4/11/2023 0 Comments Thetruthspy apkUsing mapping software for geospatial analysis, we plotted hundreds of thousands of location data points from the database to understand its scale. TechCrunch has since analyzed the rest of the database. Given that victims had no idea that their device data was stolen, TechCrunch extracted every unique device identifier from the leaked database and built a lookup tool to allow anyone to check if their device was compromised by any of the stalkerware apps up to April 2022, which is when the data was dumped. The cache contains the stalkerware operation’s core database, which includes detailed records on every Android device that was compromised by any of the stalkerware apps in TheTruthSpy’s network since early 2019 (though some records date earlier) and what device data was stolen. Months after we published our investigation uncovering the stalkerware operation, a source provided TechCrunch with tens of gigabytes of data dumped from the stakerware’s servers. You can check to see if your Android phone or tablet was compromised here.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |