MODERATE SEVERITYSpyware

mSpy Data Breach

mSpy Mobile Stalkerware Platform Breach (2015): 700K User Accounts & Monitored Device Data Exposed

Commercial stalkerware platform used for monitoring device activity and communications.

Verified by ObscureIQ Intelligence

5.0Severity
700KRecords
1Fields
2015Year

ObscureIQ Breach Intelligence Scores
5.0
Breach Risk Index
40
Data Value
10
Market Recency
3987
days
Since Breach

Risk Interpretation

Extremely sensitive. Exposure can reveal both the monitored person and the purchaser, enabling stalking, extortion, domestic abuse escalation, and severe privacy harm.

🎯 Impact & Downstream Threats

The institutional impact on mSpy from the 2015 breach has been moderate, with the platform continuing to operate through the present despite a recurring pattern of breaches every several years. The case has been cited in cybersecurity coverage as an early canonical example of stalkerware operator non-disclosure and active denial in the face of confirmed breach evidence, with mSpy's response pattern subsequently becoming representative of the broader stalkerware industry response to security inci

Primary downstream threats:
  • Targeted phishing using exposed personal information
  • Credential reuse attacks across linked accounts

🔓 Threat Vectors

Behavioural pattern analysis

📋 Breach Intelligence

EntitymSpy
Organization • Global
Breach Date2015-05-01
HIBP Added2015-05-28
Records~700K (699,800 records)
Attack VectorUnknown
Threat ActorUnknown (failed extortion → Tor public dump; Krebs disclosed)
SourceHave I Been Pwned / ObscureIQ
SensitivityStalkerware
Breach ID923.0
StatusConfirmed

📝 Executive Summary

mSpy, a mobile surveillance and parental-control application operating from 2010 onward, suffered a data breach in May 2015 when unidentified attackers exfiltrated several hundred gigabytes of data from mSpy's systems and posted it to a Tor-based hidden service after mSpy reportedly refused to pay an extortion demand. The breach was first reported by security journalist Brian Krebs (KrebsOnSecurity) on May 14, 2015 after Krebs received an anonymous link pointing to the Tor-hosted data. The breach was indexed by Have I Been Pwned on May 28, 2015. mSpy initially denied the breach but the legitimacy of the leaked data was confirmed by Brian Krebs through direct contact with affected mSpy customers whose information appeared in the dataset.

The breach affected approximately 700,000 unique customer records based on records indexed by Have I Been Pwned, with hackers claiming the dataset included data on more than 400,000 users with payment details on approximately 145,000 successful transactions. Compromised data included Apple IDs and passwords, tracking data, payment information, photos, calendar data, corporate email threads, private conversations, and approximately four million logged surveillance events captured by the mSpy software. The dataset also included thousands of customer support request emails from people around the world who paid between approximately $8.33 and $799 for various mSpy subscription tiers. Critically, the leaked data included surveillance content captured from monitored target devices in addition to customer-account data, exposing both populations.

For surveillance targets and customers alike, the practical risk profile is exceptionally severe and varies between the two populations. For surveillance targets (the people whose devices were being monitored), the breach exposed live and historical device data including photos, communications, calendar entries, and personal conversations that may have been collected without their knowledge or consent. Many targets are likely domestic-violence victims and individuals whose partners, family members, or employers installed the software covertly. The U.S. National Domestic Violence Hotline (1-800-799-7233) and the Coalition Against Stalkerware provide resources for individuals who suspect they may have been monitored. For customers (the people who purchased mSpy to surveil others), the breach exposed their identification as someone who purchased and used surveillance software, with potential employment, relationship, and legal consequences depending on the jurisdiction and the consent status of the surveillance target. Affected customers who provided Apple ID credentials should immediately change those passwords, enable two-factor authentication on their Apple Account, and review and remove unrecognized devices from their account because the Apple ID exposure may extend beyond mSpy itself. Affected users who receive extortion attempts referencing the 2015 mSpy data should not pay ransom demands because payment does not stop further extortion.

🏢 About mSpy

mSpy is a mobile and computer monitoring application marketed for parental control and employee monitoring across Android, iOS, Windows, and macOS platforms. The application has been operating since approximately 2010 and is widely classified as stalkerware because of its persistent use for non-consensual surveillance of romantic partners, despite its parental-control marketing. At the time of the 2015 breach, mSpy was tied to MTechnology LTD, a now-defunct UK-registered firm whose founding members included self-described programmers Aleksey Fedorchuk (Russia) and Pavel Daletski (UK). The 2024 mSpy breach (a separate incident in this dataset) subsequently revealed that mSpy is currently owned by Brainstack, a Ukraine-based information-technology company. Capabilities include tracking GPS location, viewing web history, accessing photos, videos, emails, SMS, Skype, WhatsApp, and keystrokes. As a stalkerware platform, mSpy maintains both customer accounts and the surveillance content captured from monitored devices.

Spyware / Stalkerware | Covert device monitoring and surveillance | Stalkerware platform | Global
Globalmspy.com

🗂 Why They Hold Your Data

Stalkerware platforms collect customer identity, billing records, target-device identifiers, monitoring settings, and exfiltrated device activity tied to covert phone surveillance.

📰 Recent Developments

The 2015 mSpy breach was the first of three documented mSpy security incidents, followed by additional breaches in 2018 and 2024. mSpy initially denied the 2015 breach when contacted by reporters, with a customer service representative claiming that an attack was 'not actually possible' because of the company's security measures and suggesting that the report was a competitor smear campaign. Brian Krebs of KrebsOnSecurity verified the breach by independently contacting affected mSpy customers whose data appeared in the leaked dataset and confirming the legitimacy of the data with them directly. mSpy subsequently quietly remediated the incident without public acknowledgment of the breach. The 2018 and 2024 breaches indicate that mSpy's underlying security posture remained inadequate over the subsequent decade.

🔍 Data Points Exposed

1 verified field types:
Device usage tracking data

Canonical Fields

device_usage_data

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~700K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: mSpy Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of mSpy
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom