Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

The unknown phone control process called Spyzie has led to the risk of more than half a million Android devices and thousands of iPhone and iPad devices, according to the data shared by a security researcher.
Most of the owners of the affected devices, unknown, are likely to be aware that their phone data has been at risk.
Teccrunch security researcher told that Spyzie is vulnerable to the same errorTwo semi -extremists but with a different brand Chaser Applications that share the same source code and reveal the data of more than 2 million people, as we mentioned last week. The error allows anyone to access phone data, including messages, photos and site data, the hacker of any device that is at risk by the three applications.
The researcher said that the error displays the email addresses for every customer who participated in Spies to settle another person’s device.
The wrong researcher used the collection of 518,643 unique email addresses for Spyzie customers, and presented the cache of email addresses to Techcrunch and TRY Hunt, which runs Have you pwned? Data breach notification site.
This last leak shows how the increasingly increasingly increasingly among civilian phone monitoring between civil society has become unknown operations such as Spyzie, which barely has any existence online and is largely. Reamed by Google from the ads running in search resultsHowever, I collected thousands of paid customers.
Collectively, a planet, Spike and Spaisi are used by more than three million customers.
The leak also shows that defects in chasing applications are increasingly common and endangering customer and victim data. Even in the case of parents who want to use these applications to monitor their children, which is legal, they expose their children’s data to the danger of infiltrators.
Through our account, spyzie now The twenty -fourth operation Since 2017 it has been hacked, leaked, or exposed to the data of its very sensitive victims due to poor safety.
Spyzie operators did not count the Techcrunch request for comment. At the time of this report, the error has not been fixed yet.
Applications such as Spyzie, CocOSPY and Spyic are designed to remain hidden from home screens, making applications difficult to identify by their victims. Throughout the time, applications are constantly downloading the contents of the victim to spyware servers, and can be accessed for the person who planted the application.
A copy of the data that the security researcher shares with Techcrunch shows that the vast majority of affected espionage victims are Android devices, whose phones must be physically accessed to grow the Spyzie application, and is usually by a person with the knowledge of the person’s device.
This is one of the reasons why these applications are usually used in the context of abusive relationships, as people often know the romantic phone code for their partner.
Data also shows that Spyzie has been used to clarify at least 4900 iPhone and iPads.
Apple has more strict rules about applications that can work on iPhone and iPads, so matching tools usually implement the victim’s data stored in the Apple cloud storage service using Apple Account Apple Account data, instead of the device itself.
The history of some of the old Apple owners dates back to early February 2020, and recently in July 2024, the leaked Spyzie records appear.
As with Cocospy and Spyic, it was not possible to identify individual victims to monitor Spyzie from intensive data.
But there are things that you can do to see if your phone has been at risk by Spyzie.
For Android users: Even if Spyzie is hidden from the offer, you can usually call ✱✱001✱✱ In your Android application keyboard, then connect. If Spyzie is installed, it should appear on your screen.
This BackDoor feature is a compact application in the app allows the person who planted the application on the victim’s phone to restore access. In this case, it can also be used by the victim to see if the application is installed.
Techcrunch has Android spyware removal guide This can help you identify and remove common types of phone chanting tools, and switching settings to secure your Android device.
You must also have The safety plan is in placeWhere the turning off spyware can alert the person planted.
For iPhone and iPad users: Spyzie depends on using the Apple Apple user name and the victim’s password to access the data stored in their iCloud account. You must make sure to use your Apple account Dual factors authenticationIt is a vital protection against accounts and the basic way of chasing tools to target your data. You must also check and Remove any devices from your Apple account, do not recognize it.
If you or anyone you know need help, then the hotline of national violence (1-800-799-7233) provides free support around the clock throughout the week for victims of home abuse and violence. If you are in an emergency, call 911. Coalition against chaser tools It has resources if you think your phone may be at risk with spyware.