A massive data breach reveals the identities of half a million people who paid to secretly monitor othersâproving that those who spy on others often end up exposing themselves.
In one of the largest stalkerware data exposures ever recorded, a hacktivist has scraped more than 536,000 payment records from a major provider of consumer-grade phone surveillance apps, exposing the email addresses and partial payment information of customers who paid to spy on their partners, family members, and others.
The breach, reported by TechCrunch on February 9, 2026, isnât just another data leakâitâs a stark reminder that the surveillance industryâs poor security practices put everyone at risk, including the very people who choose to use these invasive tools. When you pay to spy on someone, youâre trusting companies with notoriously bad cybersecurity practices to protect your identity. As this breach demonstrates, thatâs a bet youâll almost certainly lose.
What Is Stalkerware and How Does It Work?
Stalkerwareâalso known as spouseware or commercially available spywareârefers to software applications designed to secretly monitor another personâs smartphone or device without their knowledge or consent. Unlike legitimate parental monitoring tools that operate transparently, stalkerware is specifically designed to remain hidden from the device owner while transmitting their private data to whoever installed the app.
These applications are marketed, often explicitly, to jealous partners and spouses who want to âcatch cheatingâ or monitor their significant otherâs activities. Once installed on a targetâs phoneâwhich typically requires brief physical access to the deviceâstalkerware can capture:
- Text messages and chat app conversations (including WhatsApp, Signal, Telegram)- Call logs and recordings of phone conversations- Real-time GPS location tracking, often with historical location data- Photos and videos stored on the device- Browsing history and bookmarks- Social media activity including private messages- Keystrokes capturing passwords and private communications- Email content both sent and received- Calendar entries and contacts
The apps run silently in the background, uploading this harvested data to servers where the person who installed the stalkerware can access it through a web dashboard or companion app. Many of these services cost between $30 and $100 per monthâa price that half a million people were apparently willing to pay to invade someone elseâs privacy.
The February 2026 Breach: What Happened
The latest breach targeted Struktura, a Ukrainian company operating under the U.K.-presenting front âErsten Group.â According to TechCrunchâs investigation, the company provides infrastructure for multiple phone-tracking services, including:
- uMobix â A popular stalkerware app explicitly marketed for monitoring partners- Geofinder â A phone location tracking service- Peekviewer (formerly Glassagram) â A service claiming to provide access to private Instagram accounts- Xnspy â A known surveillance app that previously suffered its own data exposure in 2022
A hacktivist going by the moniker âwikkidâ exploited what they described as a âtrivialâ security bug in the vendorâs website to scrape payment records dating back years. The exposed data includes approximately 536,000 lines containing:
- Customer email addresses- Which surveillance app or brand they paid for- Payment amounts- Payment card types (Visa, Mastercard, etc.)- Last four digits of payment cards- Unique invoice numbers
TechCrunch verified the authenticity of the data through multiple methods, including using disposable email addresses from the dataset to trigger password resets on the surveillance appsâ portals, confirming these were real customer accounts.
The hacktivist subsequently published the scraped data on a known hacking forum, making it accessible to anyone who wants to look up whether someone they know paid for these services.
The Stalkerware Industryâs Catastrophic Security Track Record
This latest breach is far from an isolated incident. According to TechCrunchâs ongoing tally, at least 27 stalkerware companies since 2017 have been hacked or have leaked customer and victim data online. At least four of these companies were breached multiple times.
