Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Android Spyware Catwatchful Exposes Credentials of Over 62,000+ Customer Accounts

Posted on July 3, 2025July 3, 2025 By CWS

A serious safety vulnerability within the Android adware operation Catwatchful has uncovered the entire database of over 62,000 buyer accounts, together with plaintext passwords and electronic mail addresses, in line with a safety researcher who found the breach in June 2025.

Canadian cybersecurity researcher Eric Daigle uncovered the vulnerability by a SQL injection assault that allowed him to extract all the person database from the stalkerware service.

The breach additionally uncovered knowledge from roughly 26,000 victims whose telephones had been being monitored with out their data.

Important Safety Flaw in “Undetectable” Spyware and adware

Catwatchful marketed itself as utterly invisible surveillance software program, boasting that it “can’t be detected” and “can’t be uninstalled.” Nonetheless, the service’s backend proved far much less safe than its advertising claims prompt.

The vulnerability stemmed from an unauthenticated PHP API endpoint that was inclined to SQL injection assaults. Regardless of working a hybrid structure utilizing Google’s Firebase platform for storing stolen sufferer knowledge, Catwatchful maintained a separate MySQL database containing person credentials that lacked fundamental safety protections.

Catwatchful Exposes Credentials

The leaked database revealed that Catwatchful had been working since at the least 2018, with victims primarily situated in Mexico, Colombia, India, Peru, Argentina, Ecuador, and Bolivia.

The adware collected complete private knowledge, together with images, textual content messages, name logs, location knowledge, and will remotely activate machine cameras and microphones.

The breach additionally uncovered the id of the operation’s administrator, Omar Soca Charcov, a Uruguay-based developer who failed to answer disclosure requests from journalists.

Catwatchful employed a complicated dual-server system. Person registration triggered account creation in each Google Firebase and a customized database hosted on catwatchful.pink. Whereas Firebase offered strong safety for storing sufferer knowledge, the customized server dealing with person authentication was utterly susceptible.

Daigle found that the service’s API calls had been solely unauthenticated, permitting anybody to entry machine data utilizing easy parameters.

When he examined for SQL injection vulnerabilities utilizing automated instruments, he efficiently recognized each time-based blind and union-based injection factors that allowed full database extraction.

This incident represents the fifth main stalkerware breach in 2025 alone, highlighting systemic safety failures throughout the surveillance software program business. Earlier breaches have uncovered tens of millions of sufferer data from providers together with SpyX, Cocospy, Spyic, and Spyzie.

The sample reveals that whereas these providers gather extremely delicate private knowledge, they persistently fail to implement fundamental cybersecurity measures to guard both their clients or victims.

Following accountable disclosure, TechCrunch contacted varied service suppliers. The internet hosting firm briefly suspended Catwatchful, although the service later migrated to HostGator. Google added Catwatchful to its Play Shield detection system, however has not but disabled the Firebase occasion storing sufferer knowledge.

Safety consultants word that Android customers can detect Catwatchful by dialing “543210” on their machine, which triggers a built-in backdoor revealing the hidden software.

The uncovered credentials have been added to the Have I Been Pwned breach notification service, permitting affected customers to examine if their accounts had been compromised.

This breach highlights the inherent dangers related to stalkerware operations, illustrating that these illicit surveillance instruments pose a risk to each perpetrators and victims attributable to insufficient safety practices and inadequate knowledge safety measures.

Examine stay malware habits, hint each step of an assault, and make quicker, smarter safety choices -> Attempt ANY.RUN now 

Cyber Security News Tags:Accounts, Android, Catwatchful, Credentials, Customer, Exposes, Spyware

Post navigation

Previous Post: 13-Year-Old Dylan – Youngest Security Researcher Collaborates with Microsoft Security Response Center
Next Post: Microsoft Edge Fixes Actively Exploited Chromium Vulnerability

Related Posts

Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone Cyber Security News
1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers Cyber Security News
10 Best VPN Alternatives in 2025 Cyber Security News
Storm-2603 Using Custom Malware That Leverages BYOVD to Tamper with Endpoint Protections Cyber Security News
Threat Actors Leverages DeepSeek-R1 Popularity to Attack Users Running Windows Devices Cyber Security News
Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News