Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

New AI features in WhatsApp allow you to rearrange and adjust the tone of your message

August 27, 2025

The FBI says that China's salt typhoon has hacked at least 200 US companies

August 27, 2025

Google and Grok are catching up to ChatGpt, says the latest AI report from A16Z

August 27, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    New AI features in WhatsApp allow you to rearrange and adjust the tone of your message

    August 27, 2025

    Google and Grok are catching up to ChatGpt, says the latest AI report from A16Z

    August 27, 2025

    Google Vids adds AI avatars to the video editor and launches the consumer version

    August 27, 2025

    Libby's library app adds AI discovery, but not everyone is excited

    August 26, 2025

    Google Translate accepts Duolingo with a new language learning tool

    August 26, 2025
  • Crypto

    Coinbase CEO explains why he fired an engineer who didn't try AI right away

    August 22, 2025

    Your next customer is destroying the 2025 Expo floor

    August 19, 2025

    Crypto Company Gemini File for Winklevoss Twins IPO

    August 16, 2025

    North Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says

    August 4, 2025

    Telegram's Crypto Wallet will be released in the US

    July 22, 2025
  • Security

    The FBI says that China's salt typhoon has hacked at least 200 US companies

    August 27, 2025

    US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

    August 27, 2025

    Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

    August 26, 2025

    Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

    August 26, 2025

    Thetruthspy phone spyware new security flaw puts victims at risk

    August 25, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    From streaming to healthcare to AI, Mark Cuba reveals his “formula of confusion”

    August 27, 2025

    Uncork Capital in a 21-year venture cycle – and what's the difference between this?

    August 26, 2025

    A16z spends $1.49 million on lobbying in Washington, with rivals mostly going outside

    August 25, 2025

    Openai warns against SPVs and other “unauthorized” investments

    August 23, 2025

    Amazon AGI Labs Chief defends his reverse Acquihire

    August 23, 2025
TechBrunchTechBrunch

Amazon is still hosting Stalkerware victim data a few weeks after violation alerts

TechBrunchBy TechBrunchMarch 13, 20256 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Despite notifying TechCrunch that it was hosting stolen phone data a few weeks ago, Amazon wouldn't say whether it plans to take action against three phone monitoring apps that store personal private phone data on Amazon's cloud servers.

Amazon told TechCrunch that it was “following” [its] After the February notice, as of the time of publication of this article, Stalkerware Operations Cocospy, Spyic, and Spyzie continue to upload and store photos extracted from the mobile phones of people on Amazon Web Services.

Cocospy, Spyic and Spyzie are three almost identical Android apps that share the same source code and a common security bug, according to security researchers who discovered it and provided it with details to TechCrunch. Researchers revealed that the operation exposed telephone data in a population of 3.1 million people. The researchers shared the data with the violation notification site where I was pwled.

As part of an investigation into Stalkerware operations, including an analysis of the app itself, TechCrunch discovered that some of the content of devices compromised by the Stalkerware app has been uploaded to Amazon Web Services or storage servers running by AWS.

TechCrunch emailed Amazon on February 20, notifying them that they were hosting the data they extracted by Cocospy and Spyic, and earlier this week they also hosted stolen phone data Spyzie excluded.

In both emails, TechCrunch included each name of a specific Amazon hosted storage “bucket” containing data obtained from the victim's mobile phone.

In response, Amazon spokesman Ryan Walsh told TechCrunch: When we receive a report of a potential violation of the Terms, we will act promptly and take steps to disable prohibited content. “Walsh provides links to Amazon web pages, but will not comment on the status of the Amazon servers the app uses.

In this week's follow-up email, TechCrunch referenced emails from before February 20th, including storage bucket names hosted on Amazon.

In response, Walsh thanked TechCrunch for “taking our attention” and provided another link to Amazon's report abuse form. When asked if Amazon was planning to take action against the bucket, Walsh replied.

Amazon spokesman Casey McGee said that “TechCrunch was inaccurate to characterize the contents of this thread as an A.” [sic] constitute a “report” of potential abuse. ”

Amazon Web Services, which has a commercial interest in retaining payment customers, earned $39.8 billion in 2024, accounting for the majority of Amazon's total annual income, according to full-year revenue for 2024.