The list of compromised stalkerware providers reads like a hall of shame:
Hacked outright:
- Retina-X (2017, 2018) â Hackers wiped their servers twice before they finally shut down- FlexiSpy (2017) â 130,000 customers exposed- SpyHuman (2018) â Text messages and call metadata stolen- Copy9 â Full victim data including messages, WhatsApp conversations, call recordings, and photos- LetMeSpy (2023) â Hackers breached and wiped servers; company shut down- WebDetetive (2023) â Brazilian company had servers deleted, then was hacked again- Spyhide (2023) â A code vulnerability exposed years of data from 60,000 victims- TheTruthSpy â Holds the record for being hacked on at least three separate occasions- pcTattletale (2024) â Hacked, data leaked, website defaced; founder later pled guilty to criminal charges- mSpy (2024) â Millions of customer support tickets exposed, affecting millions of customers- Spytech (2024) â Activity logs from monitored devices exposed- SpyX (2025) â Nearly 2 million users affected, including thousands of Apple device owners- Catwatchful (2025) â 26,000+ victimsâ phone data exposed, along with customer emails and plaintext passwords
Exposed through negligence:
- SpyFone (2018) â Left an Amazon S3 bucket completely unprotected online- FamilyOrbit â 281 GB of personal data left online protected by an easily guessed password- mSpy (2018) â Leaked over 2 million customer records- Xnore â Any customer could view other customersâ targetsâ private data- MobiiSpy â Left 25,000 audio recordings and 95,000 images accessible to anyone- KidsGuard (2020) â Misconfigured server leaked victimsâ content- Cocospy, Spyic, Spyzie (2025) â A security researcher discovered a bug exposing messages, photos, call logs, and customer email addresses for millions of users
Eva Galperin, director of cybersecurity at the Electronic Frontier Foundation and a leading stalkerware researcher, summarized it bluntly: âThe people who run these companies are perhaps not the most scrupulous or really concerned about the quality of their product.â
The Ironic Privacy Implications: Stalkers Become the Stalked
The February 2026 breach creates a deeply ironic situation: people who paid to violate othersâ privacy have now had their own privacy violated. Their email addressesâoften personal accountsâare now searchable by anyone, potentially including:
- The very partners they were spying on, who might discover the betrayal through the leaked database- Family members, friends, and colleagues who may stumble upon their name- Employers who might take a dim view of such behavior- Law enforcement who now have a ready-made list of potential Computer Fraud and Abuse Act violators- Hackers and scammers who specialize in blackmail and extortion
But the privacy implications extend even further. These stalkerware apps routinely collect incredibly sensitive data from victimsâand that data is only as secure as the apps collecting it. When Cocospy, Spyic, and Spyzie were found to have a vulnerability in 2025, it wasnât just customer emails at riskâit was the complete contents of millions of victimsâ phones sitting exposed on the internet.
Consider the dual victimization: an intimate partner secretly installs stalkerware on your phone. Your private messages, photos, location history, and call logs are uploaded to some companyâs server. Then that company gets hacked, and now your most intimate data isnât just in your abuserâs handsâitâs potentially in the hands of anyone on the internet.
This is the fundamental truth about the stalkerware industry: it creates two victimsâthe person being monitored and, ultimately, the person who paid for the monitoring.
Why Using Stalkerware Is Dangerous for the Installer
Beyond the moral and ethical issues, there are concrete reasons why installing stalkerware on someoneâs device is a terrible ideaâeven from a purely self-interested perspective:
1. Your Identity Will Likely Be Exposed
With 27+ stalkerware companies breached in recent years, the odds that your payment information and identity remain private are approaching zero. These companies have demonstrated repeatedly that they cannot protect their customer data.
2. Youâre Providing Evidence Against Yourself
Every payment record, login, and dashboard access creates a digital trail. When these companies get breached, that trail becomes public evidence of potentially criminal behavior.
3. Youâre Trusting the Wrong People
Companies willing to profit from facilitating surveillance and domestic abuse are not companies that prioritize ethics, security, or customer welfare. Their entire business model is built on enabling violations of privacy and, often, the law.
4. The Data Goes Both Ways
While youâre monitoring your target, the stalkerware company is collecting data on both of you. They know your email, your payment information, your IP addresses, and exactly how youâre using their service. Thatâs leverage they hold over you.
5. The Legal Consequences Are Escalating
As weâll discuss below, law enforcement is increasingly prosecuting stalkerware users, not just vendors. That payment record could become Exhibit A in your own criminal case.
