Tens of thousands of Android phones have fallen victim to a dangerous stalkerware app that covertly harvests private data. Known as Spyhide, this malicious software has managed to infiltrate 60,000 Android devices since 2016, according to a TechCrunch report. Unlike regular hacking apps that send stolen data to cybercriminals, stalkerware like Spyhide gathers sensitive information and transmits it back to individuals who seek to monitor their victims.
The real danger lies in the stalkerware's ability to remain concealed on compromised phones, making detection and removal challenging. Once installed, Spyhide discreetly collects and uploads various private details, including contacts, messages, photos, call logs, recordings, and real-time location.
Recently, a Swiss-based hacker named Maia Arson Crimew discovered a vulnerability in Spyhide's dashboard, gaining access to the stalkerware's back-end database. The exposed information shed light on the scope of the attack. The compromised data of 60,000 Android devices includes call logs, text messages, and years of location history.
Moreover, TechCrunch's analysis indicates that Spyhide operates globally, with 3,100 affected devices in the U.S., having over 100,000 location data points. Furthermore, the stalkerware's database includes details of 750,000 users who signed up to use Spyhide, likely with the intent to install it on someone else's smartphone. The vast collection of personal data from victims encompasses 3.29 million text messages, 2FA codes, password reset links, 1.2 million call logs, 312,000 call recording files, 925,000+ contact lists, and 382,000 photos and images.
To ensure your phone is not affected, it is crucial to knowhow to detect and remove stalkerware.
Read more on tech.hindustantimes.com