Intellexa’s Predator spyware used to hack iPhone of journalist in Angola, research says

Published: (February 17, 2026 at 07:01 PM EST)
3 min read
Source: TechCrunch

Source: TechCrunch

Intellexa’s Predator spyware used to hack Angolan journalist

Intellexa’s Predator spyware was used to hack the iPhone of Angolan journalist Teixeira Cândido, according to a new Amnesty International report.

Amnesty International report

Amnesty International published a report analyzing several hacking attempts against Cândido, a local journalist and press‑freedom activist. In 2024 he received a series of malicious links via WhatsApp; after clicking one, his iPhone was infected with Intellexa’s Predator spyware.

The report highlights the growing use of commercial surveillance tools by government customers to target journalists, politicians, and ordinary citizens.

Previous instances of Predator abuse

Research has previously documented Predator’s deployment in:

  • Egypt – see Citizen Lab investigation.
  • Greece – detailed by the Council of Europe.
  • Vietnam – where the government reportedly targeted U.S. officials via links on X.

These cases illustrate a pattern of state‑linked abuse of the spyware.

Intellexa and sanctions

Intellexa is a controversial spyware maker that operates through a complex network of corporate entities to evade export controls.

  • In March 2024, the outgoing Biden administration sanctioned Intellexa, its founder Tal Dilian, and partner Sara Aleksandra Fayssal Hamou for targeting Americans.
  • Earlier in 2025, the Treasury lifted sanctions on three other Intellexa‑linked executives, prompting Senate Democrats to demand answers from the Trump administration.

Dilian did not respond to requests for comment.

Two screenshots of WhatsApp messages sent to the Angolan journalist, showing a malicious link.
Image credit: Amnesty International

Technical findings

Amnesty researchers linked the intrusion to Intellexa by examining forensic traces on Cândido’s phone. The infection servers matched infrastructure previously associated with Predator.

  • After clicking the malicious link, Cândido rebooted his device, which removed the spyware.
  • The spyware exploited an outdated iOS version and concealed itself by impersonating legitimate iOS system processes.
  • Multiple domains tied to Intellexa were identified in Angola, with the earliest observed in March 2023, suggesting early testing or deployment of Predator in the country.

The report states that it is not possible to conclusively identify the specific customer of the Predator spyware in Angola.

Broader implications

Leaks of internal Intellexa documents have shown that the company’s employees could remotely access customers’ systems, giving them visibility into government surveillance operations. Despite sanctions and controversy, Intellexa remains active.

“We’ve now seen confirmed abuses in Angola, Egypt, Pakistan, Greece, and beyond — and for every case we uncover, many more abuses surely remain hidden,” — Donncha Ó Cearbhaill, head of Amnesty International’s security lab.

0 views
Back to Blog

Related posts

Read more »