Arrest After Police Threats as Israeli Predator Spyware Uses Weaponized Ads to Hack Phones

2 days ago
8

UPDATE:
This is Daniel Waltson. He was arrested for allegedly threatening to shoot police officers while they were at his home the previous night. A judge signed an arrest warrant after cops told him that Daniel “threatened to shoot the police for being on his property.” His house was besieged by police officers aiming guns at his home,
https://youtu.be/rXaXSfjvBw8?si=Nvhv2Tpe-eSyA1FW

Intellexa, the commercial surveillance company behind the “Predator” spyware, has deployed a new zero-click infection mechanism dubbed “Aladdin.” Unlike previous methods requiring SMS links, Aladdin leverages the commercial mobile advertising ecosystem to deliver exploits. The system targets victims by their public IP address and instructs Demand Side Platforms (DSPs) to serve weaponized ads on any website the target visits. Viewing the ad alone is sufficient to trigger the infection, redirecting the device to Israeli owned Intellexa’s exploit servers. The investigation, based on “Intellexa Leaks” and corroborated by Google and Amnesty International, also revealed a secondary vector called “Triton“ targeting Samsung Exynos basebands via 2G downgrades.
https://youtu.be/4QTOmQY-Mg8?si=XNnotD0V_9rlyuDv

https://www.malwarebytes.com/blog/news/2025/12/leaks-show-intellexa-burning-zero-days-to-keep-predator-spyware-running
https://thehackernews.com/2025/12/intellexa-leaks-reveal-zero-days-and.html

#PoliceArrest #ThreatsAgainstPolice #PredatorSpyware #IsraeliSurveillance #WeaponizedAds #ZeroClickAttack #PhoneHacking #CyberEspionage #Intellexa #DigitalSurveillance #CivilLiberties #BreakingNews #CyberThreat #NationalSecurity #PrivacyInvasion #LawEnforcement #TechScandal #OnlineSafety #SurveillanceTech #PublicAlert

Loading comments...