Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Why European founders are winning (and that's not about less work)

September 17, 2025

How Algore, Lila Preston and the world's energy economics have been reversed

September 17, 2025

Jaguar Land Rover suspends production for third week due to cyber attack

September 17, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Google brings Pixel 6 and new devices to Material3 Expressive, along with other features, to the Pixel 6 and new devices

    September 3, 2025

    Google's NoteBookLM now allows you to customize the tone of your AI podcasts

    September 3, 2025

    Roblox expands the use of age estimation techniques and introduces standardized assessments

    September 3, 2025

    Instagram finally launches the iPad app

    September 3, 2025

    Complete the 2025 Confusion Builder Stage Agenda with the Maximum Scaling Voice

    September 3, 2025
  • Crypto

    PayPal will add a new one-to-one payment link to support Crypto soon

    September 15, 2025

    10 additional exhibition tables open and open in 2025

    September 15, 2025

    Stripe will showcase who WHO including Humanity, Openai and Paradigm to build a new blockchain

    September 4, 2025

    Coinbase CEO explains why he fired an engineer who didn't try AI right away

    August 22, 2025

    Your next customer is destroying the 2025 Expo floor

    August 19, 2025
  • Security

    Jaguar Land Rover suspends production for third week due to cyber attack

    September 17, 2025

    Insight Partners at VC Company say thousands of staff and limited partners have stolen personal data in ransomware attacks

    September 17, 2025

    Samsung Patch Zero Day Security Flaws are used to hack into customer's mobile phones

    September 16, 2025

    Gucci, Balenciaga and other brands own companies checking hacks

    September 15, 2025

    Israel announces $1.5 million seizure from crypto wallet linked to Iran

    September 15, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Why European founders are winning (and that's not about less work)

    September 17, 2025

    How Algore, Lila Preston and the world's energy economics have been reversed

    September 17, 2025

    Mach Industries' Ethan Thornton will be appearing on the AI ​​stage in 2025

    September 17, 2025

    Jason Citron, founder of Discord, is back to disrupt 2025

    September 17, 2025

    The CEO of Lovable, one of the fastest growing startups in history, has been on the way in 2025.

    September 17, 2025
TechBrunchTechBrunch

Data breaches on Stalkerware Spyx impact nearly 2 million people, including thousands of Apple users

TechBrunchBy TechBrunchMarch 19, 20255 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


TechCrunch learned that consumer-grade spyware operations, called Spyx, were hit by a data breach last year. The violation reveals that Spyx and two other related mobile apps have records of around 2 million people at the time of the violation, including thousands of Apple users.

The data breach dates back to June 2024, but has not been reported previously, and there is no indication that Spyx operators have notified customers or Spyware subjects.

The SPYX family of mobile spyware is now known to have exposed or exposed victim or user data in the 25th mobile surveillance operation or other ways since 2017 when it is now known to have experienced a data breaches, indicating that the consumer-grade spyware industry continues to multiply and puts people's personal data at risk.

This violation also provides a rare perspective on how Stalkerware, like Spyx, can target Apple customers.

Troy Hunt running a data breach notification site has received a copy of the data that I was pwned and compromised in the form of two text files.

Hunt said that the majority of email addresses are associated with SPYX. The cache also contains less than 300,000 email addresses associated with two almost identical clones of the SPYX app called MSAFELY and SPYPHONE.

Hunt said about 40% of my email addresses are already PWNed.

Similar to previous spyware violations, Hunt marked a data breach on SPYX. I was pwled as “sensitive.”

The operator behind Spyx did not ask an email from TechCrunch about the violation. I've returned a message saying that the WhatsApp number listed on the SPYX website is not registered with the messaging app.

Different spyware, different violations

Spyx is billed as mobile surveillance software for Android and Apple devices to grant control of children's mobile phones.

Surveillance malware, like Spyx, also passes the term Stalkerware (and spouse's clothing). This may explicitly advertise the product as a way for operators to spy on their spouse or domestic partner. Even if the operator does not explicitly promote this illegal use, the Spyware app still shares many of the same stealth data steel features.

Consumer grade spyware, like Stalkerware, usually works in one of two ways:

Apps that run on Android devices, including SPYX, are usually downloaded from outside the official Google Play app store, allowing victims' devices (usually knowledge of passcodes, to weaken their security settings and plant spyware.

Because Apple has more stringent rules about which apps are in the App Store and can run on iPhones and iPads, Stalkerware usually taps on a copy of a backup of a device found in iCloud, Apple's cloud storage service. With a person's iCloud credentials, Stalkerware can continuously download the latest victim backups directly from Apple's servers. iCloud Backup stores most of a person's device data, including messages, photos, and app data.

According to Hunt, one of the two files in the compromised cache was mentioned in iCloud by its filename and contained around 17,000 different sets of usernames and passwords for around 17,000 plain text Apple accounts.

Since the iCloud entitlement for the compromised cache was clearly part of an Apple customer, Hunt attempted to verify the reliability of the data by contacting the subscriber who PWNeed the subscriber whose Apple account email address and password were found in the data. Hunt said several people confirmed that the information he provided was accurate.

Given the possible ongoing risk to victims whose account credentials may still be valid, Hunt provided a list of iCloud credentials that violated Apple prior to publication. Apple did not comment when TechCrunch reached it.

As for the remaining email addresses and passwords found in the compromised text file, it was not very clear whether these were working credentials for services other than SPYX and its cloned apps.

Meanwhile, Google has reduced its Chrome extension linked to the SPYX campaign.

“The Chrome Web Store and Google Play Store policies clearly prohibit malicious code, spyware and stalkerware. If you find a violation, take appropriate action. If users suspect that their Google account has compromised, they should take the recommended steps immediately.

How to find Spyx

TechCrunch has a spyware removal guide for Android users that can help you identify and remove popular types of phone monitoring apps. Don't forget to make a safety plan, given that turning off the app could warn the planter.

For Android users, Google Play Protect switching is a useful security feature that helps protect against Android malware, including unwanted phone monitoring apps. If the app is not enabled yet, you can enable Google Play from the app settings.

Your Google account is much more protected with two-factor authentication, which will help you better protect your account and data from intrusions, and let you know what steps to take if your Google account is compromised.

iPhone and iPad users can view and delete devices from unrecognized accounts. Your Apple account should use a long, unique password (ideally stored in the password manager) and make sure your account has two-factor authentication turned on. You also need to change your iPhone or iPad PassCode if you think someone may have physically compromised your device.

If you or someone you know needs help, the domestic domestic violence hotline (1-800-799-7233) provides secret support to victims of domestic abuse and violence 24/7. If you are in an emergency, call 911. If you think your phone is compromised by Spyware, then the federation against Stalkerware has resources.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Jaguar Land Rover suspends production for third week due to cyber attack

September 17, 2025

Insight Partners at VC Company say thousands of staff and limited partners have stolen personal data in ransomware attacks

September 17, 2025

Samsung Patch Zero Day Security Flaws are used to hack into customer's mobile phones

September 16, 2025

Gucci, Balenciaga and other brands own companies checking hacks

September 15, 2025

Israel announces $1.5 million seizure from crypto wallet linked to Iran

September 15, 2025

This is Tech Powering that drives the crackdown on Ice's deportation.

September 13, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Why European founders are winning (and that's not about less work)

September 17, 2025

How Algore, Lila Preston and the world's energy economics have been reversed

September 17, 2025

Jaguar Land Rover suspends production for third week due to cyber attack

September 17, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.