Breaking cybersecurity news, news analysis, commentary, and other content from around the world, with an initial focus on the Middle East & Africa.

Mercenary spyware operator has rebuilt its network infrastructure and now operates in 11 countries, with one of the newest additions, Botswana.

Dark Reading Staff, Dark Reading

March 4, 2024

1 Min Read
Hands on a laptop with digital eye superimposed over the hands
Source: Skorzewiak via Alamy Stock Photo

The infamous Predator mobile spyware operation publicly exposed in an eye-popping report last year by Amnesty International has revamped its malware delivery network and expanded its reach into Botswana and the Philippines.

Researchers from Recorded Future's Insikt Group, which spotted Predator's updated architecture, said the mercenary mobile spyware enterprise now operates in at least 11 countries with the addition of Botswana and the Philippines.

The updated and tiered malware network infrastructure includes delivery servers, upstream servers, and static IP addresses in the 11 nations suspected to be Predator customers: Angola, Armenia, Botswana, Egypt, Indonesia, Kazakhstan, Mongolia, Oman, the Philippines, Saudi Arabia, and Trinidad and Tobago.

"While Predator stands out as one of the premier providers of mercenary spyware, alongside NSO Group's Pegasus, the tactics, techniques, and procedures [TTPs] it uses during its delivery process have remained consistent over time, likely indicating their ongoing success," the Insikt team wrote in its findings.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights