{"id":178253,"date":"2025-07-02T14:05:00","date_gmt":"2025-07-02T14:05:00","guid":{"rendered":"https:\/\/entertainment.runfyers.com\/index.php\/2025\/07\/02\/exclusive-data-breach-reveals-catwatchful-stalkerware-is-spying-on-thousands-of-phones\/"},"modified":"2025-07-02T14:05:00","modified_gmt":"2025-07-02T14:05:00","slug":"exclusive-data-breach-reveals-catwatchful-stalkerware-is-spying-on-thousands-of-phones","status":"publish","type":"post","link":"https:\/\/entertainment.runfyers.com\/index.php\/2025\/07\/02\/exclusive-data-breach-reveals-catwatchful-stalkerware-is-spying-on-thousands-of-phones\/","title":{"rendered":"Exclusive: Data breach reveals Catwatchful &#8216;stalkerware&#8217; is spying on thousands of phones"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">A security vulnerability in a stealthy Android spyware operation called Catwatchful has exposed thousands of its customers, including its administrator.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">The bug, which was discovered by security researcher Eric Daigle, spilled the spyware app\u2019s full database of email addresses and plaintext passwords that Catwatchful customers use to access the data stolen from the phones of their victims.<\/p>\n<p class=\"wp-block-paragraph\">Catwatchful is spyware masquerading as a child monitoring app that claims to be \u201cinvisible and cannot be detected,\u201d all the while uploading the victim\u2019s phone\u2019s private contents to a dashboard viewable by the person who planted the app. The stolen data includes the victims\u2019 photos, messages, and real-time location data. The app can also remotely tap into the live ambient audio from the phone\u2019s microphone and access both front and rear phone cameras.<\/p>\n<p class=\"wp-block-paragraph\">Spyware apps like Catwatchful are banned from the app stores and rely on being downloaded and planted by someone with physical access to a person\u2019s phone.<strong> <\/strong>As such, these apps are commonly referred to as <a href=\"https:\/\/techcrunch.com\/2025\/04\/25\/techcrunch-reference-guide-to-security-terminology\/#stalkerware\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cstalkerware\u201d (or spouseware)<\/a> for their propensity to facilitate non-consensual surveillance of spouses and romantic partners, which is illegal.<\/p>\n<p class=\"wp-block-paragraph\">Catwatchful is the latest example in a growing list of stalkerware operations that have been hacked, breached, or otherwise exposed the data they obtain, and is <a href=\"https:\/\/techcrunch.com\/2025\/02\/20\/hacked-leaked-exposed-why-you-should-stop-using-stalkerware-apps\/\" target=\"_blank\" rel=\"noreferrer noopener\">at least the fifth spyware operation this year<\/a> to have experienced a data spill. The incident shows that consumer-grade spyware continues to proliferate, despite being prone to shoddy coding and security failings that expose both paying customers and unsuspecting victims to data breaches.<\/p>\n<p class=\"wp-block-paragraph\">According to a copy of the database from early June, which TechCrunch\u00a0has seen, Catwatchful had email addresses and passwords on more than 62,000 customers and the phone data from 26,000 victims\u2019 devices.<\/p>\n<p class=\"wp-block-paragraph\">Most of the compromised devices were located in Mexico, Colombia, India, Peru, Argentina, Ecuador, and Bolivia (in order of the number of victims). Some of the records date back to 2018, the data shows.<\/p>\n<p class=\"wp-block-paragraph\">The Catwatchful database also revealed the identity of the spyware operation\u2019s administrator, Omar Soca Charcov, a developer based in Uruguay. Charcov opened our emails, but did not respond to our requests for comment sent in both English and Spanish. TechCrunch asked if he was aware of the Catwatchful data breach, and if he plans to disclose the incident to its customers.<\/p>\n<p class=\"wp-block-paragraph\">Without any clear indication that Charcov will disclose the incident, TechCrunch provided a copy of the Catwatchful database to data breach notification service <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Have I Been Pwned<\/a>.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-catwatchful-hosting-spyware-data-on-google-s-servers\">Catwatchful hosting spyware data on Google\u2019s servers<\/h2>\n<p class=\"wp-block-paragraph\">Daigle, a security researcher in Canada who <a href=\"https:\/\/techcrunch.com\/2024\/05\/25\/spyware-app-pctattletale-was-hacked-and-its-website-defaced\/\" target=\"_blank\" rel=\"noreferrer noopener\">has previously investigated stalkerware abuses<\/a>, detailed his findings in a <a href=\"https:\/\/ericdaigle.ca\/posts\/taking-over-60k-spyware-user-accounts\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">blog post<\/a>.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">According to Daigle, Catwatchful uses a custom-made API, which every one of the planted Android apps relies on to communicate with and send data to Catwatchful\u2019s servers. The spyware also uses Google\u2019s Firebase, a web and mobile development platform, to host and store the victim\u2019s stolen phone data, including their photos and ambient audio recordings.