Blog Post

Prmagazine > News > News > Exclusive: Stalkerware apps Cocospy and Spyic are exposing phone data of millions of people
Exclusive: Stalkerware apps Cocospy and Spyic are exposing phone data of millions of people

Exclusive: Stalkerware apps Cocospy and Spyic are exposing phone data of millions of people

According to security researchers who found the flaw, a pair of security vulnerabilities in a phone monitoring application are revealing the personal data of millions of people who have unconsciously installed the application.

This error allows anyone to access personal data – messages, photos, call logs, etc. – to penetrate from any phone or tablet that Cocospy and Spyic compromises Tracker software Applications that share a large amount of the same source code. The error also exposed the email addresses of people who signed up for Cocospy and Spyic, with the aim of implanting the app on someone’s device for secret monitoring.

Just like other types Spywareproducts such as Cocospy and Spyic are designed to remain on the victim’s device while secretly uploading data from their devices to the dashboard visible to the person seeding the app. Essentially, most phone owners may not realize that their devices have been compromised.

Cocospy and Spyic’s carriers did not return a request for comment from TechCrunch, nor did they fix the bug at the time of release.

This error is relatively easy to exploit. Therefore, TechCrunch has not released specific details of vulnerability to avoid helping bad actors take advantage of it and further reveal sensitive personal data of individuals whose devices have been compromised by Cocospy and Spyic.

Security researchers who found the error told TechCrunch that it allows anyone to access the email address of the person who registered either of the two phone monitoring apps.

The researchers collected email addresses of 181 million Cocospy customers and email addresses of 880,167 spy customers by using the error to remove data from the application’s servers. Researchers provide Troy Hunt with cache of email addresses, and Troy Hunt runs data breach notification service I’ve had.

Hunter told TechCrunch that he had registered a total of 2.65 million unique email addresses in Cocospy and Spyic that I was PWEND after he deleted duplicate email addresses that appeared in two batches of data. Hunter says Cocospy and Spyic Cache, like previous spyware-related data breaches Tagged as “sensitive”, In my case of being PWNEND, this means that only people with affected email addresses can search for whether their information is there.

Cocospy and Spyic are the latest in a long list of surveillance products that have experienced no safety in recent years, often due to bugs or poor safety. go through TechCrunch’s Run CountSince 2017, Cocospy and Spyic are now one of 23 known surveillance operations that have been hacked to violate or otherwise expose highly sensitive data from customers and victims.

Telephone monitoring applications such as Cocospy and Spyic are often sold as parental control or employee monitoring applications, but are often referred to as Stalkerware (or spouse software) because some of these products explicitly promote their apps online as a monitor. It is illegal to have a spouse’s means or romantic partner without their knowledge. Even in mobile surveillance applications that do not explicitly sell evil activities, customers often still use these applications for ostensibly illegal purposes.

Stalkerware applications are prohibited from the app store and are therefore usually downloaded directly from the Stalkerware provider. As a result, Stalkerware applications often require physical access to someone’s Android device, often knowing the victim’s device password in advance. For iPhones and iPads, Stalkerware can leverage device data from people stored in Apple Cloud Storage Service Service iCloud, which requires using their stolen Apple account credentials.

Stalker software for contacting China

Very little is known about these two spyware operations, including those who run Cocospy and Spyic. Stalkerware operators often try to avoid public attention given the reputation and legal risks associated with running monitoring operations.

Cocospy and Spyic were launched in 2018 and 2019, respectively. From the number of registered users only, Cocospy is The largest stalker software operation Go today.

Security researchers Vangelis Stykas and Felipe Solferini analyze several Stalkerware series As part of the 2022 research projectevidence was found that links Cocospy and Spyic to the 711.ICU of China-based mobile app developers whose website no longer loads.

This week, TechCrunch installed Cocospy and Spyic applications on virtual devices (this allows us to run applications in a secure sandbox without providing any real-world data for any SPY services, such as our location). Both Stalkerware apps masquerade for Android as a “system service” app that doesn’t seem to be describing, which seems to evade detection by mixing it with Android’s built-in apps.

We use network analysis tools to observe data flowing in and out of applications to understand how spyware operations work, which data is shared, and where the server is located.

Our traffic analysis found that the application sent data from our virtual appliances via CloudFlare, a network security provider that confuses the real-world locations of Spyware operations with web hosts. But network traffic shows that two Stalkerware applications are uploading some victims’ data, such as photos, to a cloud storage server hosted on Amazon’s web services.

Neither Amazon nor Cloudflare responded to TechCrunch’s inquiries about Stalkerware operations.

The analysis also shows that when using the application, the server occasionally responds with a Chinese status or error message, indicating that the applications were developed by people with Chinese connections.

What steps can you take to delete Stalkerware

Email addresses scraped from Cocospy and Spyic allow anyone who grows the app to determine if their information (and the victim’s data) is compromised. But the data does not contain enough identifiable information to notify the individual whose damaged phone number is.

However, there are some things you can do to check if your phone is compromised by Cocospy and Spyic. Like most tracking software, both apps rely on a person who deliberately weakens security settings on Android devices to plant apps – or in the case of iPhone and iPad, someone who knows their username and password to access one’s Apple account.

Although both Cocospy and Spyic try to hide by appearing as a common application called “System Services”, there are ways to discover them.

With cyclo sugar and spy, you can usually enter ✱✱001✱✱On the keyboard of your Android phone app, and press the Call button to make the Stalkerware app appear on the screen – if the screen is installed. This is a built-in feature in Cocospy and Spyic that allows people who plant the app on their victim’s devices to regain access. In this case, the victim can also use this feature to determine if the application is installed.

You can also check installed apps through the Apps menu in the Android settings menu, even if the app is hidden in the view.

A pair of screenshots show the Android phone keyboard with ** 001 ** on the monitor, on the right, the Spyware App disguised as one "System Services" app.
Cocospy and Spyic Stalkerware applications masquerade as “system services” applications.Image source:TechCrunch

TechCrunch has one General Android Spyware Removal Guide This can help you identify and delete common phone tracker software. Remember there is A safety plan developedgiven that shutting down spyware may remind people who plant it.

For Android users, open Google Play Protect is a useful safeguard that can prevent malicious Android applications, including Stalkerware. If Google Play’s settings menu has not been enabled, you can enable it from Google Play’s settings menu.

And, if you are an iPhone and iPad user and think you may be compromised, check if your Apple account uses a longer and unique password (Ideally saved in password manager), your account also has Two-factor authentication is turned on. You should also check Delete all devices from your unknown account.


If you or someone you know of in need, the National Domestic Violence Hotline (1-800-799-7233) provides free, confidential support for victims of domestic abuse and violence. If you are in an emergency, call 911. Alliance against tracking If you think your phone has been compromised by spyware, please provide resources.

Please contact Zack Whittaker with Signal and WhatsApp security, please contact WhatsApp at +1 646-755-8849. You can also pass TechCrunch Security.

Source link

Leave a comment

Your email address will not be published. Required fields are marked *

star360feedback