![]() That’s why TechCrunch built this lookup tool. The leaked list does not contain enough information for TechCrunch to identify or notify owners of compromised devices. That cache of files included a list of every Android device that was compromised by any of the stalkerware apps in TheTruthSpy’s network up to April 2022, which is presumably when the data was dumped. Then, in June, a source provided TechCrunch with a cache of files dumped from the servers of TheTruthSpy’s internal network. But without a fix, TechCrunch cannot reveal more about the security flaw because of the risk it poses to the hundreds of thousands of victims whose phones were unknowingly compromised by the apps. Our investigation found that the stalkerware apps were built and maintained by a Vietnam-based group of developers that went to considerable lengths to hide their involvement in the operation, including using fake names and misappropriated identities. These spying apps are often known by the term “stalkerware” for their ability to track and monitor other people or spouses without their consent. These stealthy apps are often surreptitiously installed by someone with physical access to a person’s device and are designed to stay hidden from home screens but allow that person to view the victim’s phone data in real time, including their calls, messages, contacts, real-time location data, photos and more. You can check to see if your Android phone or tablet was compromised here. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |