Connect with us

Tech

Hacked, leaked, exposed: Why you should never use stalkerware apps

There is a whole shady industry for people who want to monitor and spy on their families. Multiple app makers promote and advertise their software — often referred to as stalkerware — to jealous partners who can use these apps to access their victims’ phones remotely.  

Yet, despite how sensitive this personal data is, an increasing number of these companies are losing huge amounts of it.  

According to TechCrunch’s ongoing tally, including the most recent data spill involving uMobix, there have been at least 27 stalkerware companies since 2017 that are known to have been hacked or leaked customer and victims’ data online. 

That’s not a typo. Dozens of stalkerware companies have either been hacked or had a significant data exposure in recent years. And at least four stalkerware companies were hacked multiple times.

The makers of uMobix and associated mobile tracking apps, like Geofinder and Peekviewer, are the latest stalkerware providers to expose sensitive customer data, after a hacktivist scraped the payment information of more than 500,000 customers and published them online. The hacktivist said they did this as a way to go after stalkerware apps, following in the footsteps of two groups of hacktivists that broke into Retina-X and FlexiSpy almost a decade ago.

The uMobix data leak comes after last year’s breach of Catwatchful, which was used to compromise the phone data of at least 26,000 victims. Catwatchful was just one of several stalkerware incidents in 2025, which included SpyX, and the data exposures of Cocospy, Spyic, and Spyzie surveillance operations, which left messages, photos, call logs, and other personal and sensitive data of millions of victims exposed online, according to a security researcher who found a bug that allowed them to access that data.

Prior to 2025, there were at least four massive stalkerware hacks in 2024. 

The last stalkerware breach in 2024 affected Spytech, a little-known spyware maker based in Minnesota, which exposed activity logs from the phones, tablets, and computers monitored with its spyware. Before that, there was a breach at mSpy, one of the longest-running stalkerware apps, which exposed millions of customer support tickets, which included the personal data of millions of its customers.  

Previously, an unknown hacker broke into the servers of the U.S.-based stalkerware maker pcTattletale. The hacker then stole and leaked the company’s internal data. They also defaced pcTattletale’s official website with the goal of embarrassing the company. The hacker referred to a recent TechCrunch article where we reported pcTattletale was used to monitor several front desk check-in computers at a U.S. hotel chain.  

As a result of this hack, leak, and shame operation, pcTattletale founder Bryan Fleming said he was shutting down his company. Earlier this year, Fleming pled guilty to charges of computer hacking, the sale and advertising of surveillance software for unlawful uses, and conspiracy. 

Consumer spyware apps like uMobix, Catwatchful, SpyX, Cocospy, mSpy, and pcTattletale are commonly referred to as “stalkerware” (or spouseware) because jealous spouses and partners use them to surreptitiously monitor and surveil their loved ones.  

These companies often explicitly market their products as solutions to catch cheating partners by encouraging illegal and unethical behavior. There have been multiple court cases, media investigations and surveys of domestic abuse shelters that show that online stalking and monitoring can lead to cases of real-world harm and violence.

That’s in part why hackers have repeatedly targeted some of these companies. 

Eva Galperin, the director of cybersecurity at the Electronic Frontier Foundation and a leading researcher and activist who has investigated and fought stalkerware for years, said the stalkerware industry is a “soft target.”  

“The people who run these companies are perhaps not the most scrupulous or really concerned about the quality of their product,” Galperin told TechCrunch. 

Given the history of stalkerware compromises, that may be an understatement. And because of the lack of care for protecting their own customers — and consequently the personal data of tens of thousands of unwitting victims — using these apps is doubly irresponsible. The stalkerware customers may be breaking the law, abusing their partners by illegally spying on them, and, on top of that, putting everyone’s data in danger. 

A history of stalkerware hacks

The flurry of stalkerware breaches began in 2017 when a group of hackers breached the U.S.-based Retina-X and the Thailand-based FlexiSpy back to back. Those two hacks revealed that the companies had a total number of 130,000 customers all over the world. 

At the time, the hackers who — proudly — claimed responsibility for the compromises explicitly said their motivations were to expose and hopefully help destroy an industry that they consider toxic and unethical. 

“I’m going to burn them to the ground, and leave absolutely nowhere for any of them to hide,” one of the hackers involved then told Motherboard.  

Referring to FlexiSpy, the hacker added: “I hope they’ll fall apart and fail as a company, and have some time to reflect on what they did. However, I fear they might try and give birth to themselves again in a new form. But if they do, I’ll be there.” 

Despite the hack, and years of negative public attention, FlexiSpy is still active today. The same cannot be said about Retina-X. 

The hacker who broke into Retina-X wiped its servers with the goal of hampering its operations. The company bounced back — and then it got hacked again a year later. A couple of weeks after the second breach, Retina-X announced that it was shutting down.  

Just days after the second Retina-X breach, hackers hit Mobistealth and Spy Master Pro, stealing gigabytes of customer and business records, as well as victims’ intercepted messages and precise GPS locations. Another stalkerware vendor, the India-based SpyHuman, encountered the same fate a few months later, with hackers stealing text messages and call metadata, which contained logs of who called who and when.  

Weeks later, there was the first case of accidental data exposure, rather than a hack.  

SpyFone left an Amazon-hosted S3 storage bucket unprotected online, which meant anyone could view and download text messages, photos, audio recordings, contacts, location data, scrambled passwords and login information, Facebook messages, and more. All that data was stolen from victims, most of whom did not know they were being spied on, let alone know their most sensitive personal data was also on the internet for all to see.  

Apart from uMobix, other stalkerware companies that over the years have irresponsibly left customer and victims’ data online include: FamilyOrbit, which left 281 gigabytes of personal data online protected only by an easy-to-find password; mSpy, which leaked over 2 million customer records in 2018; Xnore, which let any of its customers see the personal data of other customers’ targets, including chat messages, GPS coordinates, emails, photos, and more; and MobiiSpy, which left 25,000 audio recordings and 95,000 images on a server accessible to anyone

The list goes on: KidsGuard in 2020 had a misconfigured server that leaked victims’ content; pcTattletale, which prior to its 2024 hack also exposed screenshots of victims’ devices uploaded in real-time to a website that anyone could access; and Xnspy, whose developers left credentials and private keys left in the apps’ code, allowing anyone to access victims’ data; Spyzie, Cocospy and Spyic, which left victims’ messages, photos, call logs, and other personal data, as well as customers’ email addresses, exposed online; and Catwatchful, which exposed the full database of email addresses and plaintext passwords of customers. 

As far as other stalkerware companies that actually got hacked, apart from SpyX earlier in 2025, there was Copy9, which saw a hacker steal the data of all its surveillance targets, including text messages and WhatsApp messages, call recordings, photos, contacts, and brows history; LetMeSpy, which shut down after hackers breached and wiped its servers; and the Brazil-based WebDetetive, which also got its servers deleted, and then hacked again.

There was also OwnSpy, which provides much of the back-end software for WebDetetive, which was hacked; Spyhide, which had a vulnerability in its code that allowed a hacker to access the back-end databases and years of stolen around 60,000 victims’ data; Oospy, which was a rebrand of Spyhide, shut down for a second tim; and mSpy again.Finally there is TheTruthSpy, a network of stalkerware apps, which holds the dubious record of having been hacked or having leaked data on at least three separate occasions

Hacked, but unrepented

Of these 27 stalkerware companies, eight have shut down, according to TechCrunch’s tally.  

In a first and so far unique case, the Federal Trade Commission banned SpyFone and its chief executive, Scott Zuckerman, from operating in the surveillance industry following an earlier security lapse that exposed victims’ data. Another linked operation called SpyTrac shut down following a TechCrunch investigation. Last year, the FTC upheld its ban on Zuckerman. 

PhoneSpector and Highster, two stalkerware apps that are not known to have been hacked, also shut down after New York’s attorney general accused the companies of explicitly encouraging customers to use their software for illegal surveillance.  

But a company closing doesn’t mean it’s gone forever. As with Spyhide and SpyFone, some of the same owners and developers behind a shuttered stalkerware maker simply rebranded.  

“I do think that these hacks do things. They do accomplish things, they do put a dent in it,” Galperin said. “But if you think that if you hack a stalkerware company, that they will simply shake their fists, curse your name, disappear in a puff of blue smoke and never be seen again, that has most definitely not been the case.” 

“What happens most often, when you actually manage to kill a stalkerware company, is that the stalkerware company comes up like mushrooms after the rain,” Galperin added. 

There is some good news. In a report in 2023, security firm Malwarebytes said that the use of stalkerware is declining, according to its own data of customers infected with this type of software. Also, Galperin reports seeing an increase in negative reviews of these apps, with customers or prospective customers complaining they don’t work as intended. 

But, Galperin said that it’s possible that security firms are not as good at detecting stalkerware as they used to be, or stalkers have moved from software-based surveillance to physical surveillance enabled by AirTags and other Bluetooth-enabled trackers. 

“Stalkerware does not exist in a vacuum. Stalkerware is part of a whole world of tech-enabled abuse,” Galperin said.

Say no to stalkerware

Using spyware to monitor your loved ones is not only unethical, it’s also illegal in most jurisdictions, as it’s considered unlawful surveillance.  

That is already a significant reason not to use stalkerware. Then there is the issue that stalkerware makers have proven time and time again that they cannot keep data secure — neither data belonging to the customers nor their victims or targets. 

Apart from spying on romantic partners and spouses, some people use stalkerware apps to monitor their children. While this type of use, at least in the United States, is legal, it doesn’t mean using stalkerware to snoop on your kids’ phone isn’t creepy and unethical.  

Even if it’s used in a lawful way, Galperin thinks parents should not spy on their children without telling them, and without their consent. 

If parents do inform their children and get their go-ahead, parents should stay away from insecure and untrustworthy stalkerware apps, and use parental tracking tools built into Apple phones and tablets and Android devices that are safer and operate overtly.  

Recap of breaches and leaks

Here’s the complete list of stalkerware companies that have been hacked or have leaked sensitive data since 2017, in chronological order:

First published on July 16, 2024 and updated to include uMobix as the latest stalkerware apps to have a security issue.


If you or someone you know needs help, the National Domestic Violence Hotline (1-800-799-7233) provides 24/7 free, confidential support to victims of domestic abuse and violence. If you are in an emergency situation, call 911. The Coalition Against Stalkerware has resources if you think your phone has been compromised by spyware.

source

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Call for speakers: TechCrunch Founder Summit 2026

Have real-world scaling experience? The TechCrunch Founder Summit 2026 stage is calling.

On June 23 in Boston, this annual founder-focused event will bring together 1,100+ founders and investors to explore the realities of scaling startups across every stage. We’re seeking experienced founders, VCs, and startup operators to lead interactive roundtable discussions rooted in practical, real-world insight.

Experienced leaders from across the startup ecosystem will convene to host interactive roundtable sessions designed to spark real conversations. This is where founders get honest guidance, tactical takeaways, and clarity on the challenges that come with growth. Apply here to get started.

Apply to lead a roundtable session

Roundtables at TC Founder Summit are built for depth, not decks. Each session is a 30-minute, informal discussion led by up to two speakers, with no slides or video — just meaningful dialogue and practical insight. These intimate conversations create space for founders to ask real questions and connect directly with experts who’ve been there before.

To apply, click Apply to Speak on the event page, submit your proposed topic, and share your experience as a scaling expert. TC Founder Summit is the ideal platform to contribute to the next generation of startup leaders.

TechCrunch Early Stage 2024 roundtable sessions
Image Credits:Halo Creative

Speaker benefits

Speaking at TC Founder Summit is more than visibility. It’s full access to the experience. Along with elevating your authority and brand, you’ll gain premium entry to breakout sessions, roundtables, and curated networking with founders seeking guidance and VCs scouting what’s next.

Plus, TechCrunch will amplify your participation through:

Techcrunch event

Boston, MA
|
June 23, 2026

  • Event agenda placement on the web and mobile app.
  • Inclusion in a shared TechCrunch.com article.
  • Social media promotion across TechCrunch channels.

Make your impact by applying today

Lead the conversation. Share what you’ve learned. Help founders navigate the highs and lows of scaling, and strengthen your reputation as a trusted voice in the startup community.

Apply early. TC Founder Summit takes place on June 23, but speaker applications close well before then. Submit now and be part of TechCrunch’s annual founder bootcamp.

TechCrunch Founder Summit breakout audience
Image Credits:Halo Creative

source

Continue Reading

Tech

Uber to buy delivery arm of Turkey’s Getir

Uber has agreed to acquire the delivery business of Turkey’s Getir, once one of the biggest success stories of the country’s startup ecosystem, the company announced on Monday.

