
Highlights & Notes
RE: Inside TheTruthSpy, the stalkerware network spying on thousands
techcrunch.com
You're one of the first people joining the hub.
You’ll also gain access to ’s Collections, Discussions, Library, and more — and also get recognized for the helpful content you share.
This hub’s main subjects are:
This hub’s personal interest subjects (shared casual interests) are:
Reading you do on these subjects that you save publicly, will be shared with this hub. To edit this / view advanced filtering, click here.
Now your expertise and interests can be recognized, leveraged, and members with similar interests can find you within . You’ll also gain access to ’s Collections, Discussions, Library, and more.
Let’s make this work in a way you’re 100% comfortable with:
Don’t overthink it, you can edit these later.
Choose an avatar for your Hub
Loading...
Highlights & Notes
techcrunch.com
Get my weekly round-up in your inbox
or browse my full reading stream
subscribe
Android phones and tablets were compromised by a fleet of near-identical stalkerware apps, including TheTruthSpy, Copy9, MxSpy and others.These Android apps are planted by someone with physical access to a person’s device and are designed to stay hidden on their home screens but will continuously and silently upload the phone’s contents without the owner’s knowledge.
Given that victims had no idea that their device data was stolen, TechCrunch extracted every unique device identifier from the leaked database and built a lookup tool to allow anyone to check if their device was compromised by any of the stalkerware apps up to April 2022, which is when the data was dumped.
The database also contained 473,211 records of photos and videos uploaded from compromised phones during the six weeks, including screenshots, photos received from messaging apps and saved to the camera roll, and filenames, which can reveal information about the file. The database also contained 454,641 records of data siphoned from the user’s keyboard, known as a keylogger, which included sensitive credentials and codes pasted from password managers and other apps. It also includes 231,550 records of networks that each device connected to, such as the Wi-Fi network names of hotels, workplaces, apartments, airports and other guessable locations.
Co-Founder & CEO @ Readocracy
Get my weekly round-up in your inbox
or browse my full reading stream
An account already exists with that e-mail.
What you'll get
An account already exists with that e-mail.
Choose your subscription
All-Access
$0USD/month
Something went wrong.
An account already exists with that e-mail.
Choose your subscription
Donate
minimum
$0USD/month
100% goes to , thank you!
The sum you added is less that the required minimum donation.
Something went wrong.
You’re all set. Check your inbox for a confirmation email. If you don’t see it, check your spam and mark it safe.
You’ll get my weekly round-up every Sunday. The best content I came across that week, and a little extra. If you subscribe to any other Readocracy members, you’ll receive our round-ups all together in a single email.
Nice and simple.
-Mario