this post was submitted on 27 Jul 2024
87 points (100.0% liked)

Technology

37585 readers
338 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
 

Archived version

A little-known spyware maker based in Minnesota has been hacked, TechCrunch has learned, revealing thousands of devices around the world under its stealthy remote surveillance.

[...]

The data shows that Spytech’s spyware — Realtime-Spy and SpyAgent, among others — has been used to compromise more than 10,000 devices since the earliest-dated leaked records from 2013, including Android devices, Chromebooks, Macs, and Windows PCs worldwide.

Spytech is the latest spyware maker in recent years to have itself been compromised, and the fourth spyware maker known to have been hacked this year alone.

[...]

Spytech is a maker of remote access apps, often referred to as “stalkerware,” which are sold under the guise of allowing parents to monitor their children’s activities but are also marketed for spying on the devices of spouses and domestic partners. Spytech’s website openly advertises its products for spousal surveillance, promising to “keep tabs on your spouse’s suspicious behavior.”

[...]

The breached data [...] contains logs of all the devices under Spytech’s control, including records of each device’s activity. Most of the devices compromised by the spyware are Windows PCs, and to a lesser degree Android devices, Macs and Chromebooks.

The device activity logs [...] were not encrypted.

top 3 comments
sorted by: hot top controversial new old
[–] [email protected] 8 points 1 month ago

Not exactly a stealthy name

[–] [email protected] 4 points 1 month ago

Yikes! Thanks for sharing this, OP.

[–] [email protected] 2 points 1 month ago