Benjamin Carr, Ph.D. 👨🏻💻🧬<p><a href="https://hachyderm.io/tags/Amazon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Amazon</span></a> is still hosting <a href="https://hachyderm.io/tags/stalkerware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stalkerware</span></a> victims' data weeks after breach alert<br><a href="https://hachyderm.io/tags/Cocospy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cocospy</span></a>, <a href="https://hachyderm.io/tags/Spyic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spyic</span></a>, and <a href="https://hachyderm.io/tags/Spyzie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spyzie</span></a>, have collectively compromised over 3.1 million Android phones, which we know because apps each had a <a href="https://hachyderm.io/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> in Feb.<br>As part of our investigation into stalkerware operations, which included analyzing the apps themselves, TechCrunch found that some of the contents of a device compromised by the stalkerware apps are being uploaded to storage servers run by <a href="https://hachyderm.io/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a>. <br><a href="https://techcrunch.com/2025/03/13/amazon-is-still-hosting-stalkerware-victims-data-weeks-after-breach-alert/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/03/13/amaz</span><span class="invisible">on-is-still-hosting-stalkerware-victims-data-weeks-after-breach-alert/</span></a></p>