Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Beehiiv introduces new creator tools, including webinars and customizable payments

Tesla withdraws Musk’s $29 billion ‘interim’ award after Delaware court restores bigger pay package

The first StrictlyVC of 2026 starts in one week in San Francisco

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Another customer of troubled startup Delve suffered a major security incident

    23 April 2026

    Tesla just increased its spending plan to $25 billion — this is where the money is going

    23 April 2026

    OpenAI partners with Infosys to bring AI tools to more businesses

    22 April 2026

    Unauthorized group gained access to Anthropic’s proprietary Mythos cyber tool, report claims

    22 April 2026

    NSA Spies Reportedly Using Anthropic’s Mythos, Despite Pentagon Controversy

    21 April 2026
  • Apps

    WhatsApp adds prepaid phone recharges in India as payment usage continues to lag

    23 April 2026

    Keep up with X’s new AI-powered custom streams

    23 April 2026

    X makes it more expensive to publish links through its API

    22 April 2026

    Apple’s Cal AI crackdown signals it still controls the App Store

    22 April 2026

    GRAI believes that AI can make music more social, not replace artists

    21 April 2026
  • Crypto

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025
  • Fintech

    Cash App targets a new type of customer: children aged 6 to 12 years

    22 April 2026

    Revolut eyes up to $200 billion valuation in potential IPO

    22 April 2026

    Once close enough for a takeover, Stripe and Airwallex are now going after each other

    18 April 2026

    Airwallex is set to take on Stripe and the rest of the payments industry — in the physical world

    16 April 2026

    Cash app launches ‘pay later’ feature for P2P transfers

    3 April 2026
  • Hardware

    Apple’s John Ternus will run one of the most powerful companies in the world. work is a minefield

    22 April 2026

    Tim Cook steps down as Apple CEO: Here’s a look at his 15-year legacy, from new products and services to China expansion

    22 April 2026

    Who is John Ternus, the new CEO of Apple?

    21 April 2026

    Tim Cook steps down as Apple CEO, while John Ternus takes over

    21 April 2026

    Amazon Unveils Slimmer Fire TV Stick HD, Opens Ember Artline TVs for Pre-Order

    16 April 2026
  • Media & Entertainment

    India’s app market is booming — but global platforms are raking in most of the profits

    23 April 2026

    YouTube extends its AI similarity detection technology to celebrities

    21 April 2026

    Deezer says 44% of songs uploaded to its platform every day are created with artificial intelligence

    20 April 2026

    Netflix plans to add a vertical video stream, use AI for recommendations

    17 April 2026

    Netflix co-founder and chairman Reed Hastings is stepping down from the board

    17 April 2026
  • Security

    Cosmetics giant Rituals confirms data breach of customer membership records

    23 April 2026

    Apple fixes bug used by police to extract deleted chat messages from iPhones

    22 April 2026

    As US spy laws expire, lawmakers divided over protecting Americans from warrantless surveillance

    22 April 2026

    Ransomware dealer pleads guilty to helping ransomware gang

    21 April 2026

    App host Vercel says it was hacked and customer data stolen

    21 April 2026
  • Startups

    Beehiiv introduces new creator tools, including webinars and customizable payments

    23 April 2026

    How SpaceX prompted a $2 billion fundraising with a $60 billion takeover offer

    23 April 2026

    Cathie Woods’ ARK makes first major investment in startup Lucra — and it’s not AI

    22 April 2026

    AI research lab NeoCognition offers $40 million to build agents that learn like humans

    22 April 2026

    You’ve heard of hybrid cars. Now meet a hybrid cement plant.

    19 April 2026
  • Transportation

    Tesla withdraws Musk’s $29 billion ‘interim’ award after Delaware court restores bigger pay package

    23 April 2026

    Elon Musk Admits Millions of Tesla Owners Need Upgrades for True ‘Full Self-Driving’

    23 April 2026

    Redwood Materials lays off 10% in restructuring to pursue energy storage business

    22 April 2026

    Amazon taps Sweden’s Einride for its electric big rigs

    21 April 2026

    The Rivian factory was hit by a tornado before the R2 was released

    20 April 2026
  • Venture

    The first StrictlyVC of 2026 starts in one week in San Francisco

    23 April 2026

    Esther and Anne Wojcicki support new healthcare accelerator, fund

    23 April 2026

    Anthropic rejects VC funding that values ​​it at $800B+, for now

    16 April 2026

    Financial risk management platform Pillar raises $20 million in rounds led by a16z

    15 April 2026

    Vercel CEO Guillermo Rauch signals IPO readiness as AI agents drive revenue

    14 April 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»Hacked, Leaked, Exposed: Why You Should Never Use Stalkerware Apps
Security

Hacked, Leaked, Exposed: Why You Should Never Use Stalkerware Apps

techtost.comBy techtost.com1 June 202408 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Hacked, Leaked, Exposed: Why You Should Never Use Stalkerware Apps
Share
Facebook Twitter LinkedIn Pinterest Email

Last week, an unknown hacker broke into the servers of US-based stalkerware maker pcTattletale. The hacker then stole and leaked the company’s internal data. They also hacked pcTattletale’s official website with the aim of embarrassing the company.

“This took a total of 15 minutes from reading the techcrunch article,” the hackers wrote in defacement, referring to a recent TechCrunch article where we reported that pcTattletale was used to monitor several check-in computers at the front desk at Wyndham hotels in the United States. States.

As a result of this hack, leak and shame operation, pcTattletale founder Bryan Fleming said he was shutting down his company.

Consumer spyware applications such as pcTattletale are commonly referred to as stalkerware because jealous husbands and partners use them to secretly monitor and surveil their loved ones. These companies often explicitly market their products as solutions to catch cheating partners, encouraging illegal and unethical behavior. And there have been many court casesjournalistic investigations, and investigations into domestic abuse shelters which show that online stalking and tracking can lead to real-world instances of harm and violence.

And that’s why hackers have repeatedly targeted some of these companies.

According to TechCrunch’s tally, with this latest hack, pcTattletale became the 20th stalkerware company since 2017 known to have hacked or leaked customer and victim data online. This is not a typo: Twenty stalkerware companies have either been breached or had significant data exposure in recent years. And three stalkerware companies were hacked multiple times.

Eva Galerpin, director of cybersecurity at the Electronic Frontier Foundation and a leading researcher and activist who has researched and fought stalkerware for years, said the stalkerware industry is a “soft target.” “The people running these companies are maybe not the most meticulous or really concerned about the quality of their product,” Galperin told TechCrunch.

Given the history of stalkerware compromises, that may be an understatement. And because of their lack of care to protect their own customers—and consequently the personal data of tens of thousands of wrongdoing victims—using these apps is doubly irresponsible. Stalkerware clients may be breaking the law, abusing their partners by illegally spying on them, and on top of that, putting everyone’s data at risk.

History of stalkerware hacks

The flurry of stalkerware breaches began in 2017 when a group of hackers hacked US-based Retina-X and FlexiSpy based in Thailand back to back. These two hacks revealed that the companies had a total of 130,000 customers worldwide.

At the time, the hackers who – proudly – claimed responsibility for the compromises said explicitly that their motivation was to expose and hope to help destroy an industry they see as toxic and unethical.

“I’m going to burn them to the ground and leave nowhere for any of them to hide,” one of the hackers involved told Motherboard at the time.

Referring to FlexiSpy, the hacker added: “I hope they go under and fail as a company and have some time to think about what they’ve done. However, I fear they may try to rebirth themselves in a new form. But if they do, I’ll be there.”

Despite the hack and years of negative public attention, FlexiSpy is still active today. The same cannot be said for Retina-X.

The hacker who broke into Retina-X wiped its servers with the aim of stopping it from working. The company came back – and then hacked again a year later. A few weeks after the second breach, Retina-X has announced that it is shutting down.

A few days after the second Retina-X breach, hackers hit Mobistealth and Spy Master Pro, stealing gigabytes of customer and business records, as well as intercepted victims’ messages and precise GPS locations. Another stalkerware vendor, the India-based SpyHuman;it suffered the same fate a few months later, with hackers stealing text messages and call metadata, which contained logs of who called whom and when.

Weeks later, there was the first case of accidental data exposure, rather than hacking. SpyFone left an Amazon-hosted S3 storage bucket unprotected online, which meant that anyone could view and download text messages, photos, recordings, contacts, location, passwords and login information, Facebook messages and more. All of this data was stolen from victims, most of whom were unaware that they were being spied on, let alone aware that their most sensitive personal data was also on the Internet for all to see.

Other stalkerware companies that have irresponsibly left customer and victim data online over the years include FamilyOrbit, which left 281 gigabytes of personal data online protected only by an easy-to-find password; mSpy, which leaked over 2 million customer records. Xnore, which allows any of its customers to view the personal data of other customers’ targets, which included chat messages, GPS coordinates, emails, photos and more. Mobiispy, which left 25,000 recordings and 95,000 images on a server accessible to anyone; KidsGuard, which had a faulty server that leaked victims’ content. pcTattletale, which before its hack as well exposed screenshots of victims’ devices uploaded in real time on a website that anyone could access; and Xnspy, whose developers left credentials and private keys in the apps’ code, allowing anyone to access victims’ data.

