NewsPredator" system. This is how successor of Pegasus looks like

Predator" system. This is how successor of Pegasus looks like

The international organization Amnesty International has revealed what the Predator surveillance system looks like, which is an alternative to the famous Pegasus. At first glance, it is clear that the software has incredibly extensive capabilities.

The Predator system is a very intuitive tool. Anyone can handle it.
The Predator system is a very intuitive tool. Anyone can handle it.
Images source: © Pixabay, Twitter

5:21 PM EDT, October 6, 2023

What is Predator? It is a spyware program created by the company Cytrox from Israel. Some experts suggest that it may be more dangerous than the popular Pegasus. Why? Because the latter program is widely discussed in the media. Few people know about the operation of Predator.

Specialists from the company Citizen LAB (who research spyware) indicated that Predator has very extensive surveillance capabilities. On the other hand, the Israeli company Cytrox is not widely known, and its connotations may even reach the Kremlin.

This is what Predator looks like - surprised?

Amnesty International has obtained more detailed information regarding Predator. In the photographs published by the organization, among other things, the software interface can be seen. Experts (along with specialists from the European Union) also subjected the system to a detailed analysis.

The functionality of the spy tool is very broad. With Predator, you can, among other things, join an existing conversation or call a specific user by connecting to a smartphone.

Predator is managed via an internet system. Spy software operators can also use this interface to initiate attack attempts on the target phone - emphasize specialists from Amnesty International, warning that one phone can infect another.

The program also facilitates full control of SMS, provides access to user contacts, multimedia stored on the phone, and location. It turns the smartphone into a eavesdropping device, as it facilitates, for example, inconspicuous activation of the voice recorder.

The user himself is not able to realize that Predator is functioning on their device. Virtually no modern anti-spyware or antivirus software can detect it. Only a specialized examination can indicate that our phone is infected.

Related content
© essanews.com
·

Downloading, reproduction, storage, or any other use of content available on this website—regardless of its nature and form of expression (in particular, but not limited to verbal, verbal-musical, musical, audiovisual, audio, textual, graphic, and the data and information contained therein, databases and the data contained therein) and its form (e.g., literary, journalistic, scientific, cartographic, computer programs, visual arts, photographic)—requires prior and explicit consent from Wirtualna Polska Media Spółka Akcyjna, headquartered in Warsaw, the owner of this website, regardless of the method of exploration and the technique used (manual or automated, including the use of machine learning or artificial intelligence programs). The above restriction does not apply solely to facilitate their search by internet search engines and uses within contractual relations or permitted use as specified by applicable law.Detailed information regarding this notice can be found  here.