A security vulnerability in a secret Spyware Android mode called Catwatchful has exhibited thousands of its clients, including its administrator.
The error, discovered by Eric Daigle Security Researcher, was poured the full spyware application for e -mail addresses and PlainText passwords used by Catwatchful customers to access the data stolen from their victims’ phones.
Catwatchful is the spyware that disguises as a children’s monitoring application that claims to be “invisible and cannot be detected” while uploading the private content of the victim’s phone to a control panel that can be viewed by the person who put the application. The stolen data includes photos of victims, messages and site data in real time. The application can also take remotely to the living environment of the environment from the microphone of the phone and have access to both the front and the rear phone cameras.
Spyware applications, such as Catwatchful, are prohibited by application stores and based on download and planted by someone with a person’s natural access. Therefore, these applications are usually referred to as “stalkerware” (or spouseware) for their tendency to facilitate the non -consensual surveillance of spouses and romantic partners, which are illegal.
Catwatchful is the last example of an increasing list of Stalkerware functions that have been violated, violated or otherwise exposed the data it acquires and is at least the fifth Spyware feature this year to experience a data leak. The incident shows that consumer spyware is still multiplying, despite being prone to poor coding and security failures that expose both customers who pay and unsuspecting victims in data violations.
According to a copy of the database from the beginning of June, which has been seen by TechCrunch, Catwatchful had email addresses and passwords to more than 62,000 customers and phone data from 26,000 victims.
Most of the compromised devices were in Mexico, Colombia, India, Peru, Argentina, Ecuador and Bolivia (in order of the number of victims). Some of the files date back to 2018, the data show.
The Catwatchful database also revealed the identity of Spyware manager Omar Soca Charcov, a Uruguay -based developer. Charcov opened our messages, but did not respond to our requests for comments he sent to both English and Spanish. TechCrunch asked if he was aware of the Catwatchful data breach, and if he plans to reveal the incident to his clients.
Without clear indication that Charcov will reveal the incident, TechCrunch provided a copy of the catwatchful database to the Data Breathing Alert Service I have passed.
Catwatchful hosting data spyware to Google servers
Daigle, a security researcher in Canada, who has previously explored stalkerware abuses, in detail his findings in a blog.
According to Daigle, Catwatchful uses an API customized API, which each of the Android -planted applications is based on communication and data sending to Catwatchful servers. Spyware also uses Google’s Firebase, a tissue and mobile development platform, to host and store the victim’s stolen telephone data, including photos and environmental recordings.
Daigle told TechCrunch that the API was not authentic, allowing anyone on the Internet to interact with the Catwatchful user database without the need for a connection, which exposed the entire Catwatchful database of the Customer Passwords.
When it came into contact with TechCrunch, the Web company hosting the Catwatchful API suspended Spyware’s accounter account, briefly blocking Spyware from the operation, but the API later returned to the hostgator. A Hostgator spokesman, Kristen Andrews, did not respond to comments about the company that hosted Spyware’s activities.
TechCrunch has confirmed that Catwatchful uses Firebase by downloading and installing Catwatchful Spyware on a virtual Android device, which allows us to run Spyware in a secluded sandbox without giving it real world data, such as our location.
We looked at the circulation of the network flowing inside and outside the device, which showed data from the phone it uploaded to a particular fire appearance used by Catwatchful to accommodate the victim’s stolen data.
After TechCrunch provided Google copies of malicious software, Google said it added new protection for Google Play ProtectA security tool that scans Android phones for malicious applications such as spyware. Now, Google Play Protect will alert users when detecting Catwatchful Spyware or its installation program on a user’s phone.
TechCrunch also provided Google details on the Firebase presentation involved in storage of data for Catwatchful Operation. Asked if the Stalkerware feature violates Firebase’s terms of service, Google told TechCrunch on June 25 that she was investigating, but will not immediately commit to taking the business.
“All applications that use Firebase products must comply with the terms of service and policies. We are investigating this particular issue and if we find that an application violates, appropriate measures will be taken.
From the publication, Catwatchful remains in Firebase.
Wrong OPSEC exposes Spyware Administrator
Like many Spyware features, Catwatchful does not publicly list its owner or reveals who manages the operation. It is not uncommon for Stalkerware and Spyware operators to hide their true identities, given the legal and reputation of dangers associated with facilitating illegal surveillance.
But a safety accident in the data set on Charcov as a business manager.
A review of the Catwatchful database lists Charcov as the first registration in one of the data of the total data. (In previous spyware -related data violations, some operators have been detected by early files in the database, as developers often test the spyware product on their own devices.)
The data set included the full name, Charcov phone number and the web address of this Firebase presence where the catwatchful database is stored on Google servers.
Charcov’s personal e -mail address, found in the data set, is the same email she quotes on LinkedIn’s page, which has since been set to private. Charcov also set up the Catwatchful Administrator’s e -mail address as the password recovery address to his personal email account at the locking event, which directly connects Charcov to the Catwatchful feature.
How to remove Catwatchful Spyware
While Catwatchful claims that “cannot be uninstalled”, there are ways to detect and remove the application by a device affected.
Before you start, it’s important to have a security plan in placeAs spyware turns off can alert the person who put it in. THE Coalition against Stalkerware It does important work in this area and has resources to help victims and survivors.
Android users can detect Catwatchful, even if they are hidden from viewing, with call 543210 On the keyboard on the Android phone app and then hit the call button. If Catwatchful is installed, the app should appear on your screen. This code is a built -in backdoor feature that allows anyone planting the application to regain access to the settings as soon as the application is hidden. This code can also be used by anyone to see if the application is installed.


In terms of removal of the application, TechCrunch has a general guide to removing Android Spyware that can help you identify and remove the common stalkerware types and then enable the various settings you need to secure your Android device.
–
If you or someone you know needs help, the national telephone line for approved violence (1-800-799-7233) provides free 24/7 confidential support to victims of home abuse and violence. If you are in an emergency mode, call 911. Coalition against Stalkerware It has resources if you think your phone has been violated by Spyware.
