⚡️🇮🇱 ALERT - Israeli-linked spyware company Intellexa, founded by former Israeli intelligence officer Tal Dilian, was exposed for deploying Predator spyware that silently hacks smartphones worldwide. This is what Netanyahu means by: “If you have a phone, you’re holding a piece of Israel.”
Investigations by Haaretz, Inside Story, WAV Research Collective, and Amnesty International reveal that Intellexa used malicious digital ads to infect phones: simply viewing the ad could trigger the attack. Once infected, operators gained full access to the camera, microphone, chats, emails, GPS, photos, files, and browsing history.
Despite Intellexa being sanctioned by the US, they're still operating.
Leaked internal documents and training videos (“Intellexa Leaks”) show that:
➤ Intellexa built “delivery vectors” that trick the phone into opening infection links without the user clicking, creating near–zero-click attacks.
➤ All stolen data was funneled through a hidden “CNC Anonymization Network” to mask the operator.
➤ Intellexa staff kept remote access to government surveillance systems, letting them view live spying operations and victims’ data.
➤ Advertisement-based infection methods (ADINT) are now being developed by multiple spyware firms and used by governments.
Amnesty warns that such silent, ad-driven exploits will expand as people avoid unknown links and true zero-click attacks grow more expensive. Tech companies and ad networks must urgently act to detect and disrupt these attacks.

