Categories: Security Hacker

Spyware Company Got Hacked – Attackers Stole Login Credentials, Audio Recordings, Pictures, and Text Messages

Spyware Company TheTruthSpy got hacked and the hacker has stolen login credentials, pictures, pictures, audio recordings, text messages, location information, and social media chats.

TheTruthSpy is a mobile spy phone software for iOS and Android, advertised as the best way to track someone’s iPhone/iPad and Android phones.

A hacker with initials L.M. told Motherboard that he gained access to the TheTruthSpy servers on February that has more than more than 10,000 customer accounts. He claimed that “I [have] admin access to the servers.” and “I control victims all over the world.”

Motherboard verified the breach with the sample of login credentials shared by the hacker and the data found authentic.

Access to TheTruthSpy Servers

He gained access to the TheTruthSpy Servers by reversing engineering the android app and exploiting a vulnerability in it. Inside the media server, L.M. said he saw the unique IDs of all customers within audio files, which were named “cell phone ID_date_time.”

The vulnerability resides in how the user credentials are requested, TheTruthSpy app requests the user credentials by sending the ID to the company servers by using a web request that returns the login credentials in plaintext.

L.M. said Motherboard by using an automated script he harvested all the customers’ credentials. he also warned that most of the customers reuse the credentials with their mail, PayPal or Amazon accounts.

Recently another spyware company Spyfone exposed terabytes of data that includes audio recordings, text messages, photos and web history from an unsecured Amazon S3 bucket.

Also Read

T-Mobile Hacked – Attackers Stolen 2 Million Customers Sensitive Data

New Form of Mirai Malware Attacking Cross Platform By leveraging Open-Source Project

37,000 Eir Customer’s Personal Data Exposed as their Company Laptop Stolen

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has been…

5 hours ago

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government, defense,…

5 hours ago

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency of…

6 hours ago

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working in…

6 hours ago

DragonForce Attacks Critical Infrastructure to Exfiltrate Data and Halt Operations

The DragonForce ransomware group has launched a significant cyberattack on critical infrastructure in Saudi Arabia,…

6 hours ago

New Malware Uses Legitimate Antivirus Driver to Bypass All System Protections

In a concerning development, cybersecurity researchers at Trellix have uncovered a sophisticated malware campaign that…

6 hours ago