A large cache of leaked information reveals the inside workings of a stalkerware operation that’s spying on a whole bunch of hundreds of individuals world wide, together with Individuals.
The leaked information contains name logs, textual content messages, granular location information and different private machine information of unsuspecting victims whose Android telephones and tablets have been compromised by a fleet of near-identical stalkerware apps, together with TheTruthSpy, Copy9, MxSpy and others.
These Android apps are planted by somebody with bodily entry to an individual’s machine and are designed to remain hidden on their residence screens however will constantly and silently add the telephone’s contents with out the proprietor’s information.
SPYWARE LOOKUP TOOL
You may verify to see in case your Android telephone or pill was compromised here.
Months after we published our investigation uncovering the stalkerware operation, a supply offered TechCrunch with tens of gigabytes of information dumped from the stakerware’s servers. The cache accommodates the stalkerware operation’s core database, which incorporates detailed information on each Android machine that was compromised by any of the stalkerware apps in TheTruthSpy’s community since early 2019 (although some information date earlier) and what machine information was stolen.
On condition that victims had no concept that their machine information was stolen, TechCrunch extracted each distinctive machine identifier from the leaked database and constructed a lookup tool to permit anybody to verify if their machine was compromised by any of the stalkerware apps as much as April 2022, which is when the info was dumped.
TechCrunch has since analyzed the remainder of the database. Utilizing mapping software program for geospatial evaluation, we plotted a whole bunch of hundreds of location information factors from the database to grasp its scale. Our evaluation exhibits TheTruthSpy’s community is big, with victims on each continent and in virtually each nation. However stalkerware like TheTruthSpy operates in a authorized grey space that makes it troublesome for authorities world wide to fight, regardless of the rising menace it poses to victims.
First, a phrase concerning the information. The database is about 34 gigabytes in dimension and consists of metadata, corresponding to occasions and dates, in addition to text-based content material, like name logs, textual content messages and placement information — even names of Wi-Fi networks {that a} machine related to and what was copied and pasted from the telephone’s clipboard, together with passwords and two-factor authentication codes. The database didn’t include media, photos, movies or name recordings taken from victims’ units, however as an alternative logged details about every file, corresponding to when a photograph or video was taken, and when calls have been recorded and for the way lengthy, permitting us to find out how a lot content material was exfiltrated from victims’ units and when. Every compromised machine uploaded a various quantity of information relying on how lengthy their units have been compromised and accessible community protection.
TechCrunch examined the info spanning March 4 to April 14, 2022, or six weeks of the newest information saved within the database on the time it was leaked. It’s attainable that TheTruthSpy’s servers solely retain some information, corresponding to name logs and placement information, for a number of weeks, however different content material, like pictures and textual content messages, for longer.
That is what we discovered.

This map exhibits six weeks of cumulative location information plotted on a map of North America. The situation information is extraordinarily granular and exhibits victims in main cities, city hubs and touring on main transport strains. Picture Credit: TechCrunch
The database has about 360,000 distinctive machine identifiers, together with IMEI numbers for telephones and promoting IDs for tablets. This quantity represents what number of units have been compromised by the operation to this point and about how many individuals are affected. The database additionally accommodates the e-mail addresses of each one that signed up to make use of one of many many TheTruthSpy and clone stalkerware apps with the intention of planting them on a sufferer’s machine, or about 337,000 customers. That’s as a result of some units could have been compromised greater than as soon as (or by one other app within the stalkerware community), and a few customers have a couple of compromised machine.
About 9,400 new units have been compromised in the course of the six-week span, our evaluation exhibits, amounting to a whole bunch of recent units every day.
The database saved 608,966 location information factors throughout that very same six-week interval. We plotted the info and created a time lapse to indicate the cumulative unfold of recognized compromised units world wide. We did this to grasp how wide-scale TheTruthSpy’s operation is. The animation is zoomed out to the world degree to guard people’ privateness, however the information is extraordinarily granular and exhibits victims at transportation hubs, locations of worship and different delicate places.
By breakdown, america ranked first with essentially the most location information factors (278,861) of every other nation in the course of the six-week span. India had the second most location information factors (77,425), Indonesia third (42,701), Argentina fourth (19,015) and the UK (12,801) fifth.
Canada, Nepal, Israel, Ghana and Tanzania have been additionally included within the prime 10 international locations by quantity of location information.

