How does SMS Predator Scan work?
The application scans all SMS messages on the target device for the presence of URL links to any of the 326 malicious addresses created by Cytrox, likely for Predator attacks. These addresses are provided by Amnesty International’s technical department, collected in collaboration with Meta (owner of Facebook) and Google, and most recently updated on 23-5-2022.
My app gave a green result with 0 detections. Can I be sure I’m not being tracked?
No. This result will only mean that there is currently no SMS available on your device that mentions any of the 326 known malicious addresses. The scenarios where an attempted infection with Predator could have taken place, without the application finding any indication, are as follows: after receiving the SMS in question, you deleted it. an attempt was made to infect via another route, such as via an online message (e.g. email, Messenger, Viber, WhatsApp). But it seems that there was a preference for SMS, which are the most likely to be opened from a mobile phone, the ideal target. Also, some online services use security filters that could prevent infection. when you received the SMS in question, you were using a message encryption application (see below). you received the SMS in question, opened the relevant link, your device was infected, and subsequently, Predator operators deleted the SMS. However, this did not happen in the cases of Koukakis and Spirtzis infection. another malicious address, not yet detected, was used to add to the list. This is not considered particularly likely for older attacks, due to the broad detection methods used by Meta and Google. More broadly, the app doesn’t check for infection attempts with other tracking software. For a comprehensive automated check, you can use antivirus software (recommendation links: Android and iOS). So far, to our knowledge, no company has confirmed the ability of their security software to automatically detect Predator, but such software can detect a number of other spyware. My app got a red result with an attack detection. What to do; First, review the overall message or messages indicated by the application to confirm that it is indeed a suspicious message, but without opening the link or links included. You can then contact the Cybercrime Prosecution Directorate. You can also contact Inside Story technicians to take an in-depth look at your device. If you have opened the suspicious link or links, please use another device for those communications.
Can my SMS be exposed during app review?
No. The application performs no other task than checking SMS for the aforementioned malicious addresses, does not keep copies of SMS, and does not collect data of any kind. The control takes place locally and the application does not communicate with any external server.