{"id":19353,"date":"2022-06-16T02:10:44","date_gmt":"2022-06-16T10:10:44","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/06\/16\/news-13086\/"},"modified":"2022-06-16T02:10:44","modified_gmt":"2022-06-16T10:10:44","slug":"news-13086","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/06\/16\/news-13086\/","title":{"rendered":"Photos of kids taken from spyware-ridden phones found exposed on the internet"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 16 Jun 2022 09:31:16 +0000<\/strong><\/p>\n<p>A <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/stalkerware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">stalkerware<\/a>-type app that boasts &#8220;the best free phone spying software on the market,&#8221; has exposed the data it snooped on from the phones it was installed in. The data exposed by TheTruthSpy included GPS locations and photos on victims&#8217; phones, and images of children and babies.<\/p>\n<p>This news, <a href=\"https:\/\/www.vice.com\/en\/article\/5d3mkx\/android-stalkerware-truthspy-exposing-images-of-children-online\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">first reported by Motherboard<\/a>, is the latest in a lengthening list of spyware brands breached due to their poor cybersecurity hygiene. And TheTruthSpy is <a href=\"https:\/\/www.vice.com\/en\/article\/7x5m5a\/ftc-bans-retinax-from-selling-stalkerware\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">hardly the first of its kind<\/a> to put kids&#8217; data at risk.<\/p>\n<p>The images exposed by TheTruthSpy were available to anyone who visited a particular URL on TheTruthSpy\u2019s website. The photos included those of a young boy looking at the camera, a baby\u2019s soiled diaper, a pet cat, and photos of the inside of someone&#8217;s home. <\/p>\n<p>TheTruthSpy can be downloaded from the Google Play and Apple App stores. According to its website, it has <a href=\"https:\/\/thetruthspy.com\/mobile-spy-features\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">15+ features<\/a>, including monitoring multiple communication apps, recording ambient voice, siphoning of photos, keylogging, and managing spying activities via a control panel. Any data retrieved from the target&#8217;s device is then uploaded to TheTruthSpy&#8217;s server, where clients can log in and view all collected data.<\/p>\n<p>TheTruthSpy is maintained by 1Byte, a Vietnam-based company that handles multiple stalkerware-type apps. <a href=\"https:\/\/techcrunch.com\/2022\/02\/22\/stalkerware-network-spilling-data\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">According to a Techcrunch expos\u00e9<\/a> back in February, 1Byte was found exposing data from apps it manages due to a vulnerability in the app. It appears TheTruthSpy is suffering from the same flaw.<\/p>\n<h2>Stalkerware<\/h2>\n<p>Stalkerware is malicious in that it surreptitiously runs in the background while spying on people, usually without their knowledge. <\/p>\n<p>Unlike other malware, it is also publicly available. Anyone with the means and intent can buy and use TheTruthSpy\u2014all they need to do is download and install it onto target phones.<\/p>\n<h2>Not its first rodeo<\/h2>\n<p>This is <a href=\"https:\/\/www.vice.com\/en\/article\/mb4y5x\/thetruthspy-spyware-domestic-abusers-hacked-data-breach\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">the second time<\/a> TheTruthSpy has had its data exposed. In 2018, a hacker going by the initials L.M. revealed to Motherboard his exploits in successfully infiltrating the stalkerware-type app&#8217;s servers to steal client data, and then later on losing it after it updated its servers. <\/p>\n<p>&#8220;They take care about how to spy, and not take care about how they secure the attackers&#8217; and victims&#8217; privacy,\u201d L.M. said at that time, criticizing TheTruthSpy for being untrue to its clients.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/stalkerware\/2022\/06\/photos-of-kids-taken-from-spyware-ridden-phones-found-exposed-on-the-internet\/\">Photos of kids taken from spyware-ridden phones found exposed on the internet<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/stalkerware\/2022\/06\/photos-of-kids-taken-from-spyware-ridden-phones-found-exposed-on-the-internet\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 16 Jun 2022 09:31:16 +0000<\/strong><\/p>\n<p>TheTruthSpy is an app programmed to siphon out photos, locations and more from smartphones.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/stalkerware\/2022\/06\/photos-of-kids-taken-from-spyware-ridden-phones-found-exposed-on-the-internet\/\">Photos of kids taken from spyware-ridden phones found exposed on the internet<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[26587,26588,26589,1726,19409,12653,22153],"class_list":["post-19353","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-1byte","tag-commercial-spyware","tag-l-m","tag-motherboard","tag-stalkerware","tag-techcrunch","tag-thetruthspy"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19353"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19353\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19353"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}