How Predator spyware defeats iOS recording indicators#1945
Open
carlospolop wants to merge 1 commit intomasterfrom
Open
How Predator spyware defeats iOS recording indicators#1945carlospolop wants to merge 1 commit intomasterfrom
carlospolop wants to merge 1 commit intomasterfrom
Conversation
Collaborator
Author
🔗 Additional ContextOriginal Blog Post: https://www.jamf.com/blog/predator-spyware-ios-recording-indicator-bypass-analysis/ Content Categories: Based on the analysis, this content was categorized under "Mobile Pentesting -> iOS Pentesting (new page/topic: SpringBoard/Mach-exception hooking & privacy indicator suppression) and/or Binary Exploitation -> iOS Exploiting (PAC-aware redirection / exception-based hooks)". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Title: How Predator spyware defeats iOS recording indicators (Jamf Threat Labs, Feb 19, 2026)
Scope / what this is (and is not): This is reverse-engineering of a post-compromise iOS Predator (Intellexa/Cytrox) spyware sample. It documents how the spyware suppresses iOS 14+ privacy indicators (green dot = camera, orange dot = microphone). The authors explicitly state this is not a new iOS vulnerability disclosure🔧 Technical Details
Indicator suppression by nulling Objective-C
self(nil messaging) at a central sensor-update choke point: If you already have code execution/injection inside SpringBoard, hook the private methodSBSensorActivityDataProvider._handleNewDomainData:(invoked on sensor activity changes). On ARM64, Objective-C passesselfinx0,_cmdinx1, and the first argument inx2. Modify the saved thread state sox0=0before the method executes, transforming[obj _handleNewDomainData:newData]into[nil _handleNewDomainData:newData]. Because Objective-C messages tonilare silently ignored, the sensor update is dropped and the UI never renders camera/mic dots. The blog shows this can be done with a single store-zero instruction (STR XZR) applied to the stored register state.Mach exception-based hooking (DMHooker) to...
🤖 Agent Actions
Summary:
src/binary-exploitation/ios-exploiting/README.md(HiddenDot nil-messaging suppression in SpringBoard, Mach exception hook semantics, PAC-aware redirect, VoIP capture pipeline), and added the Jamf blog to References. (jamf.com)Tests: Not run.
Notes:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.