Spyware vendor Intellexa had remote access to its government clients’ surveillance systems. This access allowed company employees to view personal data from phones hacked with its Predator spyware. The new evidence was published by Amnesty International on Thursday. Media partners Haaretz and Inside Story also contributed.This remote access challenges core industry claims of customer data isolation. It raises severe privacy and security concerns for surveillance targets. The findings are based on leaked internal company documents and videos.
Leaked Training Video Reveals Live Surveillance Data
Amnesty’s Security Lab analyzed the leaked material. A training video showed access to a live Predator dashboard. The dashboard displayed photos, messages, and other data extracted from victims.The video contained details from an infection attempt in Kazakhstan. This included a target’s IP address and phone software version. An instructor confirmed it was a live customer system, not a demo.This practice is highly abnormal in the surveillance industry. Government agencies fiercely protect operational data. Spyware firms typically deny access to avoid legal liability for customer misuse.

Security Implications and Regulatory Fallout Intensify
The revelation adds a new layer of risk for potential victims. Sensitive data is exposed not just to a government client. It is also exposed to a foreign private company with documented security flaws.Intellexa’s founder, Tal Dilian, is a controversial figure. The U.S. government sanctioned him and a business partner in 2024. Sanctions cited Predator’s use against U.S. officials and journalists.Dilian denied any wrongdoing through his lawyer. He accused journalists of being part of a campaign against him. The situation underscores the shadowy and poorly regulated spyware market.
Madi Prewett Opens Up About Embracing the ‘Submissive Wife’ Role in Marriage
The Intellexa spyware scandal reveals critical vulnerabilities in the global surveillance supply chain. It proves that private companies can potentially monitor government spy operations. This fundamentally undermines client confidentiality and victim privacy.
A quick knowledge drop for you
What is Intellexa’s Predator spyware?
Predator is a powerful spyware tool sold to governments. It can remotely infect smartphones without user interaction. Once installed, it extracts messages, photos, location data, and more.
How was this remote access discovered?
Amnesty International analyzed leaked Intellexa internal documents. A training video showed employees navigating a live customer system via TeamViewer. This software allows remote control of another computer over the internet.
Which governments used Intellexa spyware?
Public reports and investigations have linked Predator to countries including Greece, Vietnam, and Madagascar. The leaked video referenced an infection attempt in Kazakhstan.
Why is remote access a major security issue?
It means a private company can see the data of people targeted by foreign governments. It also creates another point where sensitive data could be leaked or hacked.
Has the U.S. taken action against Intellexa?
Yes. In 2024, the U.S. Treasury sanctioned Intellexa founder Tal Dilian. Sanctions make it illegal for Americans to do business with him, citing threats to U.S. personnel.
iNews covers the latest and most impactful stories across
entertainment,
business,
sports,
politics, and
technology,
from AI breakthroughs to major global developments. Stay updated with the trends shaping our world. For news tips, editorial feedback, or professional inquiries, please email us at
[email protected].
Get the latest news and Breaking News first by following us on
Google News,
Twitter,
Facebook,
Telegram
, and subscribe to our
YouTube channel.



