Carding Forum
Professional
- Messages
- 2,788
- Reaction score
- 1,198
- Points
- 113
Tens of thousands of Android, macOS and Windows users were affected.
Recently, the specialists of the technical publication TechCrunch became aware of a very interesting incident in the world of IT. A small company Spytech from Minnesota, specializing in the production of spyware, was the victim of a hacker attack. As a result of the leak, it became known about thousands of devices around the world that are under covert surveillance.
TechCrunch experts received files from Spytech servers containing detailed logs of device activity, such as phones, tablets, and computers. The data includes records dated to the beginning of June of this year, and their authenticity was confirmed during an independent review.
According to leaked data, Spytech spyware such as Realtime-Spy and SpyAgent has been used to hack into more than 10,000 devices since 2013, including Android, Chromebook, Mac and Windows devices.
It is noteworthy that Spytech has already become the fifth manufacturer of spyware hacked this year. Before that,TheTruthSpy, WebDetetive, pcTattletale, and mSpy suffered the same fate. And if you extend the surveillance interval to 6-7 years, you will already have a couple of dozen hacked spy organizations.
Spytech CEO Nathan Polenchek said this is the first time he's heard about the leak and is currently investigating the incident. Spytech produces remote access programs, often referred to as "stalker software" or Stalkerware.
Such software is often sold as a tool for parental control or surveillance of employees, which is technically legal. However, the same Spytech openly advertises its products on the official website as an ideal tool for spying on a partner.
Companies that produce Stalkerware are in a gray area in terms of their legitimacy. The main problem is that the programs themselves can be used for both legitimate and illegal purposes. And in case of detection of illegal use, all responsibility usually lies with the end users, and not with the manufacturers, which complicates the process of bringing the latter to justice.
Although the pressure from the public and human rights organizations on such companies is gradually increasing, and some countries have already begun to tighten laws and hold manufacturers accountable, unfortunately, it is still far from the adoption of unified international regulations in this area.
Stalker apps are usually installed by a person who has physical access to the target device and knows its password. These apps may remain hidden and difficult to detect. After installation, the spyware sends data about keystrokes, browser history, and other device activity to a dashboard controlled by the customer.
As for Spytech, the leaked company data contains logs of all devices under Spytech's control, including data on each device activity. Most of the compromised devices are Windows PCs, as well as Android, Mac, and Chromebook devices.
Despite the presence of a large amount of personal data, the leaked files do not contain enough information to notify affected device owners about hacking. Spytech has not yet said whether it plans to notify its customers or U.S. government agencies, as required by data leak reporting laws.
Source
Recently, the specialists of the technical publication TechCrunch became aware of a very interesting incident in the world of IT. A small company Spytech from Minnesota, specializing in the production of spyware, was the victim of a hacker attack. As a result of the leak, it became known about thousands of devices around the world that are under covert surveillance.
TechCrunch experts received files from Spytech servers containing detailed logs of device activity, such as phones, tablets, and computers. The data includes records dated to the beginning of June of this year, and their authenticity was confirmed during an independent review.
According to leaked data, Spytech spyware such as Realtime-Spy and SpyAgent has been used to hack into more than 10,000 devices since 2013, including Android, Chromebook, Mac and Windows devices.
It is noteworthy that Spytech has already become the fifth manufacturer of spyware hacked this year. Before that,TheTruthSpy, WebDetetive, pcTattletale, and mSpy suffered the same fate. And if you extend the surveillance interval to 6-7 years, you will already have a couple of dozen hacked spy organizations.
Spytech CEO Nathan Polenchek said this is the first time he's heard about the leak and is currently investigating the incident. Spytech produces remote access programs, often referred to as "stalker software" or Stalkerware.
Such software is often sold as a tool for parental control or surveillance of employees, which is technically legal. However, the same Spytech openly advertises its products on the official website as an ideal tool for spying on a partner.
Companies that produce Stalkerware are in a gray area in terms of their legitimacy. The main problem is that the programs themselves can be used for both legitimate and illegal purposes. And in case of detection of illegal use, all responsibility usually lies with the end users, and not with the manufacturers, which complicates the process of bringing the latter to justice.
Although the pressure from the public and human rights organizations on such companies is gradually increasing, and some countries have already begun to tighten laws and hold manufacturers accountable, unfortunately, it is still far from the adoption of unified international regulations in this area.
Stalker apps are usually installed by a person who has physical access to the target device and knows its password. These apps may remain hidden and difficult to detect. After installation, the spyware sends data about keystrokes, browser history, and other device activity to a dashboard controlled by the customer.
As for Spytech, the leaked company data contains logs of all devices under Spytech's control, including data on each device activity. Most of the compromised devices are Windows PCs, as well as Android, Mac, and Chromebook devices.
Despite the presence of a large amount of personal data, the leaked files do not contain enough information to notify affected device owners about hacking. Spytech has not yet said whether it plans to notify its customers or U.S. government agencies, as required by data leak reporting laws.
Source