For years, iPhone users have relied on a simple but critical visual cue to know when their device is listening or watching: the small, colored dots in the status bar. However, new research reveals that a sophisticated piece of commercial malware known as Predator spyware can surgically suppress these iOS recording indicators, allowing for covert surveillance without the user’s knowledge.
The discovery, detailed by researchers at Jamf Threat Labs, highlights a significant escalation in the capabilities of high-end spyware. By defeating the privacy alerts introduced by Apple to protect users, Predator can activate the camera and microphone while keeping the interface clean of any warning signs, effectively blinding the user to active spying.
This capability represents a direct attack on the transparency measures Apple implemented in iOS 14. Since that update, a green dot indicates the camera is in use, while an orange dot signals that the microphone is active. These indicators were designed to be the final line of defense, alerting users to unauthorized surveillance even if a device had been compromised.
How Predator Bypasses iOS Privacy Alerts
The ability to hide these indicators is not a simple app-level trick but a deep system manipulation. According to an analysis by Jamf Threat Labs, Predator spyware, developed by Intellexa and Cytrox, employs undocumented technical mechanisms to ensure the recording dots do not appear during surveillance activities.

This process allows the spyware to conduct covert surveillance by intercepting the system calls that would normally trigger the visual alerts. By suppressing these indicators, the malware ensures that the victim remains unaware that their private conversations are being recorded or that their camera is capturing images and video in real-time.
The Requirement for Full Device Compromise
this capability is not an “out-of-the-box” feature that can affect any iPhone user instantly. The research clarifies that the technique used by Predator requires a device to first be fully compromised. Which means the attackers must have already gained kernel-level access to the operating system.
With kernel-level access, the spyware can:
- Install hooks deep within the system architecture.
- Inject malicious code directly into essential system processes.
- Manipulate the core functions of iOS that control the status bar indicators.
Because this requires such a high level of access—often achieved through zero-day vulnerabilities or other complex exploitation chains—this specific bypass is a “post-compromise” operation. This proves not a new security flaw that requires a patch, but rather a method of operating once the device’s primary defenses have already been breached.
The Role of Intellexa and Cytrox
Predator is a commercial spyware product attributed to the firms Intellexa and Cytrox. Unlike common malware distributed via phishing links to the general public, commercial spyware of this grade is typically sold to government agencies or law enforcement entities for targeted surveillance.
The sophistication of the Predator sample analyzed by Jamf Threat Labs demonstrates the resources invested in defeating modern mobile security. By focusing on the “surgical” removal of privacy indicators, the developers ensure that their clients can maintain persistence on a target’s device without triggering the suspicion that a visible orange or green dot would cause.
What This Means for Mobile Privacy
The ability of Predator to hide recording indicators underscores a growing arms race between OS developers and spyware creators. For the average user, the privacy dots provided a sense of certainty; if the dot wasn’t there, the microphone wasn’t on. This research proves that for a sufficiently compromised device, that certainty is no longer guaranteed.
While the barrier to entry for this attack is high—requiring full kernel access—the existence of such a mechanism proves that even the most fundamental privacy safeguards can be bypassed by high-tier commercial malware. This emphasizes the importance of maintaining updated software and remaining vigilant about the signs of device compromise, as the visual indicators themselves can no longer be trusted as an absolute proof of privacy.
Key Takeaways on Predator Spyware
- Targeted Capability: Predator can hide the green (camera) and orange (microphone) privacy dots in the iOS status bar.
- Prerequisite: The attack requires a full device compromise with kernel-level access and code injection into system processes.
- Developer: The spyware is developed by Intellexa/Cytrox.
- Not a New Bug: This is a post-compromise behavior, not a new iOS vulnerability requiring a specific patch.
- Impact: Enables entirely covert surveillance, bypassing a key privacy feature introduced in iOS 14.
As researchers continue to reverse-engineer samples of commercial spyware, the focus remains on building better detection capabilities to identify the initial compromise before these deep-system hooks can be installed. Users are encouraged to monitor for unusual device behavior and keep their devices updated to the latest version of iOS to mitigate the risk of the initial exploits that lead to full compromise.
We find currently no further scheduled official updates regarding this specific bypass mechanism, as it is a documentation of existing malware behavior rather than a vulnerability disclosure. We will continue to monitor reports from security researchers for new developments in commercial spyware detection.
Do you have questions about mobile security or how to protect your devices from sophisticated spyware? Share your thoughts in the comments below or share this article with your network.