A hacktivist has scraped greater than half-a-million cost data from a supplier of consumer-grade “stalkerware” cellphone surveillance apps, exposing the e-mail addresses and partial cost info of shoppers who paid to spy on others.
The transactions include data of funds for cellphone monitoring companies like Geofinder and uMobix, in addition to companies like Peekviewer (previously Glassagram), which purport to permit entry to personal Instagram accounts, amongst a number of different monitoring and monitoring apps supplied by the identical vendor, a Ukrainian firm referred to as Struktura.
The client knowledge additionally contains transaction data from Xnspy, a identified cellphone surveillance app, which in 2022 spilled the non-public knowledge from tens of 1000’s of unsuspecting folks’s Android gadgets and iPhones.
That is the newest instance of a surveillance vendor exposing the data of its clients on account of safety flaws. Over the previous few years, dozens of stalkerware apps have been hacked, or have managed to lose, spill, or expose folks’s non-public knowledge — typically the victims themselves — due to shoddy cybersecurity by the stalkerware operators.
Contact Us
To contact Zack Whittaker securely, attain out through Sign username zackwhittaker.1337. Contact Lorenzo Franceschi-Bicchierai securely on Sign at +1 917 257 1382, or through Telegram, Keybase and Wire @lorenzofb, or e-mail.
Stalkerware apps like uMobix and Xnspy, as soon as planted on somebody’s cellphone, add the sufferer’s non-public knowledge, together with their name data, textual content messages, photographs, looking historical past, and exact location knowledge, which is then shared with the one who planted the app.
Apps like UMobix and Xnspy have explicitly marketed their companies for folks to spy on their spouses and home companions, which is illegitimate.
The information, seen by TechCrunch, included about 536,000 strains of buyer e-mail addresses, which app or model the client paid for, how a lot they paid, the cost card sort (comparable to Visa or Mastercard), and the final four-digits on the cardboard. The client data didn’t embody dates of funds.
TechCrunch verified the info was genuine by taking a number of transaction data containing disposable e-mail addresses with public inboxes, comparable to Mailinator, and working them by the varied password reset portals supplied by the varied surveillance apps. By resetting the passwords on accounts related to public e-mail addresses, we decided that these have been actual accounts.
We additionally verified the info by matching every transaction’s distinctive bill quantity from the leaked dataset with the surveillance vendor’s checkout pages. We might do that as a result of the checkout web page allowed us to retrieve the identical buyer and transaction knowledge from the server with no need a password.
The hacktivist, who goes by the moniker “wikkid,” instructed TechCrunch they scraped the info from the stalkerware vendor due to a “trivial” bug in its web site. The hacktivist stated they “have enjoyable concentrating on apps which are used to spy on folks,” and subsequently printed the scraped knowledge on a identified hacking discussion board.
The hacking discussion board itemizing lists the surveillance vendor as Ersten Group, which presents itself as a U.Okay.-presenting software program improvement startup.
TechCrunch discovered a number of e-mail addresses within the dataset used for testing and buyer assist as a substitute reference Struktura, a Ukrainian firm that has an equivalent web site to Ersten Group. The earliest report within the dataset contained the e-mail deal with for Struktura’s chief govt, Viktoriia Zosim, for a transaction of $1.
Representatives for Ersten Group didn’t reply to our requests for remark. Struktura’s Zosim didn’t return a request for remark.

