HIGH SEVERITYSpyware

SpyX Data Breach

SpyX Mobile Stalkerware Breach (2024): 2 Million Operator Accounts Exposed :: iCloud Credentials of Monitoring Targets Also Found

Mobile spyware platform used to monitor devices and extract user data.

Verified by ObscureIQ Intelligence

7.5Severity
2.0MRecords
5Fields
2024Year

ObscureIQ Breach Intelligence Scores
14.0
Breach Risk Index
40
Data Value
25
Market Recency
404
days
Since Breach

Risk Interpretation

Extremely sensitive. Exposure can reveal who was monitored and by whom, enabling domestic abuse escalation, stalking, and major privacy and safety harms.

🎯 Impact & Downstream Threats

The institutional impact on SpyX has been moderate given the operator's silence and apparent continued operation. The case has been widely cited as the 25th known consumer-grade mobile surveillance breach since 2017 and as a particularly significant case because of the iCloud credential exposure for monitored Apple device targets. The exposure of iCloud credentials creates an unusual cross-platform risk because the credentials retain value beyond the SpyX surveillance use, potentially supporting

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

🔓 Threat Vectors

Device fingerprinting & targeted exploitation
Phishing, credential stuffing & account takeover
Pattern-of-life analysis & physical surveillance
Geolocation & account flagging
Credential stuffing & account takeover

📋 Breach Intelligence

EntitySpyX
Organization • Global
Breach Date2024-06-01
HIBP Added2025-03-19
Records~2.0M (2,000,000 records)
Attack VectorMisconfiguration
Threat ActorUnknown (Troy Hunt received data; Apple/Google notified)
Data SubjectsTarget
Breach PathwayDirect
SourceHave I Been Pwned / ObscureIQ
SensitivityStalkerware
Breach ID1229.0
StatusConfirmed

📝 Executive Summary

SpyX, a mobile stalkerware application also operating under the clone brands MSafely and SpyPhone, suffered a data breach in June 2024 that was not publicly disclosed by the operator and was first reported by TechCrunch on March 19, 2025 after security researcher Troy Hunt received a copy of the breached data and shared the details with TechCrunch. SpyX's operators did not respond to TechCrunch's requests for comment, and the WhatsApp number listed for SpyX support was inactive. The breach was indexed by Have I Been Pwned on March 19, 2025.

The breach affected approximately 1.97 million unique customer account records based on records indexed by Have I Been Pwned, with the vast majority of the email addresses associated with the SpyX brand and approximately 300,000 records associated with the MSafely and SpyPhone clone applications. Compromised customer fields included email addresses, IP addresses, geographic location data (country of residence), device information, and 6-digit PINs stored in the password field. Critically, one of the two leaked text files referenced iCloud in its filename and contained approximately 17,000 distinct sets of plaintext Apple Account usernames and passwords belonging to monitoring targets (the people whose Apple devices were being surveilled through SpyX). Troy Hunt provided the iCloud credential list to Apple before public disclosure, and Apple subsequently confirmed that fewer than 250 iCloud users were still affected by valid credentials at the time of Apple's intervention.

For surveillance targets and customers alike, the practical risk profile is exceptionally severe. For surveillance targets whose Apple devices were being monitored through SpyX, the iCloud credential exposure creates ongoing account takeover risk that extends beyond SpyX itself, because the iCloud credentials may grant access to the target's email, messages, photos, contacts, calendar, and other Apple ecosystem data even if SpyX itself is removed. Affected Apple users should immediately change their Apple Account password, enable two-factor authentication if not already enabled, review and remove unrecognized devices from their Apple Account, and check for unauthorized device backups. The U.S. National Domestic Violence Hotline (1-800-799-7233) and the Coalition Against Stalkerware provide resources for individuals who suspect they may have been monitored. For customers (the people who purchased SpyX to surveil others), the breach exposed their identification as someone who purchased and used surveillance software, with potential employment, relationship, and legal consequences depending on the jurisdiction and the consent status of the surveillance target. The 6-digit PIN format of the customer passwords means brute-force recovery is essentially trivial for any account where the customer reused the same PIN on other services.

🏢 About SpyX

SpyX is a mobile stalkerware application marketed as parental and device-monitoring software for Android and Apple devices, distributed under the spyx.com domain along with two near-identical clone applications branded as MSafely and SpyPhone. The application advertises real-time recording, video and audio capture, and screenshots of the target device, with the platform marketing itself as 'the best phone monitoring App.' For Android targets, SpyX requires physical access to the device to install the application and modify security settings. For Apple targets, SpyX exploits iCloud backups by acquiring the victim's Apple Account credentials, which allows the spyware operator to continuously download the victim's iCloud-stored device data including messages, photos, and app data without requiring physical access to the iPhone or iPad. As a stalkerware platform, SpyX maintains both customer accounts and target-device data including iCloud credentials used to access monitored Apple devices.

Spyware / Stalkerware | Covert device monitoring and surveillance | Mobile spyware platform | Global
Globalspyx.com

🗂 Why They Hold Your Data

Covert monitoring platforms collect customer records, target-device identifiers, surveillance settings, and exfiltrated device activity tied to hidden mobile monitoring.

📰 Recent Developments

SpyX did not publicly acknowledge the June 2024 breach for approximately nine months, with neither customers nor surveillance targets receiving any notification before TechCrunch's March 2025 public reporting. SpyX operators did not respond to TechCrunch's requests for comment, and the WhatsApp number listed by SpyX for support was found to be inactive. Apple responded to the disclosure by securing the iCloud accounts of fewer than 250 users whose plaintext credentials remained valid at the time of disclosure, with Apple spokesperson Sarah O'Rourke confirming the action. Google pulled down a Chrome extension associated with the SpyX campaign following the disclosure. Approximately 40 percent of the email addresses in the SpyX dataset were already present in Have I Been Pwned's existing index, indicating substantial overlap with the customer bases of other previously breached stalkerware operations.

🔍 Data Points Exposed

5 verified field types:
Device information
Email
Geographic locations
IP addresses
Passwords

Exposure Categories

LocationGEO LOCS

Canonical Fields

device_information, email_address, geographic_locations, ip_address, password

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~2.0M records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: SpyX Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of SpyX
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationSpywareEmailPasswords

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom