Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Apple Music partners with Ticketmaster to boost concert discovery

The FCC bans the importation of new consumer routers made abroad, citing security risks

Databricks has bought two startups to support its new AI security product

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    OpenAI’s Sora was the creepiest app on your phone — now it’s shutting down

    25 March 2026

    Mirage raises $75M to continue building models for AI video editing app Captions

    24 March 2026

    Bernie Sanders’ AI ‘gotcha’ video fails, but the memes are great

    24 March 2026

    Are AI tokens the new signing bonus or just a cost of doing business?

    23 March 2026

    Want to build a robot snowman?

    23 March 2026
  • Apps

    Spotify is testing new tool to prevent artificial intelligence from attributing real artists

    25 March 2026

    Pinterest is launching a new feature for promoting a Pin

    24 March 2026

    Apple Maps may receive advertisements

    24 March 2026

    Facebook is launching a new monetization program to attract popular creators from TikTok, YouTube

    23 March 2026

    Apps that distract you from the endless cycle of scrolling

    23 March 2026
  • Crypto

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025

    MoviePass opens Mogul fantasy league game to the public

    29 October 2025
  • Fintech

    Doss raises $55 million for AI inventory management that connects to ERP

    24 March 2026

    Despite stiff competition, Kalshi, Polymarket CEOs back $35m VC fund projections

    23 March 2026

    Amid legal turmoil, Kalshi is temporarily banned in Nevada

    20 March 2026

    Nominations for the Startup Battlefield 200 are still open

    19 March 2026

    Kalshi’s legal woes pile up as Arizona files first criminal charges for ‘illegal gambling operation’

    17 March 2026
  • Hardware

    Arm releases the first in-house chip in its 35-year history

    24 March 2026

    Ultrahuman boosts US push with Ring Pro as Oura tightens its grip

    24 March 2026

    Amazon is working on a new smartphone with Alexa at its core, the report says

    20 March 2026

    CEO Carl Pei says nothing about smartphone apps disappearing as they’re replaced by artificial intelligence agents

    18 March 2026

    MacBook Neo, AirPods Max 2, iPhone 17e and everything else Apple announced this month

    18 March 2026
  • Media & Entertainment

    Apple Music partners with Ticketmaster to boost concert discovery

    25 March 2026

    Google TV’s new Gemini features keep fans updated on sports teams and more

    24 March 2026

    Tubi joins forces with popular TikTokers to create original streaming content

    19 March 2026

    Patreon CEO calls AI companies’ fair use argument ‘bogus’, says creators should be paid

    18 March 2026

    Meet Vurt, the first mobile streaming platform for indie filmmakers embracing vertical video

    18 March 2026
  • Security

    The FCC bans the importation of new consumer routers made abroad, citing security risks

    25 March 2026

    Crunchyroll confirms data breach after hackers claim unauthorized access

    24 March 2026

    Delve halts demos, Insight Partners sheds investment position amid ‘false compliance’ claims

    24 March 2026

    The FBI says Iranian hackers are using Telegram to steal data in malware attacks

    23 March 2026

    Delve accused of misleading customers with ‘false compliance’

    22 March 2026
  • Startups

    Databricks has bought two startups to support its new AI security product

    25 March 2026

    Insight Partners removes investment post for Delve amid ‘false compliance’ claims.

    24 March 2026

    Bengaluru food delivery startup Swish raises $38 million, its third round in 18 months

    24 March 2026

    Cursor admits that his new coding model was built on top of Moonshot AI’s Kimi

    23 March 2026

    Microsoft hires Sequoia-backed AI collaboration platform team Cove

    21 March 2026
  • Transportation

    Flighty’s new update gives you real-time alerts for airport disruptions

    25 March 2026

    Zoox is bringing its robotaxis to Austin and Miami

    24 March 2026

    Zipline raises another $200 million to fuel drone delivery expansion

    24 March 2026

    TechCrunch Mobility: Uber everywhere, at once

    23 March 2026

    The SEC ends its four-year investigation into EV startup Faraday Future

    23 March 2026
  • Venture

    Accel, Prosus select six ‘off-the-map’ startups for inaugural India team

    25 March 2026

    Startup Gimlet Labs solves the AI ​​inference problem in a surprisingly elegant way

    24 March 2026

    AI startups are eating up the venture industry, and the returns, so far, are good

    21 March 2026

    Sequen raised $16 million to bring TikTok-style personalization technology to any consumer company

    19 March 2026

    AI ‘boys club’ could widen wealth gap for women, says Rana el Kaliouby

    18 March 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»Stalkerware Cocospy and Spyic applications are exposed to millions of people phone
Security

Stalkerware Cocospy and Spyic applications are exposed to millions of people phone

techtost.comBy techtost.com23 February 202507 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Stalkerware Cocospy And Spyic Applications Are Exposed To Millions Of
Share
Facebook Twitter LinkedIn Pinterest Email

A safety vulnerability to a pair of phone tracking applications exposes the personal data of millions of people who have unintentionally installed applications on their devices, according to a security researcher who found the defect.

The error allows anyone to access personal data – messages, photos, call logs and many more – exhausted by any phone or tablet at stake by Cocospy and Spyic, two different branded stalkerware mobile applications that share largely same source code. The error also exposes the email addresses of people who signed Cocospy and Spyic to plant the application on someone’s device to keep track of them secretly.

Like other species of spyware, products such as Cocospy and Spyic are designed to remain hidden on a victim’s device, while they are constantly concealed and constantly uploading their device data to a board visible by the person planted in the application. By nature, how secret the spyware can be, the majority of phone owners probably do not know that their devices have been at stake.

Cocospy and Spyic operators did not return TechCrunch’s request for comments, nor have they set the error at the time of the publication.

The error is relatively simple in exploitation. Therefore, TechCrunch does not publish specific details of vulnerability, so as not to help the bad actors exploit and further expose the sensitive personal data of people whose devices have already been tested by Cocospy and Spyic.

The security investigator who found the error told TechCrunch that it allows anyone to access the email address of the person who signed any of the two phone tracking applications.

The researcher collected 1.81 million Cocospy customers’ email addresses and 880,167 Spyic customer email addresses, taking advantage of the error to scratch data from applications. The researcher provided the cache of the email addresses to Troy Hunt, who is performing data breach notice service I have passed.

Hunt told TechCrunch that it loaded a total of 2.65 million unique email addresses registered with Cocospy and Spyic to have passed after having removed dual email addresses that appeared on both lots of data. Hunt said that as with previous data -related data violations, Cocospy and Spyic Cache characterized as “sensitive”, I did pwned, which means that only the person with an infected email address can look for if his information is there.

Cocospy and Spyic are the last in a long list of surveillance products that have experienced safety accidents in recent years, often as a result of erroneous or bad security practices. The number of TechCrunch, Cocospy and Spyic are now among the 23 well -known surveillance operations since 2017 that have been violated, violated or otherwise exposed and the very sensitive data of customers and victims online.

Phone monitoring applications such as Cocospy and Spyic are usually sold as parental control or surveillance applications, but are often referred to as stalkerware (or spouseware), as some of these products explicitly promote their internet applications as a medium spy to a spouse of a person or romantic partner without their knowledge, which is illegal. Even in the case of mobile monitoring applications that are not explicitly available in the trade for malicious activity, customers often still use these applications for seemingly illegal purposes.

Stalkerware applications are prohibited by app stores and so they are usually downloaded directly by the stalkerware provider. As a result, Stalkerware applications usually require physical access to someone’s Android device, often with previous knowledge of the victim’s Passcode code. In the case of iPhones and iPads, Stalkerware may use the data of a person who are stored in the Apple Curly Storage Service, which requires the use of Apple’s stolen account credentials.

Stalkerware with a China Nexus

A little more is known for these two Spyware features, including who Runs Cocospy and Spyic. Stalkerware operators often try to avoid the attention of the public, given the reputation and legal risks that are in line with surveillance businesses.

Cocospy and Spyic started in 2018 and 2019, respectively. Of the number of registered users only, Cocospy is one of the largest known Stalkerware functions that go today.

Vangelis Stykas and Felipe Solferini Security Researchers, who analyzed several Stalkerware families As part of a research project 2022It found data linking the operation of Cocospy and Spyic to 711.icu, a China -based mobile phone developer, whose website is no longer loaded.

This week, TechCrunch installed Cocospy and Spyic applications on a virtual device (which allows us to run applications in a safe sandbox without giving any of the spy services any real world data, such as our location). Both Stalkerware applications are disguised as a “System Service” app for Android, which seems to avoid detecting by mixing Android applications.

We used a network analysis tool to track the data flowing in and out of the application to understand how spyware functions work, what data sharing and where the servers are.

Our traffic analysis found that the application sent our virtual device data through Cloudflare, a network security provider that violates the real location of the real world and the Spyware Function Host. But internet traffic has shown that the two Stalkerware applications were uploaded victims, such as photos, on a cloud storage server hosted on Amazon Web Services.

Amazon spokesman Ryan Walsh would not say whether the company plans to take action against the Spyware business hosted in its cloud. Cloudflare did not respond to TechCrunch surveys on Stalkerware.

The analysis also showed that while the application is used, the server will occasionally respond to state or error messages in Chinese, suggesting that applications are developed by someone with a connection to China.

What can you do to remove stalkerware

E -mail addresses that have been e -mail from Cocospy and Spyic allow anyone who plants applications to determine if their information (and victim data) are at stake. But the data does not contain enough recognizable information to alert people whose phones are at stake.

However, there are things you can do to check if your phone is at stake by Cocospy and Spyic. Like most stalkerware, both of these applications are based on a person who deliberately weaken security settings on an Android device to plant applications – or in the case of iPhones and iPads, access to the Apple’s Apple account of the password.

Although both Cocospy and Spyic try to hide, displaying as a general application called “System Service”, there are ways to locate them.

With Cocospy and Spyic, you can usually enter ✱✱001✱✱ On the Android application keyboard and then press the “Call” button to display the Stalkerware apps on the screen-if installed. It is a feature that is integrated into Cocospy and Spyic to allow the person planting the application to the victim’s device to retrieve access. In this case, the operation can also be used by the victim to determine if the application is installed.

You can also check your installed applications via the apps menu in the Android setting menu, even if the app is hidden from viewing.

Cocospy and Spyic Stalkerware applications are disguised as a “System Service” application.Image credits:Technological

TechCrunch has a general Android Spyware removal guide that can help you detect and remove common types of phone stalkerware. Remember to have a security plan in placeSince the spyware disabling can alert the person who put it.

For Android users, activating Google Play Protect It is a useful assurance that can protect against malicious Android applications, including stalkerware. You can activate it from Google Play Settings menu if it is not already enabled.

And if you are an iPhone and iPad user and you think you may be violated, check that your Apple account uses a long and unique password (ideally stored in password manager) and that your account also has Activated two -factor authentication. You should also check and Remove any devices from your account that you don’t recognize.


If you or someone you know needs help, the national telephone line for approved violence (1-800-799-7233) provides free 24/7 confidential support to victims of home abuse and violence. If you are in an emergency mode, call 911. Coalition against Stalkerware It has resources if you think your phone has been violated by Spyware.

Contact Zack Whittaker safely in Signal and Whatsapp at +1 646-755-8849. You can also share documents safely with TechCrunch via Safe.

Was informed with a response from Amazon.

Android Applications Cocospy cyberspace exposed iPad millions people phone Spyic stalkerware
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGuidde puts AI to help create software training videos
Next Article Explore the Apple TV’s Apple TV’s electronic “departure” world
bhanuprakash.cg
techtost.com
  • Website

Related Posts

The FCC bans the importation of new consumer routers made abroad, citing security risks

25 March 2026

OpenAI’s Sora was the creepiest app on your phone — now it’s shutting down

25 March 2026

Crunchyroll confirms data breach after hackers claim unauthorized access

24 March 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Apple Music partners with Ticketmaster to boost concert discovery

25 March 2026

The FCC bans the importation of new consumer routers made abroad, citing security risks

25 March 2026

Databricks has bought two startups to support its new AI security product

25 March 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Doss raises $55 million for AI inventory management that connects to ERP

24 March 2026

Despite stiff competition, Kalshi, Polymarket CEOs back $35m VC fund projections

23 March 2026

Amid legal turmoil, Kalshi is temporarily banned in Nevada

20 March 2026
Startups

Databricks has bought two startups to support its new AI security product

Insight Partners removes investment post for Delve amid ‘false compliance’ claims.

Bengaluru food delivery startup Swish raises $38 million, its third round in 18 months

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.