Netcrook Logo
👤 LOGICFALCON
🗓️ 18 Feb 2026   🌍 Africa

Shadow Networks: Predator Spyware Breaches Angolan Journalism for the First Time

A prominent Angolan journalist’s phone was hacked with Predator spyware, exposing the global reach - and persistent threat - of surveillance-for-hire tools.

Teixeira Cândido, a leading voice for press freedom in Angola, never imagined that a simple WhatsApp message could turn his world upside down. But in May 2024, a single click on a seemingly innocent link unleashed Predator spyware onto his iPhone, marking Angola’s first recorded case of this notorious surveillance tool. The revelation, brought to light by Amnesty International, is a chilling reminder: even the most sophisticated digital defenses can be undermined by human trust - and shadowy actors eager to silence dissent.

Inside the Predator Attack: Anatomy of a Digital Ambush

The incident began with a series of WhatsApp messages sent to Cândido from an unknown Angolan number between April and June 2024. The sender - posing as a student interested in Angola’s social and economic issues - slowly built trust before sending a link on May 4. When Cândido clicked, Predator spyware silently infiltrated his device.

Predator is no ordinary malware. Designed for stealth, it can extract messages, passwords, and call logs while turning a phone’s microphone and camera into surveillance tools. For Cândido, the infection was short-lived - the spyware was wiped when he restarted his phone later that day. But the psychological impact was lasting. “I feel naked knowing that I was the target of this invasion of my privacy,” he told Amnesty International.

Forensic analysis by Amnesty’s Security Lab linked the attack to known Predator infrastructure, confirming the tool’s involvement. In the weeks following, the attacker sent 11 more infection attempts, each a unique link, but none were opened.

The Global Predator Problem

Predator is the flagship product of the Intellexa Consortium, a surveillance tech vendor placed on the U.S. Entity List in 2023 for its role in facilitating human rights abuses. Despite sanctions and public scrutiny, Intellexa’s operations persist, with Predator surfacing in attacks from Europe to Asia. Past victims include the president of the European Parliament, the president of Taiwan, and U.S. officials.

The Angolan case is not isolated. In December 2025, Amnesty documented a similar Predator attack on a human rights lawyer in Pakistan. The pattern is clear: advanced spyware is increasingly used to monitor, intimidate, and control journalists and activists worldwide.

Who Is Behind the Curtain?

The identity of Cândido’s attacker remains unknown. The use of convincing social engineering and tailored infection links suggests a well-resourced and sophisticated adversary - potentially with state backing. The attack highlights a growing trend: commercial spyware is no longer the exclusive domain of intelligence agencies, but a tool available to anyone with deep pockets and questionable motives.

Conclusion: The Price of Bearing Witness

For journalists like Teixeira Cândido, the risk of digital surveillance is now ever-present. As governments and private actors turn to commercial spyware to silence critical voices, the very fabric of press freedom is under siege. The Predator attack in Angola is a wake-up call: no corner of the world is beyond the reach of digital repression - and no defender of truth is truly safe without global accountability.

WIKICROOK

  • Spyware: Spyware is software that secretly monitors or steals information from your device without your consent, putting your privacy and data at risk.
  • Social engineering: Social engineering is the use of deception by hackers to trick people into revealing confidential information or providing unauthorized system access.
  • Entity List: The Entity List is a US government list of foreign entities restricted from receiving certain exports due to national security or policy concerns.
  • Forensic analysis: Forensic analysis is a thorough investigation to uncover how a cyberattack happened, what systems were affected, and to gather evidence for response and prevention.
  • Sanctions: Sanctions are government-imposed restrictions that block financial activities and assets to punish or deter illegal, unethical, or dangerous behavior.
Predator spyware Angolan journalism press freedom

LOGICFALCON LOGICFALCON
Log Intelligence Investigator
← Back to news