Millions of Sensitive Records Leaked by Another Spyware Maker

Robinson+Cole Data Privacy + Security Insider
Contact

We reported last week that a spyware maker compromised users’ and victims’ sensitive information [view related post]. Since that time, another spyware maker, mSpy, which holds itself out as having over a million users employing its product to “spy” on their partners and children, has reportedly leaked the passwords, call logs, text messages, location data, contacts and notes of victims whose mobile phones are being spied on by others.

Apparently, a security researcher found an open database on the Internet that allows anyone to query mSpy records for customer transactions and mobile phone data with no authentication.

Some of the information that could be accessed includes an individual’s contacts, call logs, text messages, browser history, events, notes, WhatsApp, installed applications and Wi-Fi networks used. It is being reported that there were millions of records available. When mSpy was notified of the vulnerability, it took the files offline.

According to KrebsOnSecurity, MSpy was previously hacked in May 2015, and customer data was posted to the Dark Web.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Robinson+Cole Data Privacy + Security Insider | Attorney Advertising

Written by:

Robinson+Cole Data Privacy + Security Insider
Contact
more
less

Robinson+Cole Data Privacy + Security Insider on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.