Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Microsoft hires Sequoia-backed AI collaboration platform team Cove

Cyberattack on vehicle breathalyzer company leaves drivers stranded in US

AI startups are eating up the venture industry, and the returns, so far, are good

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Microsoft is retiring some of the Copilot AI bloat on Windows

    21 March 2026

    The best AI investment may be in energy technology

    20 March 2026

    Bot traffic to overtake human traffic by 2027, says Cloudflare CEO

    20 March 2026

    Multiverse Computing is pushing its compressed AI models into the mainstream

    19 March 2026

    Sam Altman’s thank you to coders draws memes

    19 March 2026
  • Apps

    Google is introducing a new way for users to download Android apps that still protects against fraud

    21 March 2026

    Meta launches new AI content enforcement systems while reducing reliance on third-party vendors

    20 March 2026

    Bluesky Announces $100M Series B After CEO Transition

    20 March 2026

    Amazon is bringing Alexa+ to the UK

    19 March 2026

    Rebel Audio is a new AI podcasting tool aimed at first-time creators

    19 March 2026
  • Crypto

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025

    MoviePass opens Mogul fantasy league game to the public

    29 October 2025
  • Fintech

    Amid legal turmoil, Kalshi is temporarily banned in Nevada

    20 March 2026

    Nominations for the Startup Battlefield 200 are still open

    19 March 2026

    Kalshi’s legal woes pile up as Arizona files first criminal charges for ‘illegal gambling operation’

    17 March 2026

    Fuse raises $25M to disrupt legacy loan origination systems used by US credit unions

    16 March 2026

    India neobank Fi removes banking services on its platform

    11 March 2026
  • Hardware

    Amazon is working on a new smartphone with Alexa at its core, the report says

    20 March 2026

    CEO Carl Pei says nothing about smartphone apps disappearing as they’re replaced by artificial intelligence agents

    18 March 2026

    MacBook Neo, AirPods Max 2, iPhone 17e and everything else Apple announced this month

    18 March 2026

    Oura enters India’s smart ring market with Ring 4

    17 March 2026

    Apple quietly launches AirPods Max 2

    17 March 2026
  • Media & Entertainment

    Tubi joins forces with popular TikTokers to create original streaming content

    19 March 2026

    Patreon CEO calls AI companies’ fair use argument ‘bogus’, says creators should be paid

    18 March 2026

    Meet Vurt, the first mobile streaming platform for indie filmmakers embracing vertical video

    18 March 2026

    BuzzFeed debuts AI applications for new revenue

    17 March 2026

    Facebook makes it easy for creators to report copycats

    14 March 2026
  • Security

    The US accuses the Iranian government of operating a hacktivist group that hacked the Stryker

    20 March 2026

    CISA Urges Companies to Secure Microsoft Intune Systems After Hackers Mass Wipe Stryker Devices

    20 March 2026

    FBI seizes websites of pro-Iranian hacker group after devastating Stryker attack

    19 March 2026

    FBI is buying location data to track US citizens, director confirms

    19 March 2026

    Russians caught stealing personal data from Ukrainians with new advanced iPhone hacking tools

    18 March 2026
  • Startups

    Microsoft hires Sequoia-backed AI collaboration platform team Cove

    21 March 2026

    Consumer-focused privacy firm Cloaked raises $375 million as it expands into the enterprise

    20 March 2026

    Tools for founders to navigate and move past conflicts

    20 March 2026

    Anori, Alphabet’s new X spinout, faces one of the world’s most expensive bureaucratic nightmares

    19 March 2026

    This startup wants to make enterprise software more like a prompt

    19 March 2026
  • Transportation

    Cyberattack on vehicle breathalyzer company leaves drivers stranded in US

    21 March 2026

    Arc expands into electric commercial and defense vessels with $50M raise

    20 March 2026

    Rivian Sacrifices 2027 Profit Target to Push Deeper into Autonomy

    20 March 2026

    K2 will launch its first high-powered computing satellite into space

    19 March 2026

    EV startup Harbinger unveils smaller work truck with electric and hybrid variants

    18 March 2026
  • Venture

    AI startups are eating up the venture industry, and the returns, so far, are good

    21 March 2026

    Sequen raised $16 million to bring TikTok-style personalization technology to any consumer company

    19 March 2026

    AI ‘boys club’ could widen wealth gap for women, says Rana el Kaliouby

    18 March 2026

    Billionaires made a promise – now some want to leave

    17 March 2026

    Antonio Gracias Says He Longs For ‘Pre-Entropic’ Startups – Those Built To Survive Chaos

    17 March 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»Stalkerware Cocospy and Spyic applications are exposed to millions of people phone
Security

Stalkerware Cocospy and Spyic applications are exposed to millions of people phone

techtost.comBy techtost.com23 February 202507 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Stalkerware Cocospy And Spyic Applications Are Exposed To Millions Of
Share
Facebook Twitter LinkedIn Pinterest Email

A safety vulnerability to a pair of phone tracking applications exposes the personal data of millions of people who have unintentionally installed applications on their devices, according to a security researcher who found the defect.

The error allows anyone to access personal data – messages, photos, call logs and many more – exhausted by any phone or tablet at stake by Cocospy and Spyic, two different branded stalkerware mobile applications that share largely same source code. The error also exposes the email addresses of people who signed Cocospy and Spyic to plant the application on someone’s device to keep track of them secretly.

Like other species of spyware, products such as Cocospy and Spyic are designed to remain hidden on a victim’s device, while they are constantly concealed and constantly uploading their device data to a board visible by the person planted in the application. By nature, how secret the spyware can be, the majority of phone owners probably do not know that their devices have been at stake.

Cocospy and Spyic operators did not return TechCrunch’s request for comments, nor have they set the error at the time of the publication.

The error is relatively simple in exploitation. Therefore, TechCrunch does not publish specific details of vulnerability, so as not to help the bad actors exploit and further expose the sensitive personal data of people whose devices have already been tested by Cocospy and Spyic.

The security investigator who found the error told TechCrunch that it allows anyone to access the email address of the person who signed any of the two phone tracking applications.

The researcher collected 1.81 million Cocospy customers’ email addresses and 880,167 Spyic customer email addresses, taking advantage of the error to scratch data from applications. The researcher provided the cache of the email addresses to Troy Hunt, who is performing data breach notice service I have passed.

Hunt told TechCrunch that it loaded a total of 2.65 million unique email addresses registered with Cocospy and Spyic to have passed after having removed dual email addresses that appeared on both lots of data. Hunt said that as with previous data -related data violations, Cocospy and Spyic Cache characterized as “sensitive”, I did pwned, which means that only the person with an infected email address can look for if his information is there.

Cocospy and Spyic are the last in a long list of surveillance products that have experienced safety accidents in recent years, often as a result of erroneous or bad security practices. The number of TechCrunch, Cocospy and Spyic are now among the 23 well -known surveillance operations since 2017 that have been violated, violated or otherwise exposed and the very sensitive data of customers and victims online.

Phone monitoring applications such as Cocospy and Spyic are usually sold as parental control or surveillance applications, but are often referred to as stalkerware (or spouseware), as some of these products explicitly promote their internet applications as a medium spy to a spouse of a person or romantic partner without their knowledge, which is illegal. Even in the case of mobile monitoring applications that are not explicitly available in the trade for malicious activity, customers often still use these applications for seemingly illegal purposes.

Stalkerware applications are prohibited by app stores and so they are usually downloaded directly by the stalkerware provider. As a result, Stalkerware applications usually require physical access to someone’s Android device, often with previous knowledge of the victim’s Passcode code. In the case of iPhones and iPads, Stalkerware may use the data of a person who are stored in the Apple Curly Storage Service, which requires the use of Apple’s stolen account credentials.

Stalkerware with a China Nexus

A little more is known for these two Spyware features, including who Runs Cocospy and Spyic. Stalkerware operators often try to avoid the attention of the public, given the reputation and legal risks that are in line with surveillance businesses.

Cocospy and Spyic started in 2018 and 2019, respectively. Of the number of registered users only, Cocospy is one of the largest known Stalkerware functions that go today.

Vangelis Stykas and Felipe Solferini Security Researchers, who analyzed several Stalkerware families As part of a research project 2022It found data linking the operation of Cocospy and Spyic to 711.icu, a China -based mobile phone developer, whose website is no longer loaded.

This week, TechCrunch installed Cocospy and Spyic applications on a virtual device (which allows us to run applications in a safe sandbox without giving any of the spy services any real world data, such as our location). Both Stalkerware applications are disguised as a “System Service” app for Android, which seems to avoid detecting by mixing Android applications.

We used a network analysis tool to track the data flowing in and out of the application to understand how spyware functions work, what data sharing and where the servers are.

Our traffic analysis found that the application sent our virtual device data through Cloudflare, a network security provider that violates the real location of the real world and the Spyware Function Host. But internet traffic has shown that the two Stalkerware applications were uploaded victims, such as photos, on a cloud storage server hosted on Amazon Web Services.

Amazon spokesman Ryan Walsh would not say whether the company plans to take action against the Spyware business hosted in its cloud. Cloudflare did not respond to TechCrunch surveys on Stalkerware.

The analysis also showed that while the application is used, the server will occasionally respond to state or error messages in Chinese, suggesting that applications are developed by someone with a connection to China.

What can you do to remove stalkerware

E -mail addresses that have been e -mail from Cocospy and Spyic allow anyone who plants applications to determine if their information (and victim data) are at stake. But the data does not contain enough recognizable information to alert people whose phones are at stake.

However, there are things you can do to check if your phone is at stake by Cocospy and Spyic. Like most stalkerware, both of these applications are based on a person who deliberately weaken security settings on an Android device to plant applications – or in the case of iPhones and iPads, access to the Apple’s Apple account of the password.

Although both Cocospy and Spyic try to hide, displaying as a general application called “System Service”, there are ways to locate them.

With Cocospy and Spyic, you can usually enter ✱✱001✱✱ On the Android application keyboard and then press the “Call” button to display the Stalkerware apps on the screen-if installed. It is a feature that is integrated into Cocospy and Spyic to allow the person planting the application to the victim’s device to retrieve access. In this case, the operation can also be used by the victim to determine if the application is installed.

You can also check your installed applications via the apps menu in the Android setting menu, even if the app is hidden from viewing.

Cocospy and Spyic Stalkerware applications are disguised as a “System Service” application.Image credits:Technological

TechCrunch has a general Android Spyware removal guide that can help you detect and remove common types of phone stalkerware. Remember to have a security plan in placeSince the spyware disabling can alert the person who put it.

For Android users, activating Google Play Protect It is a useful assurance that can protect against malicious Android applications, including stalkerware. You can activate it from Google Play Settings menu if it is not already enabled.

And if you are an iPhone and iPad user and you think you may be violated, check that your Apple account uses a long and unique password (ideally stored in password manager) and that your account also has Activated two -factor authentication. You should also check and Remove any devices from your account that you don’t recognize.


If you or someone you know needs help, the national telephone line for approved violence (1-800-799-7233) provides free 24/7 confidential support to victims of home abuse and violence. If you are in an emergency mode, call 911. Coalition against Stalkerware It has resources if you think your phone has been violated by Spyware.

Contact Zack Whittaker safely in Signal and Whatsapp at +1 646-755-8849. You can also share documents safely with TechCrunch via Safe.

Was informed with a response from Amazon.

Android Applications Cocospy cyberspace exposed iPad millions people phone Spyic stalkerware
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGuidde puts AI to help create software training videos
Next Article Explore the Apple TV’s Apple TV’s electronic “departure” world
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Google is introducing a new way for users to download Android apps that still protects against fraud

21 March 2026

The US accuses the Iranian government of operating a hacktivist group that hacked the Stryker

20 March 2026

CISA Urges Companies to Secure Microsoft Intune Systems After Hackers Mass Wipe Stryker Devices

20 March 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Microsoft hires Sequoia-backed AI collaboration platform team Cove

21 March 2026

Cyberattack on vehicle breathalyzer company leaves drivers stranded in US

21 March 2026

AI startups are eating up the venture industry, and the returns, so far, are good

21 March 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Amid legal turmoil, Kalshi is temporarily banned in Nevada

20 March 2026

Nominations for the Startup Battlefield 200 are still open

19 March 2026

Kalshi’s legal woes pile up as Arizona files first criminal charges for ‘illegal gambling operation’

17 March 2026
Startups

Microsoft hires Sequoia-backed AI collaboration platform team Cove

Consumer-focused privacy firm Cloaked raises $375 million as it expands into the enterprise

Tools for founders to navigate and move past conflicts

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.