Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

CISA Urges Companies to Secure Microsoft Intune Systems After Hackers Mass Wipe Stryker Devices

Tools for founders to navigate and move past conflicts

Rivian Sacrifices 2027 Profit Target to Push Deeper into Autonomy

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Bot traffic to overtake human traffic by 2027, says Cloudflare CEO

    20 March 2026

    Multiverse Computing is pushing its compressed AI models into the mainstream

    19 March 2026

    Sam Altman’s thank you to coders draws memes

    19 March 2026

    The Pentagon is developing alternatives to Anthropic, the report said

    18 March 2026

    Mistral bets on ‘build your own AI’, as with OpenAI, Anthropic in business

    18 March 2026
  • Apps

    Bluesky Announces $100M Series B After CEO Transition

    20 March 2026

    Amazon is bringing Alexa+ to the UK

    19 March 2026

    Rebel Audio is a new AI podcasting tool aimed at first-time creators

    19 March 2026

    Google’s Personal Intelligence feature is expanding to all US users

    18 March 2026

    Kagi brings its “small web” of an all-human web to mobile devices

    18 March 2026
  • Crypto

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025

    MoviePass opens Mogul fantasy league game to the public

    29 October 2025
  • Fintech

    Nominations for the Startup Battlefield 200 are still open

    19 March 2026

    Kalshi’s legal woes pile up as Arizona files first criminal charges for ‘illegal gambling operation’

    17 March 2026

    Fuse raises $25M to disrupt legacy loan origination systems used by US credit unions

    16 March 2026

    India neobank Fi removes banking services on its platform

    11 March 2026

    X taps William Shatner to give invitations to his payment service, X Money

    4 March 2026
  • Hardware

    CEO Carl Pei says nothing about smartphone apps disappearing as they’re replaced by artificial intelligence agents

    18 March 2026

    MacBook Neo, AirPods Max 2, iPhone 17e and everything else Apple announced this month

    18 March 2026

    Oura enters India’s smart ring market with Ring 4

    17 March 2026

    Apple quietly launches AirPods Max 2

    17 March 2026

    The MacBook Neo is “the most repairable MacBook” in years, according to iFixit

    16 March 2026
  • Media & Entertainment

    Tubi joins forces with popular TikTokers to create original streaming content

    19 March 2026

    Patreon CEO calls AI companies’ fair use argument ‘bogus’, says creators should be paid

    18 March 2026

    Meet Vurt, the first mobile streaming platform for indie filmmakers embracing vertical video

    18 March 2026

    BuzzFeed debuts AI applications for new revenue

    17 March 2026

    Facebook makes it easy for creators to report copycats

    14 March 2026
  • Security

    CISA Urges Companies to Secure Microsoft Intune Systems After Hackers Mass Wipe Stryker Devices

    20 March 2026

    FBI seizes websites of pro-Iranian hacker group after devastating Stryker attack

    19 March 2026

    FBI is buying location data to track US citizens, director confirms

    19 March 2026

    Russians caught stealing personal data from Ukrainians with new advanced iPhone hacking tools

    18 March 2026

    Stryker says it is restoring systems after pro-Iranian hackers wiped out thousands of employee devices

    17 March 2026
  • Startups

    Tools for founders to navigate and move past conflicts

    20 March 2026

    Anori, Alphabet’s new X spinout, faces one of the world’s most expensive bureaucratic nightmares

    19 March 2026

    This startup wants to make enterprise software more like a prompt

    19 March 2026

    H&M wants to make clothes out of CO2 using this startup’s technology

    18 March 2026

    Why Garry Tan’s Claude Code setup has gotten so much love and hate

    18 March 2026
  • Transportation

    Rivian Sacrifices 2027 Profit Target to Push Deeper into Autonomy

    20 March 2026

    K2 will launch its first high-powered computing satellite into space

    19 March 2026

    EV startup Harbinger unveils smaller work truck with electric and hybrid variants

    18 March 2026

    Rivian spin-out Mind Robotics raises $500M for AI-powered industrial robots

    17 March 2026

    Drivers in fatal Ford BlueCruise crashes were likely distracted before the crash

    17 March 2026
  • Venture

    Sequen raised $16 million to bring TikTok-style personalization technology to any consumer company

