Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Android Spyware Catwatchful Exposes Credentials of Over 62,000+ Customer Accounts

Posted on July 3, 2025July 3, 2025 By CWS

A serious safety vulnerability within the Android adware operation Catwatchful has uncovered the entire database of over 62,000 buyer accounts, together with plaintext passwords and electronic mail addresses, in line with a safety researcher who found the breach in June 2025.

Canadian cybersecurity researcher Eric Daigle uncovered the vulnerability by a SQL injection assault that allowed him to extract all the person database from the stalkerware service.

The breach additionally uncovered knowledge from roughly 26,000 victims whose telephones had been being monitored with out their data.

Important Safety Flaw in “Undetectable” Spyware and adware

Catwatchful marketed itself as utterly invisible surveillance software program, boasting that it “can’t be detected” and “can’t be uninstalled.” Nonetheless, the service’s backend proved far much less safe than its advertising claims prompt.

The vulnerability stemmed from an unauthenticated PHP API endpoint that was inclined to SQL injection assaults. Regardless of working a hybrid structure utilizing Google’s Firebase platform for storing stolen sufferer knowledge, Catwatchful maintained a separate MySQL database containing person credentials that lacked fundamental safety protections.

Catwatchful Exposes Credentials

The leaked database revealed that Catwatchful had been working since at the least 2018, with victims primarily situated in Mexico, Colombia, India, Peru, Argentina, Ecuador, and Bolivia.

The adware collected complete private knowledge, together with images, textual content messages, name logs, location knowledge, and will remotely activate machine cameras and microphones.

The breach additionally uncovered the id of the operation’s administrator, Omar Soca Charcov, a Uruguay-based developer who failed to answer disclosure requests from journalists.

Catwatchful employed a complicated dual-server system. Person registration triggered account creation in each Google Firebase and a customized database hosted on catwatchful.pink. Whereas Firebase offered strong safety for storing sufferer knowledge, the customized server dealing with person authentication was utterly susceptible.

Daigle found that the service’s API calls had been solely unauthenticated, permitting anybody to entry machine data utilizing easy parameters.

When he examined for SQL injection vulnerabilities utilizing automated instruments, he efficiently recognized each time-based blind and union-based injection factors that allowed full database extraction.

This incident represents the fifth main stalkerware breach in 2025 alone, highlighting systemic safety failures throughout the surveillance software program business. Earlier breaches have uncovered tens of millions of sufferer data from providers together with SpyX, Cocospy, Spyic, and Spyzie.

The sample reveals that whereas these providers gather extremely delicate private knowledge, they persistently fail to implement fundamental cybersecurity measures to guard both their clients or victims.

Following accountable disclosure, TechCrunch contacted varied service suppliers. The internet hosting firm briefly suspended Catwatchful, although the service later migrated to HostGator. Google added Catwatchful to its Play Shield detection system, however has not but disabled the Firebase occasion storing sufferer knowledge.

Safety consultants word that Android customers can detect Catwatchful by dialing “543210” on their machine, which triggers a built-in backdoor revealing the hidden software.

The uncovered credentials have been added to the Have I Been Pwned breach notification service, permitting affected customers to examine if their accounts had been compromised.

This breach highlights the inherent dangers related to stalkerware operations, illustrating that these illicit surveillance instruments pose a risk to each perpetrators and victims attributable to insufficient safety practices and inadequate knowledge safety measures.

Examine stay malware habits, hint each step of an assault, and make quicker, smarter safety choices -> Attempt ANY.RUN now 

Cyber Security News Tags:Accounts, Android, Catwatchful, Credentials, Customer, Exposes, Spyware

Post navigation

Previous Post: 13-Year-Old Dylan – Youngest Security Researcher Collaborates with Microsoft Security Response Center
Next Post: Microsoft Edge Fixes Actively Exploited Chromium Vulnerability

Related Posts

Halo Security Achieves SOC 2 Type 1 Compliance Cyber Security News
New Echo Chamber Attack Jailbreaks Most AI Models by Weaponizing Indirect References Cyber Security News
Microsoft Confirms Error Entry in Windows Firewall With Advanced Security Cyber Security News
AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones Cyber Security News
Darknet Market Archetyp Dismantled by Authorities in Joint Action ‘Operation Deep Sentinel’ Cyber Security News
Microsoft Patched Windows Server 2025 Restart Bug Disconnects AD Domain Controller Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Identify and Avoid Tech Support Scams
  • Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
  • Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
  • Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild
  • Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Identify and Avoid Tech Support Scams
  • Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
  • Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
  • Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild
  • Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News