
Amazon won’t say if it plans to take motion towards three telephone surveillance apps which can be storing troves of people’ personal telephone information on Amazon’s cloud servers, regardless of TechCrunch notifying the tech big weeks earlier that it was internet hosting the stolen telephone information.
Amazon instructed TechCrunch it was “following [its] course of” after our February discover, however as of the time of this text’s publication, the stalkerware operations Cocospy, Spyic, and Spyzie proceed to add and retailer photographs exfiltrated from individuals’s telephones on Amazon Internet Providers.
Cocospy, Spyic, and Spyzie are three near-identical Android apps that share the identical supply code and a typical safety bug, based on a safety researcher who found it, and offered particulars to TechCrunch. The researcher revealed that the operations uncovered the telephone information on a collective 3.1 million individuals, a lot of whom are victims with no concept that their gadgets have been compromised. The researcher shared the information with breach notification website Have I Been Pwned.
As a part of our investigation into the stalkerware operations, which included analyzing the apps themselves, TechCrunch discovered that among the contents of a tool compromised by the stalkerware apps are being uploaded to storage servers run by Amazon Internet Providers, or AWS.
TechCrunch notified Amazon on February 20 by electronic mail that it’s internet hosting information exfiltrated by Cocospy and Spyic, and once more earlier this week once we notified Amazon it was additionally internet hosting stolen telephone information exfiltrated by Spyzie.
In each emails, TechCrunch included the identify of every particular Amazon-hosted storage “bucket” that accommodates information taken from victims’ telephones.
In response, Amazon spokesperson Ryan Walsh instructed TechCrunch: “AWS has clear phrases that require our clients to make use of our providers in compliance with relevant legal guidelines. After we obtain reviews of potential violations of our phrases, we act shortly to assessment and take steps to disable prohibited content material.” Walsh offered a hyperlink to an Amazon internet web page internet hosting an abuse reporting kind, however wouldn’t touch upon the standing of the Amazon servers utilized by the apps.
In a follow-up electronic mail this week, TechCrunch referenced the sooner February 20 electronic mail that included the Amazon-hosted storage bucket names.
In response, Walsh thanked TechCrunch for “bringing this to our consideration,” and offered one other hyperlink to Amazon’s report abuse kind. When requested once more if Amazon plans to take motion towards the buckets, Walsh replied: “We haven’t but acquired an abuse report from TechCrunch by way of the hyperlink we offered earlier.”
Amazon spokesperson Casey McGee, who was copied on the e-mail thread, claimed it will be “inaccurate of TechCrunch to characterize the substance of this thread as a [sic] constituting a ‘report’ of any potential abuse.”
Amazon Internet Providers, which has a business curiosity in retaining paying clients, made $39.8 billion in revenue throughout 2024, per the company’s 2024 full-year earnings, representing a majority share of Amazon’s whole annual revenue.
The storage buckets utilized by Cocospy, Spyic, and Spyzie, are nonetheless energetic as of the time of publication.
Why this issues
Amazon’s personal acceptable use policy broadly spells out what the corporate permits clients to host on its platform. Amazon doesn’t seem to dispute that it disallows spyware and adware and stalkerware operations to add information on its platform. As an alternative, Amazon’s dispute seems to be totally procedural.
It’s not a journalist’s job — or anybody else’s — to police what’s hosted on Amazon’s platform, or the cloud platform of every other firm.
Amazon has large assets, each financially and technologically, to make use of to implement its personal insurance policies by guaranteeing that unhealthy actors will not be abusing its service.
In the long run, TechCrunch offered discover to Amazon, together with info that immediately factors to the areas of the troves of stolen personal telephone information. Amazon made a alternative to not act on the data it acquired.
How we discovered victims’ information hosted on Amazon
When TechCrunch learns of a surveillance-related information breach — there have been dozens of stalkerware hacks and leaks in recent years — we examine to be taught as a lot in regards to the operations as attainable.
Our investigations can help to identify victims whose phones were hacked, however may also reveal the oft-hidden real-world identities of the surveillance operators themselves, in addition to which platforms are used to facilitate the surveillance or host the victims’ stolen information. TechCrunch may also analyze the apps (the place out there) to assist victims determine how to identify and remove the apps.
As a part of our reporting course of, TechCrunch will attain out to any firm we establish as internet hosting or supporting spyware and adware and stalkerware operations, as is commonplace observe for reporters who plan to say an organization in a narrative. Additionally it is not unusual for corporations, equivalent to web hosts and payment processors, to droop accounts or take away information that violate their own terms of service, together with previous spyware operations that have been hosted on Amazon.
In February, TechCrunch realized that Cocospy and Spyic had been breached and we got down to examine additional.
Because the information confirmed that almost all of victims have been Android system homeowners, TechCrunch began by figuring out, downloading, and putting in the Cocospy and Spyic apps on a digital Android system. (A digital system permits us to run the stalkerware apps in a protected sandbox with out giving both app any real-world information, equivalent to our location.) Each Cocospy and Spyic appeared as identical-looking and nondescript apps named “System Service” that attempt to evade detection by mixing in with Android’s built-in apps.
We used a community site visitors evaluation instrument to examine the information flowing out and in of the apps, which will help to know how every app works and to find out what telephone information is being stealthily uploaded from our take a look at system.
The online site visitors confirmed the 2 stalkerware apps have been importing some victims’ information, like photographs, to their namesake storage buckets hosted on Amazon Internet Providers.

We confirmed this additional by logging into the Cocospy and Spyic consumer dashboards, which permit the individuals who plant the stalkerware apps to view the goal’s stolen information. The online dashboards allowed us to entry the contents of our digital Android system’s photograph gallery as soon as we had intentionally compromised our digital system with the stalkerware apps.
After we opened the contents of our system’s photograph gallery from every app’s internet dashboard, the pictures loaded from internet addresses containing their respective bucket names hosted on the amazonaws.com
area, which is run by Amazon Internet Providers.
Following later news of Spyzie’s data breach, TechCrunch additionally analyzed Spyzie’s Android app utilizing a community evaluation instrument and located the site visitors information to be similar as Cocospy and Spyic. The Spyzie app was equally importing victims’ system information to its personal namesake storage bucket on Amazon’s cloud, which we alerted Amazon to on March 10.
Should you or somebody you realize wants assist, the Nationwide Home Violence Hotline (1-800-799-7233) supplies 24/7 free, confidential help to victims of home abuse and violence. If you’re in an emergency state of affairs, name 911. The Coalition Against Stalkerware has assets should you suppose your telephone has been compromised by spyware and adware.