Spyx Data Breach: 2 Million Affected, Apple Users at Risk

Data Breach Exposes Millions of SpyX Spyware Users
A data security incident impacted SpyX, a spyware application marketed to consumers, according to information obtained by TechCrunch. This breach compromised the records of nearly 2 million individuals, encompassing a significant number of Apple device users.
Breach Details and Timeline
The data compromise occurred in June 2024, but remained undisclosed until now. Notably, the operators of SpyX did not inform either their customers or those who were subjected to surveillance by the spyware.
This incident marks the 25th known data breach affecting mobile surveillance operations since 2017. It highlights the ongoing expansion of the consumer spyware sector and the associated risks to personal data.
Targeting Apple Users
The breach offers unusual insight into the capability of stalkerware, such as SpyX, to target individuals utilizing Apple products.
Data Contents and Discovery
Troy Hunt, the administrator of the data breach notification service Have I Been Pwned, received the compromised data. It was provided as two text files containing 1.97 million distinct account records, each linked to an email address.
The majority of these email addresses are connected to SpyX. The data set also included approximately 300,000 email addresses associated with two applications closely resembling SpyX: Msafely and SpyPhone.
Overlap with Existing Data
Approximately 40% of the email addresses found in the SpyX breach were already present in the Have I Been Pwned database.
Data Sensitivity and Notification
Following previous incidents involving spyware, Hunt categorized the SpyX data breach as “sensitive” within Have I Been Pwned. This ensures that only individuals with affected email addresses can determine if their information was compromised.
Lack of Response from SpyX
TechCrunch attempted to contact the individuals behind SpyX via email to inquire about the breach. However, no response was received. A WhatsApp number listed on the SpyX website was found to be unregistered.
Spyware presents a significant threat to digital privacy, and this breach underscores the importance of robust security measures.
The proliferation of mobile surveillance tools continues to raise concerns about the potential for misuse and the need for greater oversight.
Data breaches affecting these types of applications can expose sensitive personal information to malicious actors.
A New Spyware Exposure
SpyX is marketed as mobile monitoring software compatible with both Android and Apple devices, presented as a tool for parents to oversee their children’s phone activity.
However, surveillance malware, including applications like SpyX, is also frequently referred to as stalkerware or even spouseware. This is due to instances where developers actively promote their products as a means of monitoring a spouse or partner, an action that is generally unlawful without the individual’s consent. Even without such explicit promotion, these spyware applications possess similar capabilities for covert data collection.
Typically, consumer-level spyware operates through one of two primary methods.
For Android devices, applications such as SpyX are generally downloaded from sources outside the official Google Play Store. Installation usually requires physical access to the target device and knowledge of the passcode to bypass security measures and deploy the spyware.
Apple maintains more stringent regulations regarding applications available on the App Store and those that can function on iPhones and iPads. Consequently, stalkerware often targets copies of the device’s backup data stored on Apple’s iCloud cloud service. By obtaining a user’s iCloud login details, stalkerware can consistently download the latest backup directly from Apple’s servers, which contains a substantial amount of personal data, including messages, photos, and application data.
According to security researcher Hunt, one of the compromised files identified iCloud in its name and contained approximately 17,000 unique sets of Apple Account usernames and passwords in plain text.
Recognizing that these credentials belonged to Apple customers, Hunt verified the data’s authenticity by contacting subscribers of Have I Been Pwned whose Apple Account email addresses and passwords were present in the leaked information. Several individuals confirmed the accuracy of the details provided.
To mitigate potential ongoing risks to users with potentially valid account credentials, Hunt shared the list of compromised iCloud credentials with Apple before public disclosure.
Apple did not provide a comment before publication when contacted by TechCrunch.
Following publication, Apple spokesperson Sarah O’Rourke released a statement to TechCrunch, stating: “Our security teams promptly investigate and protect our users when data breaches at other companies present a risk to Apple accounts. In this instance, fewer than 250 iCloud users were affected, and their accounts were immediately secured.”
The validity of the remaining email addresses and passwords found in the breached files, beyond SpyX and its related applications, remained uncertain.
In related news, Google has removed a Chrome extension associated with the SpyX campaign.
“Our policies for the Chrome Web Store and Google Play Store explicitly prohibit malicious code, spyware, and stalkerware, and we take appropriate action when violations are detected. Users who suspect their Google Account has been compromised should immediately follow the recommended security procedures,” stated Google spokesperson Ed Fernandez to TechCrunch.
Identifying and Addressing SpyX
A guide published by TechCrunch offers Android users assistance in detecting and eliminating spyware. This resource can be valuable in pinpointing and removing various phone-monitoring applications. It’s crucial to establish a safety protocol beforehand, as disabling such an app could potentially notify the individual who installed it.
Android device owners can bolster their security by activating Google Play Protect. This built-in feature provides a layer of defense against Android malware, encompassing unwanted surveillance applications. The feature can be found and enabled within the settings of the Google Play Store.
Enhancing the security of Google accounts is achievable through the implementation of two-factor authentication. This measure significantly reduces the risk of unauthorized access to your account and sensitive data. Familiarize yourself with the necessary actions should your Google account become compromised.
iPhone and iPad users have the ability to review and remove any unfamiliar devices linked to their account. Maintaining a strong, unique password for your Apple ID – preferably managed by a password manager – is essential. Enabling two-factor authentication for your Apple account is also highly recommended.
Should you suspect physical access to your iPhone or iPad, promptly change your device passcode.
Resources for Assistance
- If you believe your phone has been compromised by spyware, the Coalition Against Stalkerware provides helpful resources.
- The National Domestic Violence Hotline (1-800-799-7233) offers 24/7 confidential support for victims of domestic abuse and violence.
- In emergency situations, always dial 911.
This article has been updated to include a statement from Apple.
Related Posts

Coupang CEO Resigns After Data Breach | South Korea

Petco Vetco Data Breach: Customer Information Exposed

FTC Upholds Ban on Stalkerware Founder Scott Zuckerman

Google Details Chrome Security for Agentic Features

Petco Data Breach: SSNs, Driver's Licenses Exposed
