Image: Christy McLoughlin
Hacking. Disinformation. Surveillance. CYBER is Motherboard's podcast and reporting on the dark underbelly of the internet.
Advertisement
Last week a tipster provided Motherboard with a link to a Tor onion service that hosted a selection of data taken from TheTruthSpy. A readme file included in the data dump included the specific URL that the images were available from on TheTruthSpy’s website. Motherboard verified that as of Wednesday, the images were still available for download. The released data also included a selection of apparent GPS locations of victims’ phones.Once installed on a victim’s phone, TheTruthSpy is able to intercept phone calls, siphon photos, read WhatsApp messages, track the phone’s GPS location, and much more. These photos are then uploaded to TheTruthSpy’s servers where the user of the stalkerware can log in via a dashboard and view the collected material.Do you know anything else about stalkerware or know of another stalkerware breach? We'd love to hear from you. Using a non-work phone or computer, you can contact Joseph Cox securely on Signal on +44 20 8133 5190, Wickr on josephcox, OTR chat on jfcox@jabber.ccc.de, or email joseph.cox@vice.com.
Advertisement