Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Joby Aviation Expands Ohio Footprint to Ramp Up U.S. Air Taxi Production

    January 13, 2026

    Amazon Rolls Out Redesigned Dash Cart to Whole Foods, Expands Smart Grocery Shopping

    January 13, 2026

    OpenAI Debuts ChatGPT Health With Medical Records, Wellness App Integration

    January 13, 2026
    Facebook X (Twitter) Instagram
    • Tech
    • AI News
    Facebook X (Twitter) Instagram Pinterest VKontakte
    TallwireTallwire
    • Tech

      Joby Aviation Expands Ohio Footprint to Ramp Up U.S. Air Taxi Production

      January 13, 2026

      Amazon Rolls Out Redesigned Dash Cart to Whole Foods, Expands Smart Grocery Shopping

      January 13, 2026

      Tech Firms Tackle Backlash by Redesigning Data Centers to Win Over Communities

      January 13, 2026

      OpenAI Debuts ChatGPT Health With Medical Records, Wellness App Integration

      January 13, 2026

      Malicious Chrome Extensions Compromise 900,000 Users’ AI Chats and Browsing Data

      January 12, 2026
    • AI News
    TallwireTallwire
    Home»Tech»Sanctioned Spyware Firm Intellexa Found To Have Direct Access To Targets’ Data
    Tech

    Sanctioned Spyware Firm Intellexa Found To Have Direct Access To Targets’ Data

    4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Sanctioned Spyware Firm Intellexa Found To Have Direct Access To Targets’ Data
    Sanctioned Spyware Firm Intellexa Found To Have Direct Access To Targets’ Data
    Share
    Facebook Twitter LinkedIn Pinterest Email

    New revelations suggest that Intellexa — already sanctioned by the U.S. — had more intrusive involvement in government-led spyware operations than previously believed. A leaked training video shows company staff using remote desktop tools to access live customer surveillance dashboards belonging to Intellexa’s “Predator” system, including personal photos, messages and other sensitive data from real targets. Independent researchers leading the “Intellexa Leaks” investigation say the footage confirms actual deployments (not demos), indicating that Intellexa could monitor the spying performed by its clients — undermining earlier claims that they hands-off once the sale is complete.

    Sources: SecurityLab, Hacker News

    Key Takeaways

    – Intellexa staff reportedly had remote live access — via tools like TeamViewer — to the electronic surveillance dashboards of its government clients, giving them visibility into the personal data of individuals infected with the Predator spyware.

    – The leaked materials, including internal docs, marketing slides and training videos, support the view that this was real-world spying, not a sandbox demo — raising new questions about third-party oversight in commercial spyware operations.

    – The new evidence adds weight to broader investigations showing that Intellexa continues to deploy zero-day exploits worldwide through its “Predator” spyware, implicating the firm in surveillance abuses across multiple countries.

    In-Depth

    The latest disclosures surrounding Intellexa paint a troubling picture of how deeply embedded commercial spyware firms remain in real-world intelligence operations — even after being sanctioned. According to a December 2025 report by Amnesty International and corroborated by multiple media outlets, leaked internal training videos reveal that employees at Intellexa routinely accessed live surveillance dashboards belonging to their government clients. Through remote-access tools like TeamViewer, company staff could view sensitive data harvested from targeted phones: photos, messages, location logs — all in real time. This stands in stark contrast to the public posture many spyware vendors maintained, which asserted that once a sale was made, they had no control over how governments used the tools.

    The significance of this revelation cannot be understated. The “Intellexa Leaks” investigation — built on confidential documents, sales material, and training footage — argues that the examples shown were not simulated; rather, the video itself includes distinct details linking to real victims: infection URLs, IP addresses, phone model and OS version. One staffer in the video even asked if the footage showed a real system; the instructor reportedly confirmed that it was live. That raises serious ethical and legal concerns about control and accountability. If a private firm retains direct access to a customer’s spying operations, the lines between vendor and operator blur — potentially allowing misuse, data leaks, or surveillance of civilians beyond what governments themselves might disclose.

    More troubling is that this access may still be part of ongoing operations. Other recent analyses show that Intellexa continues to exploit zero-day vulnerabilities — undisclosed software flaws — to infect mobile devices worldwide. The company’s flagship product, Predator, is said to be still actively deployed, using evolving attack vectors, including so-called “Aladdin” ads-based methods, making infections stealthier and harder to defend against. In some reported cases, victims have included lawyers, journalists, dissidents, and human-rights defenders in countries like Pakistan and Egypt.

    These developments come despite earlier efforts — including sanctions imposed by the U.S. Treasury Department in 2024 — intended to restrict Intellexa’s operations. The sanctions barred U.S. persons and businesses from dealing with Intellexa and its founders over evidence that Predator had been used against U.S. citizens, including government officials and journalists. Yet the leaks and continued threat activity suggest those measures did not fully sever Intellexa’s global influence.

    From a broader standpoint, what’s unfolding signals a systemic problem in the commercial spyware industry: when firms don’t just sell their tools but also maintain backend access to them, true accountability becomes nearly impossible. Democracies and human-rights organizations have long warned about the danger of such technology — and yet the persistence of spyware operations like those by Intellexa shows how difficult it is to regulate, monitor, and ultimately curtail their use.

    In the end, this isn’t just about one company or one spyware product. It’s part of a global struggle over who controls digital surveillance — governments, private firms, or the public — and whether those capabilities can ever be reconciled with privacy and civil liberties.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSamsung Teams with Perplexity to Bring AI to Living Room TVs
    Next Article Satellite-AI Drives Major Lithium Find in Quebec

    Related Posts

    Amazon Rolls Out Redesigned Dash Cart to Whole Foods, Expands Smart Grocery Shopping

    January 13, 2026

    Joby Aviation Expands Ohio Footprint to Ramp Up U.S. Air Taxi Production

    January 13, 2026

    Tech Firms Tackle Backlash by Redesigning Data Centers to Win Over Communities

    January 13, 2026

    OpenAI Debuts ChatGPT Health With Medical Records, Wellness App Integration

    January 13, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Joby Aviation Expands Ohio Footprint to Ramp Up U.S. Air Taxi Production

    January 13, 2026

    Amazon Rolls Out Redesigned Dash Cart to Whole Foods, Expands Smart Grocery Shopping

    January 13, 2026

    Tech Firms Tackle Backlash by Redesigning Data Centers to Win Over Communities

    January 13, 2026

    OpenAI Debuts ChatGPT Health With Medical Records, Wellness App Integration

    January 13, 2026
    Top Reviews
    Tallwire
    Facebook X (Twitter) Instagram Pinterest YouTube
    • Tech
    • AI News
    © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

    Type above and press Enter to search. Press Esc to cancel.