The deal will see Uber paying $335 million at the outset to purchase Getir’s food delivery business. The ride-hailing giant will also pay $100 million for a 15% stake in Getir’s grocery, retail, and water delivery business, and said it would complete the acquisition of the division over the next few years.

Uber is buying the business from Getir’s biggest shareholder, the Emirati sovereign wealth fund Mubadala. The investment firm was reportedly seeking to sell its stake in the company last year.

The deal comes after a turbulent few years for Getir, which once enjoyed a valuation of $12 billion, that saw the startup scale down its operations massively. The company launched to great traction in 2015, and invested aggressively to expand its operations in the U.S. and Europe, both organically and via acquisitions, especially during the pandemic.

But after the pandemic lockdowns eased, broader consumer demand for food and grocery delivery also wavered, and Getir chose to cut its losses in 2024, shutting shop and laying off thousands of staff in the U.S., U.K., and Europe in order to focus on business back home.

Nearly a year ago, the company went through a struggle for control over a restructuring plan proposed by Mubadala. The plan was opposed by one of Getir’s co-founders, who eventually sued to fight the “illegal coup,” but a Dutch court rejected the founder’s appeals.

The company has raised a total of $2.40 billion so far, according to PitchBook. Documents filed by Getir in court last year show the company valued its group assets at $374 million.

Techcrunch event

Boston, MA
|
June 23, 2026

“This transaction reflects the strength of the business and the progress it has made, particularly over the last year,” Waleed Al Mokarrab Al Muhairi, deputy group CEO at Mubadala, said in a statement.

Uber said it would combine the new unit’s services with Trendyol Go, a food and grocery delivery service in Turkey that the ride-hail giant bought for $700 million last May. Uber said Getir’s food delivery business alone recorded gross bookings of more than $1 billion in 2025, up 50% from a year earlier.

The deal follows a strong showing by Uber’s delivery business in the fourth quarter, reporting revenue of $4.89 billion, up 30% from a year earlier. The company said Europe, the Middle East, and Asia proved the fastest-growing regions for the business in 2026.

source

Continue Reading

Tech

Discord to roll out age verification next month for full access to its platform

Discord is rolling out age verification globally starting next month, the company announced on Monday. All users will be put into a “teen-appropriate experience” by default unless they prove they’re adults. Age verification will be required to change certain settings and access age-restricted content.

Discord users will need to be confirmed as adults in order to unblur sensitive content or turn off the setting, and only adults can access age-restricted channels, servers, and app commands. Additionally, messages from people a user may not know are routed to a separate inbox by default, and only verified adults can modify this setting.

People will receive warning prompts for friend requests from users they may not know, and only adults will be able speak onstage in servers.

To complete age verification, users need to either complete a facial age estimation or submit an ID to Discord’s vendor partners. The platform plans to add more options in the future. Discord notes that some users may be asked to use multiple methods when additional information is needed to assign an age group.

The facial age estimation requires video selfies, which Discord says never leave your device. Additionally, the company says IDs submitted to its vendor partners are deleted quickly and, in most cases, immediately after age confirmation.

It’s worth noting that Discord disclosed last October that around 70,000 users may have had sensitive data, such as their government ID photos, exposed after hackers breached a third-party vendor that the platform uses for age-related appeals. The breach reflected digital rights activists’ concerns over the use of age checks as a way to make the internet “safer.”

Discord’s global launch of age verification follows the company’s decision to establish age checks for users in the U.K. and Australia last year.

Techcrunch event

Boston, MA
|
June 23, 2026

“Rolling out teen-by-default settings globally builds on Discord’s existing safety architecture, giving teens strong protections while allowing verified adults flexibility,” said Savannah Badalich, head of product policy at Discord, in a press release. “We design our products with teen safety principles at the core and will continue working with safety experts, policymakers, and Discord users to support meaningful, long term wellbeing for teens on the platform.”

The announcement mirrors similar moves made by other online platforms, reflecting growing international efforts to strengthen child safety. Most recently, Roblox introduced mandatory facial verification for access to chats on its platform. Last July, YouTube launched its age-estimation technology in the U.S. to identify teen users in order to provide a more age-appropriate experience.

Discord’s age-verification changes will begin in early March, and both new and existing users will need to verify their age to access age-restricted content.

source

Continue Reading