As for other stalkerware companies that were actually hacked, there was Copy9, which saw a hacker steals the data of all his tracking targets, including text and WhatsApp messages, call recordings, photos, contacts and eyebrow history. LetMeSpy, which was shut down after its servers were breached by hackers. Brazil-based WebDetetive, which also had its servers wiped, and then he hacked again; OwnSpy, which provides much of the support software for WebDetetive, was also hacked. Spyhide, which had a vulnerability in its code that allowed a hacker to access its back-end databases and years of stolen data from around 60,000 victims. and Oospy, which was a rebrand of Spyhide, was shut down for a second time.

Finally, there is TheTruthSpy, a network of stalkerware applications, which holds the dubious record of having been hacked or leaked data on at least three separate occasions.

Hacked, but unrepentant

Of those 20 stalkerware companies, eight have been shut down, according to TechCrunch’s tally.

In a first and so far unique case, the Federal Trade Commission banned SpyFone and its CEO, Scott Zuckerman, from operating in the surveillance industry after an earlier security breach exposed victims’ data. Another stalkerware business linked to Zuckerman, called SpyTrac, was subsequently shut down after a TechCrunch investigation.

PhoneSpector and Highster, two other companies not known to have been hacked, were also shut down after New York’s attorney general accused the companies of explicitly encouraging customers to use their software for illegal surveillance.

But a company closing doesn’t mean it’s gone forever. As with Spyhide and SpyFone, some of the same owners and developers behind a shutterbug stalkerware maker simply renamed themselves.

“I think these hacks do things. They really get things done, put a dent in it,” Galperin said. “But if you think that if you hack a stalkerware company, that they’re just going to shake their fists, curse your name, disappear in a puff of blue smoke and never be seen again, it sure hasn’t happened.”

“What happens most often, when you manage to kill a stalkerware company, is that the stalkerware company pops up like mushrooms after the rain,” Galperin added.

There is some good news. In a report last year, security firm Malwarebytes said that stalkerware use is declining, according to its own customer data infected with this type of software. Also, Galperin reports seeing an increase in negative reviews of these apps, with customers or prospects complaining that they don’t work as intended.

But Galperin said it’s possible that security companies aren’t as good at detecting stalkerware as they used to be, or that stalkers have moved from software-based tracking to physical surveillance enabled by AirTags and other Bluetooth-enabled trackers.

“Stalkerware does not exist in a vacuum. Stalkerware is part of a whole world of technology-enabled abuse,” Galperin said.

Say no to stalkerware

Using spyware to track your loved ones is not only unethical, it is also illegal in most jurisdictions as it is considered illegal surveillance.

This is already a major reason not to use stalkerware. Then there’s the issue that stalkerware makers have proven time and time again that they can’t keep data safe — neither data belonging to customers nor to their victims or targets.

In addition to spying on romantic partners and spouses, some people use stalkerware apps to monitor their children. While this type of use, at least in the United States, is legal, it doesn’t mean that using stalkerware to spy on your kids’ phone isn’t creepy and unethical.

Even if it’s legal, Galperin believes parents shouldn’t be spying on their kids without telling them and without their consent.

If parents inform their children and get the green light, parents should stay away from unsafe and untrustworthy stalkerware apps and use built-in parental monitoring tools Apple phones and tablets and Android devices which are safer and operate undetected.


If you or someone you know needs help, the National Family Violence Hotline (1-800-799-7233) provides free, confidential 24/7 support to victims of domestic abuse and violence. If you are in an emergency, call 911. The Coalition Against Stalkerware has resources if you think your phone has been compromised by spyware.

apps cyber security evergreen exposed hacked Hacking leaked privacy stalkerware surveillance
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleStartups Weekly: Musk raises $6B for AI and fintech dominoes fall
Next Article Bootstrading for over a decade, this Dallas company just raised $110 million to help people pay their bills via text
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Cosmetics giant Rituals confirms data breach of customer membership records

23 April 2026

Apple fixes bug used by police to extract deleted chat messages from iPhones

22 April 2026

As US spy laws expire, lawmakers divided over protecting Americans from warrantless surveillance

22 April 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Beehiiv introduces new creator tools, including webinars and customizable payments

23 April 2026

Tesla withdraws Musk’s $29 billion ‘interim’ award after Delaware court restores bigger pay package

23 April 2026

The first StrictlyVC of 2026 starts in one week in San Francisco

23 April 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Cash App targets a new type of customer: children aged 6 to 12 years

22 April 2026

Revolut eyes up to $200 billion valuation in potential IPO

22 April 2026

Once close enough for a takeover, Stripe and Airwallex are now going after each other

18 April 2026
Startups

Beehiiv introduces new creator tools, including webinars and customizable payments

How SpaceX prompted a $2 billion fundraising with a $60 billion takeover offer

Cathie Woods’ ARK makes first major investment in startup Lucra — and it’s not AI

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.