<\/p>\n<p class=\"wp-block-paragraph\">Daigle told TechCrunch that the API was unauthenticated, allowing anyone on the internet to interact with the Catwatchful user database without needing a login, which exposed the entire Catwatchful database of customer email addresses and passwords.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">When contacted by TechCrunch, the web company hosting the Catwatchful API suspended the spyware developer\u2019s account, briefly blocking the spyware from operating, but the API returned later on HostGator. A spokesperson for HostGator, Kristen Andrews, did not respond to requests for comment regarding the company hosting the spyware\u2019s operations.<\/p>\n<p class=\"wp-block-paragraph\">TechCrunch confirmed that Catwatchful uses Firebase by downloading and installing the Catwatchful spyware on a virtualized Android device, which allows us to run the spyware in an isolated sandbox without giving it any real-world data, like our location.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">We examined the network traffic flowing in and out of the device, which showed data from the phone uploading to a specific Firebase instance used by Catwatchful to host the victim\u2019s stolen data.<\/p>\n<p class=\"wp-block-paragraph\">After TechCrunch provided Google with copies of the Catwatchful malware, Google said it added new protections for <a rel=\"nofollow noopener\" href=\"https:\/\/support.google.com\/googleplay\/answer\/2812853?hl=en\" target=\"_blank\">Google Play Protect<\/a>, a security tool that scans Android phones for malicious apps, like spyware. Now, Google Play Protect will alert users when it detects the Catwatchful spyware or its installer on a user\u2019s phone.<\/p>\n<p class=\"wp-block-paragraph\">TechCrunch also provided Google with details of the Firebase instance involved in storing data for the Catwatchful operation. Asked whether the stalkerware operation violates Firebase\u2019s terms of service, Google told TechCrunch on June 25 that it was investigating but would not immediately commit to taking down the operation.<\/p>\n<p class=\"wp-block-paragraph\">\u201cAll apps using Firebase products must abide by our terms of service and policies. We are investigating this particular issue, and if we find that an app is in violation, appropriate action will be taken. Android users that attempt to install these apps are protected by Google Play Protect,\u201d said Ed Fernandez, a spokesperson for Google.<\/p>\n<p class=\"wp-block-paragraph\">As of publication, Catwatchful remains hosted on Firebase.\u00a0<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-opsec-mistake-exposes-spyware-administrator\">Opsec mistake exposes spyware administrator<\/h2>\n<p class=\"wp-block-paragraph\">Like many spyware operations, Catwatchful does not publicly list its owner or disclose who runs the operation. It\u2019s <a href=\"https:\/\/techcrunch.com\/2023\/07\/20\/thetruthspy-stalkerware-forged-passports-millions\/\" target=\"_blank\" rel=\"noreferrer noopener\">not uncommon for stalkerware and spyware operators to hide their real identities<\/a>, given the legal and reputational risks associated with facilitating illegal surveillance.<\/p>\n<p class=\"wp-block-paragraph\">But an <a href=\"https:\/\/techcrunch.com\/2025\/04\/25\/techcrunch-reference-guide-to-security-terminology\/#operational-security\" target=\"_blank\" rel=\"noreferrer noopener\">operational security<\/a> mishap in the dataset exposed Charcov as the operation\u2019s administrator.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">A review of the Catwatchful database lists Charcov as the first record in one of the files in the dataset. (In past spyware-related data breaches, some operators have been identified by early records in the database, as oftentimes the developers are testing the spyware product on their own devices.)<\/p>\n<p class=\"wp-block-paragraph\">The dataset included Charcov\u2019s full name, phone number, and the web address of the specific Firebase instance where Catwatchful\u2019s database is stored on Google\u2019s servers.<\/p>\n<p class=\"wp-block-paragraph\">Charcov\u2019s personal email address, found in the dataset, is the same email that he lists on his LinkedIn page, which has since been set to private. Charcov also configured his Catwatchful administrator\u2019s email address as the password recovery address on his personal email account in the event he gets locked out, which directly links Charcov to the Catwatchful operation.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-how-to-remove-catwatchful-spyware\">How to remove Catwatchful spyware<\/h2>\n<p class=\"wp-block-paragraph\">While Catwatchful claims it \u201ccannot be uninstalled,\u201d there are ways to detect and remove the app from an affected device.<\/p>\n<p class=\"wp-block-paragraph\">Before you start, it\u2019s important to have <a href=\"https:\/\/stopstalkerware.org\/resources\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">a safety plan in place<\/a>, as disabling spyware can alert the person who planted it. The <a href=\"https:\/\/stopstalkerware.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Coalition Against Stalkerware<\/a> does important work in this space and has resources to help victims and survivors.<\/p>\n<p class=\"wp-block-paragraph\">Android users can detect Catwatchful, even if it is hidden from view, by dialing <strong>543210<\/strong> into your Android phone app\u2019s keypad and then hitting the call button. If Catwatchful is installed, the app should appear on your screen. This code is a built-in <a href=\"https:\/\/techcrunch.com\/2025\/04\/25\/techcrunch-reference-guide-to-security-terminology\/#backdoor\" target=\"_blank\" rel=\"noreferrer noopener\">backdoor feature<\/a> that allows whoever planted the app to regain access to the settings once the app is hidden. This code can also be used by anyone to see if the app is installed.<\/p>\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-4 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized\"><figcaption class=\"wp-element-caption\"><span class=\"wp-block-image__credits\"><strong>Image Credits:<\/strong>TechCrunch<\/span><\/figcaption><\/figure>\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"1007\" src=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/07\/catwatchful-backdoor-code-2-remove.jpg\" alt=\"a screenshot showing the Catwatchful stalkerware app, which can be forced to appear by tapping &quot;543210&quot; into an affected Android phone's app keypad.\" class=\"wp-image-3024003\" style=\"width:400px\" srcset=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/07\/catwatchful-backdoor-code-2-remove.jpg 500w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/07\/catwatchful-backdoor-code-2-remove.jpg?resize=74,150 74w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/07\/catwatchful-backdoor-code-2-remove.jpg?resize=149,300 149w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/07\/catwatchful-backdoor-code-2-remove.jpg?resize=338,680 338w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/07\/catwatchful-backdoor-code-2-remove.jpg?resize=214,430 214w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/07\/catwatchful-backdoor-code-2-remove.jpg?resize=357,720 357w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/07\/catwatchful-backdoor-code-2-remove.jpg?resize=447,900 447w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/07\/catwatchful-backdoor-code-2-remove.jpg?resize=397,800 397w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/07\/catwatchful-backdoor-code-2-remove.jpg?resize=332,668 332w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/07\/catwatchful-backdoor-code-2-remove.jpg?resize=186,375 186w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/07\/catwatchful-backdoor-code-2-remove.jpg?resize=306,617 306w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/07\/catwatchful-backdoor-code-2-remove.jpg?resize=264,531 264w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/07\/catwatchful-backdoor-code-2-remove.jpg?resize=25,50 25w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\"\/><figcaption class=\"wp-element-caption\"><span class=\"wp-block-image__credits\"><strong>Image Credits:<\/strong>TechCrunch<\/span><\/figcaption><\/figure>\n<\/div>\n<p class=\"wp-block-paragraph\">As for removing the app, TechCrunch has a <a href=\"https:\/\/techcrunch.com\/2022\/02\/22\/remove-android-spyware\/\" target=\"_blank\" rel=\"noreferrer noopener\">general how-to guide for removing Android spyware<\/a> that can help you identify and remove common types of phone stalkerware, and then enable the various settings you need to secure your Android device.<\/p>\n<p class=\"has-text-align-center wp-block-paragraph\">\u2014<\/p>\n<p class=\"wp-block-paragraph\"><em>If you or someone you know needs help, the National Domestic Violence Hotline (1-800-799-7233) provides 24\/7 free, confidential support to victims of domestic abuse and violence. If you are in an emergency situation, call 911. The<\/em> <a href=\"https:\/\/stopstalkerware.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><em>Coalition Against Stalkerware<\/em><\/a><em> has resources if you think your phone has been compromised by spyware.<\/em><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/techcrunch.com\/2025\/07\/02\/data-breach-reveals-catwatchful-stalkerware-spying-on-thousands-android-phones\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A security vulnerability in a stealthy Android spyware operation called Catwatchful has exposed thousands of its customers, including its administrator.\u00a0 The bug, which was discovered by security researcher Eric Daigle, spilled the spyware app\u2019s full database of email addresses and plaintext passwords that Catwatchful customers use to access the data stolen from the phones of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":178254,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":{"0":"post-178253","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"_links":{"self":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/178253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=178253"}],"version-history":[{"count":0,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/178253\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/178254"}],"wp:attachment":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=178253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=178253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=178253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}