Topics

Latest

AI

Amazon

Article image

Image Credits:Bryce Durbin / TechCrunch

Apps

Biotech & Health

Climate

a screenshot of a browser window that displays an image hosted on AWS, which reads: “This is evidence that Cocospy is still hosting uploaded victims' data on Amazon’s S3 cloud, hosted at cocospymedia.s3.us-west-1.amazonaws.com This photo was uploaded via a Corellium phone deliberately compromised with Cocospy."

A screenshot of a photo, hosted on Amazon Web Services, which was uploaded via a virtual Android device deliberately compromised with Cocospy stalkerware during a TechCrunch investigationImage Credits:TechCrunch

Cloud Computing

Department of Commerce

Crypto

Enterprise

EVs

Fintech

fund raise

Gadgets

Gaming

Google

Government & Policy

Hardware

Instagram

layoff

Media & Entertainment

Meta

Microsoft

concealment

Robotics

Security

societal

Space

startup

TikTok

Transportation

Venture

More from TechCrunch

upshot

Startup Battlefield

StrictlyVC

Podcasts

Videos

Partner Content

TechCrunch Brand Studio

Crunchboard

Contact Us

Amazon will not say if it plans to take natural process against three phone surveillance apps that are storing troves of individual ’ individual phone data on Amazon ’s cloud servers , despite TechCrunch notifying the tech giant weeks in the first place that it was hosting the stolen earpiece data .

Amazon order TechCrunch it was “ following [ its ] physical process ” after our February posting , but as of the time of this article ’s publication , thestalkerwareoperations Cocospy , Spyic , and Spyzie continue to upload and store photo exfiltrated from people ’s phones on Amazon Web Services .

Cocospy , Spyic , andSpyzieare three near - superposable Android apps that partake the same source computer code and a common security bug , according to a security researcher who discovered it , and provided details to TechCrunch . The research worker revealed that the operations expose the phone data point on a collective 3.1 million people , many of whom are victims with no idea that their equipment have been compromise . The researcher shared the data point with breach notification siteHave I Been Pwned .

As part of our investigating into the stalkerware mental process , which included take apart the apps themselves , TechCrunch found that some of the contents of a machine compromised by the stalkerware apps are being uploaded to storage server run by Amazon Web Services , or AWS .

TechCrunch notified Amazon on February 20 by email that it is host data exfiltrated by Cocospy and Spyic , and again earlier this hebdomad when we send word Amazon it was also hosting stolen phone data exfiltrated by Spyzie .

In both electronic mail , TechCrunch admit the name of each specific Amazon - hosted depot “ bucket ” that stop datum taken from victims ’ telephone set .

In response , Amazon representative Ryan Walsh tell apart TechCrunch : “ AWS has unclouded terms that require our client to use our services in compliance with applicable law . When we receive reports of possible misdemeanor of our terms , we act cursorily to refresh and take steps to incapacitate prohibited capacity . ” Walsh provided a link to an Amazon web Sir Frederick Handley Page hosting an ill-treatment reporting form , but would not comment on the status of the Amazon server used by the apps .

In a follow - up email this hebdomad , TechCrunch referenced the early February 20 e-mail that included the Amazon - hosted storage bucket names .

In response , Walsh thanked TechCrunch for “ bringing this to our attention , ” and provided another tie to Amazon ’s report abuse pattern . When asked again if Amazon plan to take action against the bucketful , Walsh respond : “ We have n’t yet have an contumely report from TechCrunch via the contact we provided earlier . ”

Amazon spokesperson Casey McGee , who was copied on the e-mail ribbon , claimed it would be “ inaccurate of TechCrunch to characterize the gist of this screw thread as a [ sic ] constituting a ‘ report ’ of any potential abuse . ”

Amazon Web Services , which has a commercial interest group in retaining devote client , made $ 39.8 billion in earnings during 2024 , perthe society ’s 2024 full - twelvemonth earnings , lay out a majority share of Amazon ’s total yearly income .

The storage bucketful used by Cocospy , Spyic , and Spyzie , are still participating as of the time of publication .

Why this matters

Amazon ’s ownacceptable use policybroadly spell out what the company allows customers to host on its platform . Amazon does not appear to gainsay that it forbid spyware and stalkerware surgical process to upload data on its weapons platform . or else , Amazon ’s dispute seems to be entirely adjective .

It ’s not a journalist ’s job — or anyone else ’s — to law what is host on Amazon ’s platform , or the cloud weapons platform of any other troupe .

Amazon has huge resources , both financially and technologically , to use to apply its own policies by ensuring that bad actors are not abusing its help .

In the death , TechCrunch provided bill to Amazon , including information that straight points to the locations of the trove of stolen private phone information . Amazon made a choice not to dissemble on the entropy it received .

How we found victims’ data hosted on Amazon

When TechCrunch learns of a surveillance - related datum breach — there have been tons of stalkerware hacks and leak in late years — we investigate to teach as much about the operation as possible .

Our investigation canhelp to identify dupe whose phones were hacked , but can also reveal the ofttimes - hide real - public identicalness of the surveillance operators themselves , as well as which political platform are used to alleviate the surveillance or host the victims ’ stolen data point . TechCrunch will also analyze the apps ( where available ) to help victimsdetermine how to key out and bump off the apps .

As part of our reportage process , TechCrunch will achieve out to any troupe we name as hosting or supporting spyware and stalkerware operations , as is stock practice for newsperson who contrive to mention a company in a write up . It is also not rare for companies , such asweb hosts and payment processors , to suspend accounts or take away data thatviolate their own damage of service , includingprevious spyware operations that have been host on Amazon .

In February , TechCrunch learned that Cocospy and Spyic had been break and we set out to investigate further .

Since the data establish that the majority of victims were Android twist possessor , TechCrunch originate by identifying , downloading , and installing the Cocospy and Spyic apps on a virtual Android twist . ( A practical machine allows us to be given the stalkerware apps in a protect sandpit without make either app any veridical - man data , such as our placement . ) Both Cocospy and Spyic appeared as identical - looking and characterless apps named “ System Service ” that seek to evade detection by blending in with Android ’s build - in apps .

We used a internet dealings analysis putz to scrutinise the data flowing in and out of the apps , which can help to realise how each app works and to determine what earphone data is being stealthily upload from our test twist .

The vane dealings showed the two stalkerware apps were upload some victim ’ data point , like photos , to their namesake storage buckets hosted on Amazon Web Services .

We corroborate this further by logging into the Cocospy and Spyic exploiter dashboards , which permit the people who plant the stalkerware apps to see the target ’s stolen data . The WWW dashboards allow us to enter the contents of our practical Android gimmick ’s photo gallery once we had by design compromise our practical twist with the stalkerware apps .

When we opened the subject of our equipment ’s photograph gallery from each app ’s web splasher , the effigy load from web addresses containing their respective bucketful names host on theamazonaws.comdomain , which is run by Amazon Web Services .

If you or someone you get it on needs help , the National Domestic Violence Hotline ( 1 - 800 - 799 - 7233 ) provide 24/7 innocent , secret livelihood to victims of domestic maltreatment and violence . If you are in an emergency place , call 911 . TheCoalition Against Stalkerwarehas resource if you think your phone has been compromised by spyware .