Defense News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Defense Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
DefenseNewsPredator Spyware Hooks iOS SpringBoard to Hide Mic, Camera Activity
Predator Spyware Hooks iOS SpringBoard to Hide Mic, Camera Activity
CybersecurityDefense

Predator Spyware Hooks iOS SpringBoard to Hide Mic, Camera Activity

•February 21, 2026
0
BleepingComputer
BleepingComputer•Feb 21, 2026

Companies Mentioned

Apple

Apple

AAPL

Jamf

Jamf

JAMF

Why It Matters

The technique demonstrates that sophisticated spyware can bypass built‑in iOS privacy safeguards without exploiting vulnerabilities, heightening risk for high‑value targets and enterprise‑managed devices.

Key Takeaways

  • •Predator uses kernel access to hook SpringBoard.
  • •Hook nullifies SBSensorActivityDataProvider, suppressing indicators.
  • •Single function intercepts both camera and microphone status.
  • •VoIP recordings lack separate suppression, rely on same hook.
  • •Apple has not commented on the findings.

Pulse Analysis

When Apple rolled out iOS 14, the green and orange dots became a visual guarantee that users could see when their microphone or camera was active. This transparency was marketed as a defense against hidden surveillance, yet the Predator spyware shows that visual cues can be programmatically silenced. By targeting the SpringBoard process—the core of iOS’s user interface—Predator sidesteps the indicator system entirely, leaving the device’s status bar oblivious to any recording activity.

The technical elegance of Predator lies in its use of a single hook function, HiddenDot::setupHook, which intercepts calls to the internal _handleNewDomainData: method. By nullifying the SBSensorActivityDataProvider object, the malware ensures that sensor‑status updates never reach the UI layer. This approach requires pre‑existing kernel‑level privileges, which the spyware obtains through earlier exploits, but it does not depend on a fresh zero‑day. Consequently, even patched devices remain vulnerable if an attacker can first gain deep system access, highlighting a shift from vulnerability‑centric attacks to privilege‑centric stealth.

For enterprises and high‑profile individuals, the discovery raises urgent questions about device monitoring and detection. Traditional mobile device management tools may miss such low‑level hooks, prompting a need for deeper integrity checks and behavioral analytics. While Apple’s lack of comment suggests limited immediate remediation, the incident underscores the importance of layered security—combining OS‑level protections with vigilant monitoring of kernel extensions and anomalous process behavior. As commercial spyware continues to evolve, organizations must reassess risk models that previously relied on iOS’s built‑in privacy indicators as a safety net.

Predator spyware hooks iOS SpringBoard to hide mic, camera activity

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...