MODERATE SEVERITYSpyware

Spyzie Data Breach

Spyzie Mobile Stalkerware Breach (2024): 519K Operator Email Addresses Exposed :: Part of Cocospy/Spyic Stalkerware Family

Mobile stalkerware platform enabling covert monitoring of target devices.

Verified by ObscureIQ Intelligence

5.0Severity
519KRecords
1Fields
2024Year

ObscureIQ Breach Intelligence Scores
15.0
Breach Risk Index
40
Data Value
25
Market Recency
424
days
Since Breach

Risk Interpretation

Extremely sensitive. Exposure can reveal victims, operators, and surveillance patterns, enabling coercion, stalking, and severe privacy harm.

🎯 Impact & Downstream Threats

The institutional impact on Spyzie and the FamiSoft Limited operator group was effectively terminal. The Spyzie application and the operator's broader stalkerware portfolio were taken offline, and the websites disappeared. The case has been widely cited in stalkerware-industry coverage as illustrating both the consistent pattern of operator silence following disclosure and the broader operator-portfolio approach used by stalkerware vendors to maintain multiple parallel brands sharing a single un

Primary downstream threats:
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Phishing, credential stuffing & account takeover

📋 Breach Intelligence

EntitySpyzie
Organization • Global
Breach Date2024-02-01
HIBP Added2025-02-27
Records~519K (518,600 records)
Attack VectorMisconfiguration
Threat Actorn/a (anonymous researcher disclosure via TechCrunch)
SourceHave I Been Pwned / ObscureIQ
SensitivityStalkerware
Breach ID1230.0
StatusConfirmed

📝 Executive Summary

Spyzie, a mobile stalkerware application sharing source code with sibling applications Cocospy and Spyic, suffered a data breach disclosed publicly on February 27, 2025 by TechCrunch following the previous week's disclosure of the underlying shared vulnerability across the three-platform sibling chain. The breach was enabled by a security vulnerability that allowed any party to access the email addresses of customers and the surveillance data captured on monitored devices, with the underlying flaw reported as so trivial to exploit that TechCrunch and the involved security researcher declined to publish the specific details. The researcher exploited the vulnerability to scrape Spyzie customer email addresses and provided the dataset to Have I Been Pwned, which indexed it on February 27, 2025.

The breach affected approximately 518,643 unique Spyzie customer email addresses based on records indexed by Have I Been Pwned. Compromised customer fields were limited to email addresses for purposes of HIBP indexing, but the underlying vulnerability also enabled unauthorized access to captured surveillance data including messages, photos, call logs, and real-time location data from monitored devices. The earliest Spyzie iPhone surveillance records dated back to early 2020. Combined with the sibling Cocospy and Spyic disclosures, the trio breach exposed approximately 3.2 million customer email addresses across all three platforms.

For surveillance targets and customers alike, the practical risk profile is exceptionally severe and varies between the two populations. For surveillance targets (the people whose devices were being monitored), the breach exposed live and historical device data captured by the spyware, with the U.S. National Domestic Violence Hotline (1-800-799-7233) and the Coalition Against Stalkerware providing resources for individuals who suspect they may have been monitored. Android users can detect Spyzie installations by entering ✱✱001✱✱ on the Android phone dialer and pressing call, which exploits a built-in backdoor feature to reveal the otherwise-hidden application; victims should establish a safety plan before removal because disabling the application may alert the person who installed it. For iPhone and iPad users, Spyzie worked by exploiting the victim's Apple Account credentials to access iCloud-stored device backups, and victims should ensure two-factor authentication on their Apple Account and review and remove unrecognized devices from their account. For customers, inclusion in the dataset confirms participation in a stalkerware operation that has now ceased operation, with potential employment, relationship, and legal consequences depending on the jurisdiction and the consent status of the surveillance target.

🏢 About Spyzie

Spyzie was a mobile stalkerware application targeting both Android and iPhone devices, marketed primarily as parental-monitoring software with the tagline '100% hidden and invisible so you never get caught.' Spyzie operated as one of three near-identical sibling stalkerware applications (alongside Cocospy and Spyic) that shared substantially the same source code under different brand names. Archived records of the Spyzie website indicated that the platform was operated by FamiSoft Limited, an entity that also produced an additional youth-targeted application called Teensafe and a portfolio of related stalkerware brands including Spyier, Neatspy, Fonemonitor, Spyine, and Minspy. Spyzie claimed more than 1 million users in over 190 countries before the breach. Capabilities included covert collection of browser history, WhatsApp messages (including deleted messages), Facebook messages, call logs, and real-time device data.

Spyware / Stalkerware | Covert device monitoring and surveillance | Mobile spyware platform | Global
Globalspyzie.com

🗂 Why They Hold Your Data

Spyware platforms collect customer records, target-device identifiers, monitoring settings, and exfiltrated activity data tied to covert mobile surveillance.

📰 Recent Developments

Spyzie was taken offline in approximately May 2025 along with sibling stalkerware applications Cocospy and Spyic following the February 2025 breach disclosure. The Spyzie website disappeared, the application stopped functioning, and the FamiSoft Limited operator group's other stalkerware brands (Teensafe, Spyier, Neatspy, Fonemonitor, Spyine, Minspy) were also taken down concurrently. The case was reported by TechCrunch in late February 2025 after the original Cocospy and Spyic disclosure had already been published the previous week, with the security researcher subsequently confirming that Spyzie shared the same easily-exploitable vulnerability. The breach was indexed by Have I Been Pwned on February 27, 2025. Spyzie operators did not respond to TechCrunch requests for comment and have not publicly acknowledged the breach or shutdown.

🔍 Data Points Exposed

1 verified field types:
Email addresses

Canonical Fields

email_address

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~519K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: Spyzie Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Spyzie
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationSpywareEmail

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom