Data Leak from Spying Apps Cocospy and Spyic Exposes Personal Information of Millions of Users

Cybersecurity experts have uncovered a massive data leak in the tracking apps Cocospy and Spyic, linked to Chinese developers and affecting millions of users. These apps are designed to covertly monitor phones, are classified as stalkerware, and allow attackers to collect victims’ data – messages, photos, calls, and other information.

Image source: Kandinsky

Due to the identified bug, the personal data of millions of users, including the email addresses of those who installed these applications, became available in the public space. The researcher who identified the vulnerability collected 1.81 million email addresses of Cocospy users and 880 thousand addresses of Spyic users. According to TechCrunch, this data was transferred to Troy Hunt, the creator of the Have I Been Pwned service, where it was added to the leak database. In total, 2.65 million unique addresses were identified.

Stalkerware, including Cocospy and Spyic, is often sold as parental or corporate monitoring software, but is actually used to illegally spy on business partners and others. TechCrunch has found that both programs are linked to a Chinese app developer called 711.icu, whose website is now down. Cocospy and Spyic disguise themselves as system apps on Android, and transmit user data through Amazon Web Services and Cloudflare servers. Analysis of network traffic shows that the servers periodically respond to requests with messages in Chinese.

Installing such apps usually requires physical access to an Android device, often with knowledge of the device’s password. In the case of iPhones and iPads, stalkerware can access device data without physical access via Apple’s iCloud cloud storage, although this would require the use of stolen Apple credentials.

A method is proposed to determine the presence of these applications on the smartphone and remove them. On Android devices, Cocospy and Spyic can be detected by typing ✱✱001✱✱ on the phone keyboard. You can also find them directly through the system settings. iPhone and iPad users are advised to check the Apple ID settings, enable two-factor authentication and make sure that there is no unfamiliar data in the account. For Android, a useful function would be to activate Google Play Protect.

It is worth saying that any spy apps are prohibited in official app stores and require physical access to the device for installation. Installing such apps is illegal and entails legal consequences, as it violates personal privacy.

admin

Share
Published by
admin

Recent Posts

Nissan Leaf EV to Become NACS-Ported Compact Crossover in Third Generation

Nissan Leaf can rightfully be considered a long-liver of the electric car market, since the…

3 days ago

OpenAI expects to more than triple its revenue this year and then double it next year.

OpenAI, the market leader in generative artificial intelligence systems, remains nominally a startup, its financial…

3 days ago

OpenAI Decides to Hold 4o Image Generation Launch for Free Users

OpenAI has been forced to delay the release of ChatGPT's built-in image generator for free…

3 days ago

1440p and 240Hz for just $200: Xiaomi updates the 27-inch Redmi G27Q gaming monitor

Xiaomi continues to update its Redmi G27Q gaming monitor every year. The model was first…

3 days ago

Beware, Android is shutting down: OS development will cease to be public, but there is no reason to panic

Android device makers can significantly customize the look and feel of the operating system, but…

3 days ago

Fake GeForce RTX 4090s with RTX 3090 chips have started popping up in China — craftsmen are even changing the GPU markings

In China, scammers have started selling GeForce RTX 3090 graphics cards, passing them off as…

3 days ago