    19 March 2026

    AI ‘boys club’ could widen wealth gap for women, says Rana el Kaliouby

    18 March 2026

    Billionaires made a promise – now some want to leave

    17 March 2026

    Antonio Gracias Says He Longs For ‘Pre-Entropic’ Startups – Those Built To Survive Chaos

    17 March 2026

    Founded by a father-son duo, Nyne gives AI agents the human context they’ve been missing

    14 March 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»Amazon is still hosting weeks of stalkerware victims after breach notice
Security

Amazon is still hosting weeks of stalkerware victims after breach notice

techtost.comBy techtost.com14 March 202506 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Amazon Is Still Hosting Weeks Of Stalkerware Victims After Breach
Share
Facebook Twitter LinkedIn Pinterest Email

Amazon will not say if it plans to take action against three telephone applications that store the TROVES of the private data of people on Amazon’s Cloud servers, despite the fact that TechCrunch alerts technological giant weeks earlier that it hosts stolen telephone data.

Amazon told TechCrunch that “followed [its] Procedure “Following the announcement of February, but since the publication of this article, Stalkerware Cocospy, Spyic and Spyzie have continued to upload and store photos that have been isolated from people’s phones to Amazon Web services.

Cocospy, Spyic and Spyzie are almost three identical Android applications that share the same source code and a common security error, according to a security researcher who discovered it and provided details to TechCrunch. The researcher revealed that the functions exposed the phone data to a collective 3.1 million people, many of whom are victims without the idea that their devices have been violated. The researcher shared the data with the breach alert website I have passed.

As part of our Stalkerware research, which included the analysis of the applications themselves, TechCrunch found that some of the contents of a device undermined by Stalkerware applications are downloaded to storage servers managed by Amazon Web or AWS services.

TechCrunch informed Amazon on February 20 by emailing that it hosts the data evolved by Cocospy and Spyic again earlier this week, when we alerted Amazon, also hosted stolen phone data outraged by Spyzie.

In both emails, TechCrunch included the name of each particular “bucket” hosted by Amazon, which contains data obtained from victims’ phones.

In response, Amazon’s spokesman Ryan Walsh told TechCrunch: “AWS has clear terms that require our customers to use our services in accordance with applicable laws. When we receive reports of possible violations of our terms, we act quickly to review and take measures to disable.” A link to an Amazon website that hosts an abuse reference form, but will not comment on the status of Amazon servers used by applications.

In a tracking email this week, TechCrunch refers to the previous email on February 20 which included the storage bucket names hosted by Amazon.

In response, Walsh thanked TechCrunch for “bringing this to our attention”, and provided another Amazon reporting link. When asked again if Amazon plans to take action against the buckets, Walsh replied: “We have not yet received a report by TechCrunch through the link we provide earlier.”

Amazon Casey McGee spokesman, who was copied to the e -mail thread, claimed to be “TechCrunch’s inaccurate to characterize the essence of this thread as a [sic] constituting a “report” of any possible abuse “.

Amazon Web Services, which has a commercial interest in maintaining payment customers, earned $ 39.8 billion in profits during 2024, per The profits of the company 2024 of the whole yearwhich represents a majority share in Amazon’s total annual income.

The storage bins used by Cocospy, Spyic and Spyzie are still active since the publication.

Because it matters

His own Amazon Accepted It generally explains what the company allows to accommodate customers on its platform. Amazon does not seem to dispute that it excludes Spyware and Stalkerware to upload data to its platform. Instead, the difference of Amazon seems to be entirely procedural.

It is not the job of a journalist – or anyone else – to police what is hosted on the Amazon platform or the cloud platform of any other company.

Amazon has huge resources, both economically and technologically, to use it to impose its own policies, ensuring that bad bodies do not abuse its service.

In the end, TechCrunch alerted Amazon, including information that immediately shows the sites of private data theft. Amazon made a choice not to act for the information it received.

