/support.apple.com\/en-us\/108331\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>From an app\u2019s perspective, the process works like this: first, the app <a href=\"https:\/\/developer.apple.com\/documentation\/avfoundation\/requesting-authorization-to-capture-and-save-media\" target=\"_blank\" rel=\"noopener nofollow\">requests permission to access<\/a> the camera or microphone through the standard <a href=\"https:\/\/www.kaspersky.com\/blog\/ios-15-permissions-guide\/43041\/\" target=\"_blank\" rel=\"noopener nofollow\">iOS permission<\/a> mechanism. When the app actually needs to use one or both of these modules, it calls the iOS system API. If the user has granted permission, iOS activates the requested module and automatically updates the status indicator. These indicators are strictly controlled by the operating system; third-party apps have no direct access to them.<\/p>\n<h2>How Predator interferes with the iOS camera and microphone indicators<\/h2>\n<p>Cybersecurity researchers analyzed a captured version of Predator and uncovered traces of multiple techniques used by the spyware\u2019s creators to bypass built-in iOS mechanisms and disable recording indicators.<\/p>\n<p>In the first approach \u2014 which appears to have been used during early development \u2014 the malware attempted to interfere with the indicators at the display stage right after SpringBoard received word that the camera or microphone was active. However, this method was likely deemed too complex and unreliable by the developers. As a result, this specific function remains in the Trojan as dead code \u2014 it\u2019s never actually executed.<\/p>\n<p>Ultimately, Predator settled on a simpler, more effective method that operates at the very level where the system receives data about the camera or microphone being turned on. To do this, Predator intercepts the communication between SpringBoard and the specific component responsible for collecting activity data from these modules.<\/p>\n<p>By exploiting the specific characteristics of Objective-C \u2014 the programming language used to write the SpringBoard application \u2014 the malware completely blocks the signals indicating that the camera or microphone has been activated. As a result, SpringBoard never receives the signal that the module\u2019s status has changed, so it never triggers the recording indicators.<\/p>\n<h2>How to lower your risk of spyware infection<\/h2>\n<p>Predator-grade spyware is quite expensive, and typically reserved for high-stakes industrial or state-sponsored espionage. On one hand, this means defending against such a high-tier threat is difficult \u2014 and achieving 100% protection is likely impossible. On the other hand, for these same reasons, the average user is statistically unlikely to be targeted.<\/p>\n<p>However, if you\u2019ve reason to believe you\u2019re at risk from Predator or Pegasus-class spyware, here are a few steps you can take to make an attacker\u2019s job much harder:<\/p>\n<ul>\n<li>Don\u2019t click suspicious links from unknown senders.<\/li>\n<li>Regularly update your operating system, browsers, and messaging apps.<\/li>\n<li>Reboot your device occasionally. A simple restart can often help \u201close the tail\u201d, forcing attackers to reinfect the device from scratch.<\/li>\n<li>Install a<strong> <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">reliable security solution<\/a><\/strong>\u00a0on all the devices you use.<\/li>\n<\/ul>\n<p>For a deeper dive into staying safe, check out security expert Costin Raiu\u2019s post: <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-pegasus-spyware\/43453\/\" target=\"_blank\" rel=\"noopener nofollow\">Staying safe from Pegasus, Chrysaor and other APT mobile malware<\/a>.<\/p>\n<blockquote><p>Curious about other ways your smartphone might be used to spy on you? Check out our related posts:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/disable-mobile-app-ad-tracking\/53096\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>How smartphones build a dossier on you<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/whisperpair-blueooth-headset-location-tracking\/55162\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Are your Bluetooth headphones spying on you?<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/protecting-from-tracking-via-findmy-airtag\/53245\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>How to track anyone via the Find My network<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-find-airtag-and-other-location-trackers-on-android-2024\/51908\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>How to stop being tracked via Bluetooth beacons like AirTag<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/triangulation-37c3-talk\/50166\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Operation Triangulation: the most sophisticated iOS spyware we\u2019ve ever found<\/strong><\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>Intellexa\u2019s Predator spyware can hide camera and microphone usage indicators on iOS devices. Here\u2019s a look at how it pulls it off.<\/p>\n","protected":false},"author":2726,"featured_media":25361,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[14,1761,1061,26,43,682,738,521,783,692,268],"class_list":{"0":"post-25357","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-apple","9":"tag-cyberattacks","10":"tag-ios","11":"tag-iphone","12":"tag-privacy","13":"tag-spyware","14":"tag-surveillance","15":"tag-threats","16":"tag-tracking","17":"tag-trojans","18":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/predator-spyware-ios-recording-indicator-bypass\/25357\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/predator-spyware-ios-recording-indicator-bypass\/30303\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/predator-spyware-ios-recording-indicator-bypass\/30152\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/predator-spyware-ios-recording-indicator-bypass\/41541\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/predator-spyware-ios-recording-indicator-bypass\/55463\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/predator-spyware-ios-recording-indicator-bypass\/30417\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/predator-spyware-ios-recording-indicator-bypass\/36036\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/predator-spyware-ios-recording-indicator-bypass\/35695\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ios\/","name":"iOS"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=25357"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25357\/revisions"}],"predecessor-version":[{"id":25362,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25357\/revisions\/25362"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/25361"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=25357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=25357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=25357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}