NewsPredator" system. This is how successor of Pegasus looks like

Predator" system. This is how successor of Pegasus looks like

The Predator system is a very intuitive tool. Anyone can handle it.
The Predator system is a very intuitive tool. Anyone can handle it.
Images source: © Pixabay, Twitter

5:21 PM EDT, October 6, 2023

The international organization Amnesty International has revealed what the Predator surveillance system looks like, which is an alternative to the famous Pegasus. At first glance, it is clear that the software has incredibly extensive capabilities.

What is Predator? It is a spyware program created by the company Cytrox from Israel. Some experts suggest that it may be more dangerous than the popular Pegasus. Why? Because the latter program is widely discussed in the media. Few people know about the operation of Predator.

Specialists from the company Citizen LAB (who research spyware) indicated that Predator has very extensive surveillance capabilities. On the other hand, the Israeli company Cytrox is not widely known, and its connotations may even reach the Kremlin.

This is what Predator looks like - surprised?

Amnesty International has obtained more detailed information regarding Predator. In the photographs published by the organization, among other things, the software interface can be seen. Experts (along with specialists from the European Union) also subjected the system to a detailed analysis.

The functionality of the spy tool is very broad. With Predator, you can, among other things, join an existing conversation or call a specific user by connecting to a smartphone.

Predator is managed via an internet system. Spy software operators can also use this interface to initiate attack attempts on the target phone - emphasize specialists from Amnesty International, warning that one phone can infect another.

The program also facilitates full control of SMS, provides access to user contacts, multimedia stored on the phone, and location. It turns the smartphone into a eavesdropping device, as it facilitates, for example, inconspicuous activation of the voice recorder.

The user himself is not able to realize that Predator is functioning on their device. Virtually no modern anti-spyware or antivirus software can detect it. Only a specialized examination can indicate that our phone is infected.

Related content