This map exhibits the full variety of places ranked by nation. The U.S. had essentially the most location information factors at 278,861 over the six-week span, adopted by India, Indonesia, and Argentina, which is smart given their big geographic areas and populations. Picture Credit: TechCrunch
The database contained a complete of 1.2 million textual content messages, together with the recipient’s contact title, and 4.42 million name logs in the course of the six-week span, together with detailed information of who referred to as whom, for the way lengthy, and their contact’s title and telephone quantity.
TechCrunch has seen proof that information was doubtless collected from the telephones of kids.
These stalkerware apps additionally recorded the contents of hundreds of calls in the course of the six weeks, the info exhibits. The database accommodates 179,055 entries of name recording recordsdata which might be saved on one other TheTruthSpy server. Our evaluation correlated information with the dates and occasions of name recordings with location information saved elsewhere within the database to find out the place the calls have been recorded. We centered on U.S. states which have stricter telephone name recording legal guidelines, which require that a couple of particular person (or each particular person) on the road agree that the decision will be recorded or fall foul of state wiretapping legal guidelines. Most U.S. states have statutes that require at the very least one particular person consents to the recording, however stalkerware by nature is designed to work with out the sufferer’s information in any respect.
We discovered proof that 164 compromised units in 11 states recorded hundreds of calls over the six-week span with out the information of machine homeowners. Many of the units have been positioned in densely populated states like California and Illinois.

TechCrunch recognized 164 distinctive units that have been recording the sufferer’s telephone calls in the course of the six-week interval and have been positioned in states the place phone recording legal guidelines are a number of the strictest in america. California led with 76 units, adopted by Pennsylvania with 17 units, Washington with 16 units and Illinois with 14 units. Picture Credit: TechCrunch
The database additionally contained 473,211 information of pictures and movies uploaded from compromised telephones in the course of the six weeks, together with screenshots, pictures acquired from messaging apps and saved to the digital camera roll, and filenames, which may reveal details about the file. The database additionally contained 454,641 information of information siphoned from the person’s keyboard, often known as a keylogger, which included delicate credentials and codes pasted from password managers and different apps. It additionally contains 231,550 information of networks that every machine related to, such because the Wi-Fi community names of resorts, workplaces, residences, airports and different guessable places.
TheTruthSpy’s operation is the newest in a protracted line of stalkerware apps to show victims’ information due to security flaws that subsequently result in a breach.
Whereas the possession of stalkerware apps isn’t unlawful, utilizing it to document calls and personal conversations of individuals with out their consent is against the law beneath federal wiretapping legal guidelines and lots of state legal guidelines. However whereas it is illegal to promote telephone monitoring apps for the only motive of recording personal messages, many stalkerware apps are sold under the guise of kid monitoring software program, but are sometimes abused to spy on the telephones of unwitting spouses and home companions.
A lot of the hassle towards stalkerware is led by cybersecurity firms and antivirus distributors working to dam undesirable malware from customers’ units. The Coalition Against Stalkerware, which launched in 2019, shares resources and samples of recognized stalkerware so details about new and rising threats will be shared with different cybersecurity firms and robotically blocked on the device-level. The coalition’s web site has more on what tech firms can do to detect and block stalkerware.
However solely a handful of stalkerware operators, corresponding to Retina X and SpyFone, have confronted penalties from federal regulators just like the Federal Commerce Fee (FTC) for enabling wide-scale surveillance, which has relied on utilizing novel authorized approaches to deliver prices citing poor cybersecurity practices and information breaches that fall extra carefully inside their regulatory purview.
When reached for remark by TechCrunch forward of publication, a spokesperson for the FTC mentioned the company doesn’t touch upon whether or not it’s investigating a selected matter.
Should you or somebody you recognize wants assist, the Nationwide Home Violence Hotline (1-800-799-7233) supplies 24/7 free, confidential help to victims of home abuse and violence. If you’re in an emergency state of affairs, name 911. The Coalition Against Stalkerware additionally has assets in case you suppose your telephone has been compromised by spy ware. You may contact this reporter on Sign and WhatsApp at +1 646-755-8849 or [email protected] by electronic mail.