How to Detect Stalkerware on Your Device
If youâre concerned that stalkerware may have been installed on your phone, here are the warning signs and detection methods for both Android and iOS devices:
Warning Signs
Before diving into technical detection, be aware that the most common sign of stalkerware isnât technical at allâitâs behavioral. According to the Coalition Against Stalkerware, abusers often reveal through their behavior that they have unusual knowledge of your activities. If your partner or someone else seems to know things they shouldnâtâwhere youâve been, who youâve talked to, what youâve discussed in private messagesâthatâs a major red flag.
Technical indicators may include:
- Unusual battery drain â Stalkerware runs constantly in the background- Increased data usage â Your private data is being uploaded to remote servers- Phone running warm even when not in use- Slower performance than normal- Strange notifications or apps you donât recognize
However, sophisticated stalkerware can operate without these obvious signs.
Android Detection Steps
- Check installed apps: Go to Settings > Apps and look for anything you donât recognize. Stalkerware often uses generic or misleading names like âSystem Serviceâ or âPhone Backup.â2. Review accessibility permissions: Go to Settings > Accessibility. Stalkerware often exploits accessibility features to capture screen content and keystrokes. If you donât use accessibility features, nothing should be listed here.3. Check device admin apps: Go to Settings > Security > Device admin apps. Personal phones rarely need device admin appsâif you see something here you didnât install, itâs suspicious.4. Review notification access: Check Settings > Apps > Special app access > Notification access. Stalkerware uses this to intercept your messages and alerts.5. Use security scanning apps: Malwarebytes for Android and other reputable security apps can detect known stalkerware. The apps will be labeled as âAndroid/Spywareâ or âAndroid/Monitor.â6. Check for unknown sources: Look in Settings > Security to see if âInstall unknown appsâ is enabled for any apps. This is how stalkerware gets installed outside the Play Store.
iOS Detection Steps
- Check for jailbreaking: Most iOS stalkerware requires a jailbroken phone. Look for apps like Cydia or Sileo that indicate jailbreaking.2. Review all apps: Go to Settings > General > iPhone Storage and scroll through all installed apps. Hidden apps wonât appear on your home screen but will show here.3. Use Safety Check (iOS 16+): Go to Settings > Privacy & Security > Safety Check. This feature lets you:
- See who youâre sharing information with- Manage devices connected to your Apple ID- Reset system privacy permissions- Review and revoke location sharing4. Check configuration profiles: Go to Settings > General > VPN & Device Management. Stalkerware may install configuration profiles to monitor your device. If you see profiles you didnât install, remove them.5. Review Family Sharing: Check Settings > [Your Name] > Family Sharing. Abusers sometimes use legitimate features like location sharing or shared accounts for monitoring.6. Examine iCloud settings: Someone with your Apple ID credentials can track you through Find My, access your iCloud backups, read your iMessages, and more. Consider whether anyone else has access to your Apple ID.
Critical Safety Warning
Before removing stalkerware, create a safety plan. Deleting monitoring apps or changing permissions will likely alert the person who installed them. This can escalate abuse situations. Contact a domestic violence organization before taking action if you believe youâre in danger.
Legal Consequences of Using Stalkerware
Installing stalkerware on someoneâs device without their knowledge or consent is illegal in most jurisdictions, regardless of your relationship to them. Here are the potential legal consequences:
Federal Laws (United States)
Computer Fraud and Abuse Act (CFAA): Accessing a computer or device without authorization, or exceeding authorized access, is a federal crime. Installing stalkerware on someone elseâs phone clearly qualifies. Penalties can include:
- Up to 5 years in prison for first offenses- Up to 10 years for repeat offenders- Civil liability for damages
Federal Wiretap Act (18 U.S.C. § 2511): Intercepting electronic communications without consent is a federal crime punishable by up to 5 years in prison.
Stored Communications Act: Unauthorized access to stored electronic communications (like emails and messages) is also federally prohibited.
Recent Prosecutions
The pcTattletale case demonstrates that law enforcement is increasingly willing to prosecute. In January 2026, founder Bryan Fleming pled guilty to:
- Computer hacking- Sale and advertising of surveillance software for unlawful uses- Conspiracy
The Federal Trade Commission has also taken action, banning SpyFone and its CEO Scott Zuckerman from the surveillance industry entirely following a security lapse that exposed victimsâ data.
In 2024, New Yorkâs attorney general forced PhoneSpector and Highster to shut down after accusing them of explicitly encouraging customers to use their software for illegal surveillance.
State Laws
Many states have additional laws criminalizing:
- Stalking and cyberstalking- Unauthorized computer access- Invasion of privacy- Harassment
Depending on your state, installing stalkerware could result in felony charges carrying years in prison.
Civil Liability
Beyond criminal penalties, stalkerware users can face civil lawsuits from their victims for:
- Invasion of privacy- Intentional infliction of emotional distress- Violations of state privacy statutes- Damages resulting from the surveillance
The breach of stalkerware companies provides victims with evidence they might not otherwise have hadâa list of people who paid to spy on others.
Resources for Domestic Violence Victims
If you are experiencing domestic abuse, intimate partner violence, or technology-facilitated abuse, help is available:
Crisis Hotlines
- National Domestic Violence Hotline: 1-800-799-7233 (1-800-799-SAFE)Available 24/7, confidential, multilingual- Also available via online chat at thehotline.org Crisis Text Line: Text HOME to 741741National Sexual Assault Hotline: 1-800-656-4673
Technology Safety Resources
- Coalition Against Stalkerware: stopstalkerware.orgInformation about stalkerware detection- Resources for survivors- Country-specific assistance organizations Safety Net Project (NNEDV): techsafety.org
- Focus on technology and intimate partner violence- Survivor resources and toolkits- Information for advocates Clinic to End Tech Abuse (Cornell University): ceta.tech.cornell.edu
- Detailed guides for securing devices- Resources for identifying and removing stalkerware- Materials for support workers and technologists WomensLaw.org
- Legal information (serves all genders, not just women)- Email hotline for legal questions about domestic violence
Important Safety Considerations
- Access resources from a safe device that isnât being monitored- Create a safety plan before changing passwords or removing apps- Document evidence if you plan to involve law enforcement- Contact an advocate who can help you navigate your specific situation safely
Conclusion: The Watchers Cannot Escape Being Watched
The exposure of 536,000 stalkerware customers is more than a data breachâitâs a case study in ironic justice. People who paid to secretly monitor others are now the ones being exposed, their identities searchable by anyone with internet access.
But beyond the schadenfreude, this breach carries serious lessons:
For potential stalkerware users: The industryâs security is catastrophically poor. Your identity will almost certainly be exposed, creating evidence of potentially criminal behavior that could result in prosecution, civil liability, and the destruction of your relationships and reputation.
For potential victims: These tools exist, and theyâre being used on millions of people. Learn the warning signs, use the detection methods described above, and know that resources are available to help you.
For everyone else: This industry thrives because people buy these products. Every breach exposes the human costânot just in abstract privacy violations, but in real domestic abuse enabled by surveillance technology. Supporting legislative efforts to ban stalkerware and holding app stores accountable for distributing these apps matters.
As Eva Galperin of the EFF has noted, stalkerware companies are âsoft targetsâ run by unscrupulous operators who donât care about the quality of their products or the security of their customers. This latest breach proves her point emphatically.
Those who choose to spy on others have learnedâor will soon learnâa valuable lesson: in the world of stalkerware, everyone eventually becomes a victim.
If you believe stalkerware is installed on your device, please contact the National Domestic Violence Hotline at 1-800-799-7233 or visit stopstalkerware.org for assistance before taking any action that might alert your abuser.
