1. Website Planet
  2. >
  3. News
  4. >
  5. Vulnerabilities in Stalkerware Apps Expose the Data of Millions
Vulnerabilities in Stalkerware Apps Expose the Data of Millions

Vulnerabilities in Stalkerware Apps Expose the Data of Millions

Andrés Gánem Written by:
Maggy Di Costanzo Reviewed by: Maggy Di Costanzo
Last updated: 03 March 2025
A security flaw in two phone-monitoring apps, Cocospy and Spyic, has exposed the personal data of both the apps’ customers and users of monitored phones. The breach, affecting millions of people, was recently discovered by the cybersecurity research site Have I Been Pwned (HIBP).

This vulnerability allows third parties to access data collected from the target device, including call logs, messages, photos, and passwords. It also exposes the login credentials of users who signed up for the services.

HIBP reports that the Cocospy breach exposed approximately 1.8 million customer email addresses, along with the captured data from associated devices. The Spyic breach exposed over 880,000 customer emails.

According to TechCrunch, the bug is so easy to exploit that adding further details on its nature could put even more people at risk. Both Cocospy and Spyic have refused to comment on the incident.

The vulnerability stems from a flaw in the source code of these popular “stalkerware” apps. Stalkerware is software designed to secretly collect data from an affected device and share it with the person who installed the app, often without the user’s knowledge.

These apps are also known as “spouseware” due to their common use in secretly monitoring spouses and partners. While using stalkerware to monitor an unwitting partner is illegal, the apps themselves operate in a legal gray area. As a result, they are not available on traditional app stores but can be accessed through their platforms.

Stalkerware installation typically requires physical access to the target device. However, in Apple systems, these apps can also retrieve device information through iCloud access.

Data leaks and brute-force attacks have become increasingly common, even in more legitimate software. Recently, the information of millions of students was exposed because of the lack of basic security measures on the backend of PowerSchool’s Student Information System.

Rate this Article
4.0 Voted by 2 users
You already voted! Undo
This field is required Maximal length of comment is equal 80000 chars Minimal length of comment is equal 10 chars
Any comments?
Reply
View %s replies
View %s reply
More news
Show more
We check all user comments within 48 hours to make sure they are from real people like you. We're glad you found this article useful - we would appreciate it if you let more people know about it.
Popup final window
Share this blog post with friends and co-workers right now:
1 1 1

We check all comments within 48 hours to make sure they're from real users like you. In the meantime, you can share your comment with others to let more people know what you think.

Once a month you will receive interesting, insightful tips, tricks, and advice to improve your website performance and reach your digital marketing goals!

So happy you liked it!

Share it with your friends!

1 < 1 1

Or review us on 1

3591320
50
5000
114314778