A stalkerware manufacturer with a history of multiple data leaks and violations now has a critical security vulnerability that allows anyone to take on any user account and steal the victim’s sensitive personal data, TechCrunch confirmed.
Independent Security Researcher Swarang Wade has found vulnerability, which allows anyone to restore the password of any user of the Stalkerware Thetruthspy application and the many SPYWARE applications of Android, leading to the hijacking of any account on the platform. Given the nature of the Thetruthspy, it is likely that many of its clients operate without the consent of their goals, who do not know that their phone data is withdrawn to someone else.
This basic defect shows, once again, that consumer spyware manufacturers such as thetruthspy – and its many competitors – cannot trust one’s data. These follow -up applications not only facilitate illegal espionage, often from abusive romantic partners, but also have endless security practices that expose the personal data of both victims and perpetrators.
To date, TechCrunch has calculated at least 26 spyware features that have leaked, exposed or otherwise poured in recent years. With our counting, this is at least the fourth security delay included by thetruthspy.
TechCrunch has verified vulnerability by providing the researcher with the username of many testing accounts. The researcher quickly changed the passwords to the accounts. Wade tried to get in touch with the theetruthspy owner to alert him to the defect, but received no answer.
When he came into contact with TechCrunch, Spyware’s director Van (Vardy) Thieu said, he said the source code was “lost” and could not correct the error.
Since the publication, vulnerability still exists and has a significant risk for thousands of people whose phones are believed to be unknowingly compromised by the Thetruthspy Spyware.
Given the danger to the general public, we do not describe the vulnerability in more detail so as not to help the malicious actors.
A brief story of the many Thetruthspy Security defects
Thetruthspy is a spyware production with roots that have returned to almost a decade. For some time, the Spyware network was one of the largest known telephone monitoring businesses on the internet.
Thetruthspy is developed by 1byte software, a spyware manufacturer based in Vietnam led by Thieu, his director. Thetruthspy is one of the fleets of Spyware Android applications with a different name, including Copy99And since the trademarks of ISPYOO, MXSPY and more. Spyware applications share the same back-end checks used by TheTruthspy customers to access the victim’s stolen phone data.
Therefore, safety errors in thetruthspy also affect the customers and victims of any spyware with a surname or platinum based on the TheTruthspy underlying code.
As part of a Stalkerware research in 2021, TechCrunch found that Theetruthspy had a security error that exposes the private data of its 400,000 victims to anyone online. Exposed data included the most personal details of victims, including private messages, photos, call records and their location historical data.
TechCrunch later received a cache from the TheTruthspy servers, exposing the internal operation of Spyware. The files also contained a list of each Android device that is at stake by the Thetruthspy or one of its accompanying applications. While the list of devices did not contain enough information to personally locate each victim, it allowed TechCrunch to create a spyware search tool for any possible victim to check if their phone was found in the list.
Our subsequent report, based on hundreds of 1Byte servers’ leaks that were sent to TechCrunch, revealed that thetruthspy was based on a huge money legalization operation that used forged documents and false identities with skirt restrictions. The plan has allowed TheTruthspy to channel millions of dollars of illegal customer payments into bank accounts worldwide controlled by exploitation.
At the end of 2023, Theetruthspy had another data breach, exposing private data to another 50,000 new victims. TechCrunch sent a copy of this data and we added the updated files to the search tool.
Thetruthspy, which still exposes data, is reconnected to Phoneparental
As is the case, some of the TheTruthspy businesses rushed and other places re -examined to escape reputation. Thetruthspy still exists today and has maintained much of the bugy source code and vulnerable back-end plates, while redefined as a new spyware application called Phoneparental.
Thieu is still involved in the development of phone monitoring software as well as in continuing surveillance facilitation.
According to a recent analysis of the current infrastructure facing Theetruthspy’s web-Facrugure using public files on the Internet, the function continues to be based on a software stack developed by Thieu called JFramework (which is previously known as the JEXPA frame) Spyware are based on sharing data back to its servers.
In an email, Thieu said he was rebuilding applications from scratch, including a new phone tracking app called myphones.app. A network analysis test performed by TechCrunch shows that myphones.App is based on JFRAMEWORK for back-end work, the same system used by thetruthspy.
TechCrunch has an explanator about how stalkerware is detected and removed from your phone.
Thetruthspy, like other stalkerware exploitation bodies, remains a threat to victims whose phones are at stake in its applications, not only because of the extremely sensitive data they steal, but because these functions are constantly proven that they cannot maintain their victim data safe.
–
If you or someone you know needs help, the national telephone line for approved violence (1-800-799-7233) provides free 24/7 confidential support to victims of home abuse and violence. If you are in an emergency mode, call 911. Coalition against Stalkerware It has resources if you think your phone has been violated by Spyware.