How did we find the victims’ data hosted on Amazon

When TechCrunch learns of data-related data violation-have been in the last few years-we have been in the last few years-we are studying to learn the work as much as possible.

Our research can help identify victims whose phones have been tired, but they can also reveal the often hidden identity of the surveillance operators themselves, as well as the platforms used to facilitate surveillance or accommodate the stolen data. TechCrunch will also analyze applications (where applications) to help victims determine how applications are detected and removed.

As part of our reporting process, TechCrunch will approach any company we recognize as hosting or supporting Spyware and Stalkerware, such as the usual practice for journalists planning to report a company in a story. It is also not uncommon for companies, such as web hosts and payment processors, suspension of accounts or the abolition of data that violate their own terms of service, including previous Spyware features hosted in Amazon.

In February, TechCrunch learned that Cocospy and Spyic had been violated and we started exploring further.

Since the data showed that the majority of victims were owners of Android device, TechCrunch started recognizing, receiving and installing Cocospy and Spyic applications on a virtual Android device. (A virtual device allows us to run Stalkerware applications in a protected sandbox without either applying in real world, such as our location.) Both Cocospy and Spyic have appeared as identical applications and non -described applications called “System Service” trying to avoid detecting with the mixed applications with the applications. Android.

We have used a network release tool to inspect the data flowing in and out of applications, which can help understand the way in which each application works and determine which telephone data is secretly downloaded from our test device.

Internet traffic has shown that the two Stalkerware applications have been downloaded victims, such as photos, to their nominal storage buckets hosted on Amazon Web Services.

A screenshot of a photo, hosted on Amazon Web Services, uploaded via Android virtual device that deliberate Image credits:Technological

We have confirmed this further by connecting the Cocospy and Spyic control panels, which allow people who plant stalkerware to see the stolen target data. The web control panels allowed us to access the contents of the Android Virtual Photo Collection, when we were deliberately at stake we have at stake in our virtual device with Stalkerware applications.

When we opened the contents of the photo collection of our device from the control panel of each application, the images loaded by web addresses containing the corresponding bucket names hosted in the amazonaws.com Sector, run by Amazon Web services.

Following a news about Spyzie’s data violation, TechCrunch also analyzed Spyzie’s Android app using a network analysis tool and found that the traffic data is identical to Cocospy and Spyic. The Spyzie app also uploaded the data of victims’ devices with its own storage cable to the Amazon cloud, which we alerted Amazon on March 10.


If you or someone you know needs help, the national telephone line for approved violence (1-800-799-7233) provides free 24/7 confidential support to victims of home abuse and violence. If you are in an emergency mode, call 911. Coalition against Stalkerware It has resources if you think your phone has been violated by Spyware.

Amazon AWS breach Exclusive hosting notice Spyware software stalkerware victims Web Amazon services weeks
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMinimalist Light Phone III starts March 27
Next Article Openai’s “Creative Writing” causes this annoying kid from the Gymnasium Gymnasium
bhanuprakash.cg
techtost.com
  • Website

Related Posts

CISA Urges Companies to Secure Microsoft Intune Systems After Hackers Mass Wipe Stryker Devices

20 March 2026

Rivian Sacrifices 2027 Profit Target to Push Deeper into Autonomy

20 March 2026

FBI seizes websites of pro-Iranian hacker group after devastating Stryker attack

19 March 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

CISA Urges Companies to Secure Microsoft Intune Systems After Hackers Mass Wipe Stryker Devices

20 March 2026

Tools for founders to navigate and move past conflicts

20 March 2026

Rivian Sacrifices 2027 Profit Target to Push Deeper into Autonomy

20 March 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Nominations for the Startup Battlefield 200 are still open

19 March 2026

Kalshi’s legal woes pile up as Arizona files first criminal charges for ‘illegal gambling operation’

17 March 2026

Fuse raises $25M to disrupt legacy loan origination systems used by US credit unions

16 March 2026
Startups

Tools for founders to navigate and move past conflicts

Anori, Alphabet’s new X spinout, faces one of the world’s most expensive bureaucratic nightmares

This startup wants to make enterprise software more like a prompt

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.