Hacktivist scrapes over 500,000 stalkerware customers’ payment records
嗯,用户让我用中文总结这篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要通读整篇文章,抓住主要信息。 文章讲的是一个黑客从一家提供“stalkerware”(间谍软件)的公司那里获取了超过50万条支付记录。这些记录暴露了用户的邮箱和部分支付信息。这些间谍软件可以用来跟踪手机,访问私人社交媒体账户,甚至获取受害者的通话记录、短信、照片等信息。 接着,黑客通过一个简单的网站漏洞获取了这些数据,并在黑客论坛上公布了。这显示了间谍软件公司存在严重的安全漏洞,导致客户和受害者的信息被泄露。 总结的时候要包括:黑客行为、受影响的公司、泄露的信息类型、间谍软件的功能以及事件的影响。同时要注意字数限制,确保简洁明了。 现在把这些点组织成一句话,不超过100字。比如:“一名黑客从一家乌克兰间谍软件公司获取了536,000条支付记录,暴露用户邮箱和部分支付信息。这些间谍软件可跟踪手机、访问私人账户等。” 这样既涵盖了主要事件,又简洁明了。 </think> 一名黑客从一家乌克兰间谍软件公司获取了536,000条支付记录,暴露用户邮箱和部分支付信息。这些间谍软件可跟踪手机、访问私人账户等。 2026-2-9 17:5:56 Author: techcrunch.com(查看原文) 阅读量:1 收藏

A hacktivist has scraped more than half-a-million payment records from a provider of consumer-grade “stalkerware” phone surveillance apps, exposing the email addresses and partial payment information of customers who paid to spy on others. 

The transactions contain records of payments for phone-tracking services like Geofinder and uMobix, as well as services like Peekviewer (formerly Glassagram), which purport to allow access to private Instagram accounts, among several other monitoring and tracking apps provided by the same vendor, a Ukrainian company called Struktura.

The customer data also includes transaction records from Xnspy, a known phone surveillance app, which in 2022 spilled the private data from tens of thousands of unsuspecting people’s Android devices and iPhones. 

This is the latest example of a surveillance vendor exposing the information of its customers due to security flaws. Over the past few years, dozens of stalkerware apps have been hacked, or have managed to lose, spill, or expose people’s private data — often the victims themselves — thanks to shoddy cybersecurity by the stalkerware operators.

Contact Us

To contact Zack Whittaker securely, reach out via Signal username zackwhittaker.1337. Contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or email.

Stalkerware apps like uMobix and Xnspy, once planted on someone’s phone, upload the victim’s private data, including their call records, text messages, photos, browsing history, and precise location data, which is then shared with the person who planted the app.

Apps like uMobix and Xnspy have explicitly marketed their services for people to spy on their spouses and domestic partners, which is illegal.

The data, seen by TechCrunch, included about 536,000 lines of customer email addresses, which app or brand the customer paid for, how much they paid, the payment card type (such as Visa or Mastercard), and the last four digits on the card. The customer records did not include dates of payments. 

TechCrunch verified the data was authentic by taking several transaction records containing disposable email addresses with public inboxes, such as Mailinator, and running them through the various password reset portals provided by the various surveillance apps. By resetting the passwords on accounts associated with public email addresses, we determined that these were real accounts.

We also verified the data by matching each transaction’s unique invoice number from the leaked dataset with the surveillance vendor’s checkout pages. We could do this because the checkout page allowed us to retrieve the same customer and transaction data from the server without needing a password.

The hacktivist, who goes by the moniker “wikkid,” told TechCrunch they scraped the data from the stalkerware vendor thanks to a “trivial” bug in its website. The hacktivist said they “have fun targeting apps that are used to spy on people,” and subsequently published the scraped data on a known hacking forum.

The hacking forum listing lists the surveillance vendor as Ersten Group, which presents itself as a U.K.-presenting software development startup. 

TechCrunch found several email addresses in the dataset used for testing and customer support instead reference Struktura, a Ukrainian company that has an identical website to Ersten Group. The earliest record in the dataset contained the email address for Struktura’s chief executive, Viktoriia Zosim, for a transaction of $1. 

Representatives for Ersten Group did not respond to our requests for comment. Struktura’s Zosim did not return a request for comment.

Zack Whittaker is the security editor at TechCrunch. He also authors the weekly cybersecurity newsletter, this week in security.

He can be reached via encrypted message at zackwhittaker.1337 on Signal. You can also contact him by email, or to verify outreach, at [email protected].

View Bio

Lorenzo Franceschi-Bicchierai is a Senior Writer at TechCrunch, where he covers hacking, cybersecurity, surveillance, and privacy.

You can contact or verify outreach from Lorenzo by emailing [email protected], via encrypted message at +1 917 257 1382 on Signal, and @lorenzofb on Keybase/Telegram.

View Bio


文章来源: https://techcrunch.com/2026/02/09/hacktivist-scrapes-over-500000-stalkerware-customers-payment-records/
如有侵权请联系:admin#unsafe.sh