Amazon won’t say if it plans to take motion in opposition to three cellphone surveillance apps which can be storing troves of people’ non-public cellphone information on Amazon’s cloud servers, regardless of TechCrunch notifying the tech large weeks earlier that it was internet hosting the stolen cellphone information.
Amazon informed TechCrunch it was “following [its] course of” after our February discover, however as of the time of this text’s publication, the stalkerware operations Cocospy, Spyic, and Spyzie proceed to add and retailer images exfiltrated from individuals’s telephones on Amazon Net Companies.
Cocospy, Spyic, and Spyzie are three near-identical Android apps that share the identical supply code and a typical safety bug, in keeping with a safety researcher who found it, and supplied particulars to TechCrunch. The researcher revealed that the operations uncovered the cellphone information on a collective 3.1 million individuals, a lot of whom are victims with no concept that their gadgets have been compromised. The researcher shared the info with breach notification website Have I Been Pwned.
As a part of our investigation into the stalkerware operations, which included analyzing the apps themselves, TechCrunch discovered that among the contents of a tool compromised by the stalkerware apps are being uploaded to storage servers run by Amazon Net Companies, or AWS.
TechCrunch notified Amazon on February 20 by e mail that it’s internet hosting information exfiltrated by Cocospy and Spyic, and once more earlier this week after we notified Amazon it was additionally internet hosting stolen cellphone information exfiltrated by Spyzie.
In each emails, TechCrunch included the identify of every particular Amazon-hosted storage “bucket” that accommodates information taken from victims’ telephones.
In response, Amazon spokesperson Ryan Walsh informed TechCrunch: “AWS has clear phrases that require our clients to make use of our providers in compliance with relevant legal guidelines. After we obtain reviews of potential violations of our phrases, we act rapidly to evaluation and take steps to disable prohibited content material.” Walsh supplied a hyperlink to an Amazon net web page internet hosting an abuse reporting type, however wouldn’t touch upon the standing of the Amazon servers utilized by the apps.
In a follow-up e mail this week, TechCrunch referenced the sooner February 20 e mail that included the Amazon-hosted storage bucket names.
In response, Walsh thanked TechCrunch for “bringing this to our consideration,” and supplied one other hyperlink to Amazon’s report abuse type. When requested once more if Amazon plans to take motion in opposition to the buckets, Walsh replied: “We haven’t but acquired an abuse report from TechCrunch by way of the hyperlink we supplied earlier.”
Amazon spokesperson Casey McGee, who was copied on the e-mail thread, claimed it might be “inaccurate of TechCrunch to characterize the substance of this thread as a [sic] constituting a ‘report’ of any potential abuse.”
Amazon Net Companies, which has a industrial curiosity in retaining paying clients, made $39.8 billion in revenue throughout 2024, per the corporate’s 2024 full-year earnings, representing a majority share of Amazon’s complete annual earnings.
The storage buckets utilized by Cocospy, Spyic, and Spyzie, are nonetheless lively as of the time of publication.
Why this issues
Amazon’s personal acceptable use coverage broadly spells out what the corporate permits clients to host on its platform. Amazon doesn’t seem to dispute that it disallows spy ware and stalkerware operations to add information on its platform. As an alternative, Amazon’s dispute seems to be completely procedural.
It’s not a journalist’s job — or anybody else’s — to police what’s hosted on Amazon’s platform, or the cloud platform of some other firm.
Amazon has large sources, each financially and technologically, to make use of to implement its personal insurance policies by making certain that dangerous actors are usually not abusing its service.
In the long run, TechCrunch supplied discover to Amazon, together with info that instantly factors to the areas of the troves of stolen non-public cellphone information. Amazon made a selection to not act on the knowledge it acquired.
How we discovered victims’ information hosted on Amazon
When TechCrunch learns of a surveillance-related information breach — there have been dozens of stalkerware hacks and leaks in recent times — we examine to be taught as a lot concerning the operations as potential.
Our investigations may help to determine victims whose telephones had been hacked, however can even reveal the oft-hidden real-world identities of the surveillance operators themselves, in addition to which platforms are used to facilitate the surveillance or host the victims’ stolen information. TechCrunch may even analyze the apps (the place accessible) to assist victims decide learn how to determine and take away the apps.
As a part of our reporting course of, TechCrunch will attain out to any firm we determine as internet hosting or supporting spy ware and stalkerware operations, as is commonplace apply for reporters who plan to say an organization in a narrative. Additionally it is not unusual for firms, corresponding to net hosts and fee processors, to droop accounts or take away information that violate their very own phrases of service, together with earlier spy ware operations which have been hosted on Amazon.
In February, TechCrunch discovered that Cocospy and Spyic had been breached and we got down to examine additional.
Because the information confirmed that almost all of victims had been Android gadget homeowners, TechCrunch began by figuring out, downloading, and putting in the Cocospy and Spyic apps on a digital Android gadget. (A digital gadget permits us to run the stalkerware apps in a protected sandbox with out giving both app any real-world information, corresponding to our location.) Each Cocospy and Spyic appeared as identical-looking and nondescript apps named “System Service” that attempt to evade detection by mixing in with Android’s built-in apps.
We used a community site visitors evaluation instrument to examine the info flowing out and in of the apps, which may help to grasp how every app works and to find out what cellphone information is being stealthily uploaded from our check gadget.
The online site visitors confirmed the 2 stalkerware apps had been importing some victims’ information, like images, to their namesake storage buckets hosted on Amazon Net Companies.

We confirmed this additional by logging into the Cocospy and Spyic consumer dashboards, which permit the individuals who plant the stalkerware apps to view the goal’s stolen information. The online dashboards allowed us to entry the contents of our digital Android gadget’s picture gallery as soon as we had intentionally compromised our digital gadget with the stalkerware apps.
After we opened the contents of our gadget’s picture gallery from every app’s net dashboard, the photographs loaded from net addresses containing their respective bucket names hosted on the amazonaws.com
area, which is run by Amazon Net Companies.
Following later information of Spyzie’s information breach, TechCrunch additionally analyzed Spyzie’s Android app utilizing a community evaluation instrument and located the site visitors information to be equivalent as Cocospy and Spyic. The Spyzie app was equally importing victims’ gadget information to its personal namesake storage bucket on Amazon’s cloud, which we alerted Amazon to on March 10.
Should you or somebody wants assist, the Nationwide Home Violence Hotline (1-800-799-7233) offers 24/7 free, confidential help to victims of home abuse and violence. If you’re in an emergency state of affairs, name 911. The Coalition Towards Stalkerware has sources should you assume your cellphone has been compromised by spy ware.