Report: Spyhide Stalkerware Stealing Private Data from Android Devices Worldwide

Here's how you can check if your phone has it.

Analysis reveals a massive data theft operation targeting Android smartphones globally via popular stalkerware.

Since 2016, the stealthy stalkerware Spyhide has been secretly gathering private information from tens of thousands of victims, according to a report from TechCrunch. The widespread stalkerware is intended to remain undetectable on victims' phones, making it challenging to find and delete.

According to research by Swiss developer and hacker Maia Arson Crimew, the Spyhide app was created by an Iranian software business called "Virsys" or "Virsis." Crimew accessed the app's source code and back-end databases, revealing how this covert spyware operation operated.

The text-only database of Spyhide, which held thorough records of over 60,000 infected Android devices going back to 2016, exposed the startling scope of the operation.

Every continent has victims impacted by data theft, including phone records, text messages, exact location histories, and photographs.

Over 3,100 infected devices have been found in the United States. Some people have access to several hacked devices, increasing the scope of the operation.

Iranians are Behind the Malicious Operation

Due to the highly sensitive information obtained via Spyhide, including password reset links and codes for two-factor authentication, the victims are now at risk of identity theft and other criminal activity.

To get around Google's app store limitations, the Spyhide software was mostly distributed via the business' website. This tactic made it possible for the malware to evade detection by unwary users.

Two Iranian developers were found to be making money from the operation after the names of the Spyhide administrators were partly revealed via the source code. Currently, one of the developers lives in Dubai, while the other is connected to northern Iran.

Protect Yourself From Stalkerware

Users must nevertheless exercise caution, even if stalkerware programs like Spyhide are expressly forbidden from Google's app store owing to their unethical nature. Look for apps posing as "Google Settings" or "T.Ringtone" in the list of installed programs to see whether your device has the malicious app, per The Indian Express.

Access the Settings app on your smartphone and go to the list of installed programs to see whether Spyhide has affected your device. 'Google Settings' or 'T.Ringtone' are ingenious aliases used by Spyhide to hide itself. Remove these applications from your device. Deleting software may disclose information about the installer. To boost security, it is advisable to switch on "Google Play Protect" in the Google Play app's settings.

The danger of identity theft with the use of bots has increased with the development of AI, according to TechRadar. Although using the finest identity theft protection services might provide some degree of security, users must exercise caution to be secure online and avoid becoming identity theft victims.

byline -quincy
techtimes
ⓒ 2024 TECHTIMES.com All rights reserved. Do not reproduce without permission.
Join the Discussion
Real Time Analytics