
TechCrunch launched today a spyware scanner which allows anyone to check if their Android device has been compromised by a fleet of mainstream spyware apps, including TheTruthSpy. The goal is to help victims check if their device has been compromised and regain control of their device.
It follows a months-long investigation by TechCrunch in the fleet of spyware apps that share the same server infrastructure but also the same security hole, and dump all the personal phone data of hundreds of thousands of Android users.
SPYWARE SEARCH TOOL
You can check if your Android phone or tablet has been compromised here.
These stealth apps are often surreptitiously installed by someone with physical access to a person’s device and are designed to remain hidden from home screens, but allow that person to see the victim’s phone data in time. real, including its calls, messages, contacts, real-time location data, photos and more.
Our investigation revealed that the spyware apps were created and maintained by a Vietnam-based group of developers who went to great lengths to conceal their involvement in the operation, including using false names and misappropriated identities. . But without a fix, TechCrunch can’t say more about the security flaw because of the risk it poses to the hundreds of thousands of victims whose phones have been unknowingly compromised by the fleet of spyware apps.
Then, in June, a source provided TechCrunch with a cache of files purged from TheTruthSpy’s internal network servers. This file cache included a list of all Android devices that were compromised by one of TheTruthSpy’s network spyware apps up to April 2022, when the data was presumably cleared.
The leaked list does not contain enough information for TechCrunch to identify or notify owners of compromised devices. That’s why TechCrunch built this spyware scanner. The tool allows anyone to check for themselves if their Android device has been compromised by these apps and how remove spyware – if it is safe to do so.
The tool works by comparing against the leaked list of unique device identifiers, such as IMEI numbers and advertising IDs, which are typically collected by apps on your device and returned to the developer, and these spyware apps are not different.
TechCrunch verified the leaked list by matching known identifiers, like IMEIs, of burner and virtual devices we used during our investigation of the spyware network.
You can use the tool for free hereand learn more about our survey who first discovered the spyware network.
If you or someone you know needs help, the National Domestic Violence Hotline (1-800-799-7233) provides free, confidential 24/7 support for victims of abuse and domestic violence. If you are in an emergency, dial 911. Coalition Against Harassment Software also has resources if you suspect your phone has been compromised by spyware. You can reach this reporter on Signal and WhatsApp at +1 646-755-8849 or email zack.whittaker@techcrunch.com.