Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
Editorials & Other Articles
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsThe regime is deploying advanced spyware (e.g., Predator and Pegasus) to spy on ICE protestors, ICE targets, & "antifa"
They have "unbanned" advanced spyware
Rachel Maddow explains that while much of Donald Trump's abuse of power is typical of authoritarians, Trump has a new tool that no authoritarian before him has had: extremely advanced spyware, such as predator and pegasus. Trump is already deploying this new weapon through ICE, which intends to use this surveillance technology against immigrants but also against Americans who protest against ICE, and anyone they might snare with an extremely loose definition of "anti-fascist."
AI Summary
Predator spyware and the Intellexa alliance
Developers: Predator is sold by the Intellexa alliance, a complex network of companies that includes Cytrox, based in North Macedonia.
Capabilities: The software is highly invasive, with advanced obfuscation capabilities designed to evade detection. It can infiltrate devices, extract sensitive data, and even activate microphones and cameras without the user's knowledge.
Notable incidents:
Pegasus spyware and the NSO Group
Developers: Pegasus was created by the NSO Group, a private company headquartered in Israel.
Capabilities: It is capable of secretly infecting phones and extracting private information, including emails, texts, and photos, often without any sign of intrusion.
Notable incidents:
Developers: Predator is sold by the Intellexa alliance, a complex network of companies that includes Cytrox, based in North Macedonia.
Capabilities: The software is highly invasive, with advanced obfuscation capabilities designed to evade detection. It can infiltrate devices, extract sensitive data, and even activate microphones and cameras without the user's knowledge.
Notable incidents:
Greek surveillance scandal: Predator was at the center of a scandal involving the wiretapping of journalists and opposition politicians in Greece in 2022.
Targeting US officials: U.S. government officials, including members of Congress, have been targeted with Predator spyware by foreign entities.
U.S. sanctions: In 2024, the U.S. government imposed sanctions on the Intellexa consortium and its leadership due to the threat their technology poses to national security.
Pegasus spyware and the NSO Group
Developers: Pegasus was created by the NSO Group, a private company headquartered in Israel.
Capabilities: It is capable of secretly infecting phones and extracting private information, including emails, texts, and photos, often without any sign of intrusion.
Notable incidents:
Global abuse: The software has been used by governments around the world to spy on human rights defenders, journalists, and political opponents.
Double infection: In a particularly notable case, the phone of an Egyptian dissident was found to be simultaneously infected with both the Pegasus and Predator spyware.
European Parliament investigation: The European Parliament launched a committee of inquiry to investigate the use of Pegasus and similar spyware.
2 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
The regime is deploying advanced spyware (e.g., Predator and Pegasus) to spy on ICE protestors, ICE targets, & "antifa" (Original Post)
pat_k
Oct 28
OP
Pinback
(13,491 posts)1. Cyber Security News: iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence
Oct. 27, 2025:
The emergence of Pegasus and Predator spyware over the past several years has transformed the landscape of mobile device security.
These advanced malware strainsdeployed by sophisticated threat actors for surveillance and espionagehave repeatedly demonstrated their ability to exploit zero-click vulnerabilities, leaving high-profile individuals and at-risk communities exposed.
These advanced malware strainsdeployed by sophisticated threat actors for surveillance and espionagehave repeatedly demonstrated their ability to exploit zero-click vulnerabilities, leaving high-profile individuals and at-risk communities exposed.
But hey, Ive got nothing to hide. What do I need to worry about? Think again.
Critical forensic analysis has long relied on remnants within iOS system logs, particularly the shutdown.log file, to discern traces of such infections even after the malware attempts to erase itself.
With the release of iOS 26, forensic methodologies face an unprecedented setback. iVerify analysts identified that Apples latest OS version now overwrites the shutdown.log file upon each device reboot, instead of appending new log entries.
This seemingly innocuous changewhether intentional or inadvertenthas significant consequences for digital evidence preservation.
Any device updated to iOS 26 that is subsequently restarted will see all prior shutdown.log content erased, destroying potential indicators of compromise linked to Pegasus, Predator, or similar threats.
With the release of iOS 26, forensic methodologies face an unprecedented setback. iVerify analysts identified that Apples latest OS version now overwrites the shutdown.log file upon each device reboot, instead of appending new log entries.
This seemingly innocuous changewhether intentional or inadvertenthas significant consequences for digital evidence preservation.
Any device updated to iOS 26 that is subsequently restarted will see all prior shutdown.log content erased, destroying potential indicators of compromise linked to Pegasus, Predator, or similar threats.
More: https://cybersecuritynews.com/ios-26-deletes-pegasus-and-predator-spyware-infection-evidence/
Good reason for iPhone users not to upgrade to iOS 26.
pat_k
(12,663 posts)2. ...whether intentional or inadvertent...
Well, if they correct this with an update, perhaps "inadvertent." If they don't, I think we have our answer.