The storage buckets used by Cocospy, Spyic, and Spyzie are still active at the time of publication.

Why is this important?

Amazon's own acceptable usage policy broadly explains what the company can host on the platform. It appears that Amazon has not objected to uploading data to the platform by denialing spyware and Stalkerware operations. Instead, the Amazon controversy appears to be completely procedural.

Police on what is hosted on Amazon platforms or other company's cloud platforms is not the job of a journalist or someone else's job.

Amazon has a huge amount of resources to use to enforce its own policies by ensuring that bad actors do not abuse their services, financially and technically.

In the end, TechCrunch provided a notification to Amazon. This includes information that points directly to the location of the horde of stolen private telephone data. Amazon has chosen not to act on the information it receives.

How did you find victim data hosted on Amazon?

When TechCrunch learns of monitoring-related data breaches – there have been dozens of Stalkerware hacks and leaks in recent years, but we'll investigate to learn as many operations as possible.

Our investigations can help identify victims of phone hacking, but they can also reveal hidden real-world identities of the surveillance operators themselves. TechCrunch also helps analyse apps (if available) to determine how victims identify and delete apps.

As part of the reporting process, TechCrunch will reach out to companies that identify them as hosting or supporting Spyware and Stalkerware operations. It is also not uncommon for businesses such as web hosts and payment processors to suspend their accounts or delete data that violates their own terms of service, including previous spyware operations hosted on Amazon.

In February, TechCrunch learned that Cocospy and Spyic had been compromised and tried to investigate further.

The data showed that the majority of victims were Android devices owners, so TechCrunch began by identifying, downloading and installing Cocospy and Spyic apps on virtual Android devices. (Virtual devices allow you to run stalkerware apps in a protected sandbox without providing real-world data such as either app.) Both Cocospy and Spyic appeared as identical-looking apps named “System Services” that attempt to avoid detection by merging with Android's built-in apps.

We used a network traffic analysis tool to inspect the data flowing through the app. This helps you understand how each app works and determine which phone data is being stealthly uploaded from your test device.

Web traffic shows that two Stalkerware apps are uploading victim data, such as photos, to a storage bucket with a name that hosts on Amazon Web Services.

A screenshot of a browser window showing images hosted on AWS. "This is evidence that they are still hosting uploaded victim data about Amazon's S3 cloud hosted at Cocospymedia.s3.us-West-1.Amazonaws.com."Screenshots of photos hosted on Amazon Web Services. This was uploaded via a virtual Android device that was intentionally compromised with Cocospy Stalkerware during TechCrunch investigation. Image credit: TechCrunch

I've checked this more. This allows people who log in to the Cocospy and Spyic users' dashboards and plant the Stalkerware app to view the stolen data of the target. The web dashboard allowed you to access content from your Virtual Android device's photo gallery after intentionally breaching your virtual device using the Stalkerware app.

When you open the content of your device's photo gallery from each app's web dashboard, you will see an image loaded from a web address that contains the name of each bucket hosted in the Amazonaws.com domain running by Amazon Web Services.

Following the news after the Spyzie data breach, TechCrunch also analyzed Spyzie's Android app using a network analysis tool, finding that the traffic data is the same as Cocospy and Spyic. The Spyzie app similarly uploaded victims' device data to a named storage bucket on Amazon's cloud, located in Amazon's cloud.

If you or someone you know needs help, the domestic domestic violence hotline (1-800-799-7233) provides secret support to victims of domestic abuse and violence 24/7. If you are in an emergency, call 911. If you think your phone is compromised by Spyware, then the federation against Stalkerware has resources.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

The FBI says that China's salt typhoon has hacked at least 200 US companies

August 27, 2025

US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

August 27, 2025

Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

August 26, 2025

Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

August 26, 2025

Thetruthspy phone spyware new security flaw puts victims at risk

August 25, 2025

Developers get prison time to disrupt the ex-employer's network with “kill switch”

August 22, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

New AI features in WhatsApp allow you to rearrange and adjust the tone of your message

August 27, 2025

The FBI says that China's salt typhoon has hacked at least 200 US companies

August 27, 2025

Google and Grok are catching up to ChatGpt, says the latest AI report from A16Z

August 27, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.