Minnesota Spyware Maker Hacked: Thousands of Devices Compromised Worldwide

Share Now:

Facebook
Twitter
LinkedIn
Pinterest
Reddit
Minnesota Spyware Maker Hacked: Thousands of Devices Compromised Worldwide | Insider Market Research |

Spytech’s Data Breach Unveiled

In a recent exposé by TechCrunch, a little-known spyware company based in Minnesota, Spytech, has been hacked, revealing the extent of its surveillance on thousands of devices globally. An insider provided TechCrunch with a cache of files from Spytech’s servers, detailing the activity logs of phones, tablets, and computers monitored by the company’s spyware, revealing that the Minnesota spyware maker hacked. Some of these files are dated as recently as early June.

The authenticity of the data was verified by TechCrunch through the analysis of exfiltrated device activity logs, including those belonging to Spytech’s chief executive, Nathan Polencheck, who had installed the spyware on one of his own devices. The logs show that Spytech’s products, such as Realtime-Spy and SpyAgent, have compromised over 10,000 devices since 2013. These devices include Android phones, Chromebooks, Macs, and Windows PCs across the globe.

Implications of the Breach

The Minnesota spyware maker hacked incident marks the latest in a series of breaches involving spyware makers, with Spytech being the fourth such company to be hacked this year. Upon being contacted by TechCrunch, Polencheck stated that he was unaware of the breach and was in the process of investigating the situation.

Spytech markets its remote access apps, often labeled as “stalkerware,” under the pretense of allowing parents to monitor their children’s activities. However, the company also openly promotes these tools for spousal surveillance, encouraging users to “keep tabs on your spouse’s suspicious behavior.” While monitoring children’s or employees’ activities is legal, surveilling a device without the owner’s consent is unlawful. Both spyware operators and users have faced legal consequences for selling and using such software.

Stalkerware apps, typically installed by someone with physical access to a device, can remain hidden and are difficult to detect and remove. These apps collect a wide array of data, including keystrokes, screen taps, web browsing history, device activity, and granular location data on Android devices, and send this information to a remote dashboard controlled by the person who planted the spyware.

Minnesota Spyware Maker Hacked: Global Reach and Legal Implications

The breached data includes logs of all devices under Spytech’s control, with the majority being Windows PCs and, to a lesser extent, Android devices, Macs, and Chromebooks. Notably, the device activity logs were not encrypted. TechCrunch plotted the location data from the compromised Android phones using an offline mapping tool to maintain victims’ privacy. The analysis revealed significant clusters of monitored devices across Europe and the United States, with additional localized devices in Africa, Asia, Australia, and the Middle East.

One of the logs linked to Polencheck’s administrator account included the precise location of his residence in Red Wing, Minnesota. While the breach exposed extensive sensitive data and personal information from the monitored devices, TechCrunch noted that there was insufficient identifiable information to notify individual victims of the breach.

When asked about notifying customers, device owners, or U.S. state authorities as required by data breach notification laws, Polencheck did not provide a clear response. A spokesperson for Minnesota’s attorney general also did not comment on the situation.

Share Now:

Facebook
Twitter
LinkedIn
Pinterest
Reddit

More For You