HIGH SEVERITYSpyware

pcTattletale Data Breach

pcTattletale Employee Monitoring Software Breach (2024): 139K Records Including SMS Messages from Monitored Devices Exposed :: Website Defaced

Employee and device monitoring software.

Verified by ObscureIQ Intelligence

6.5Severity
139KRecords
9Fields
2024Year

ObscureIQ Breach Intelligence Scores
13.2
Breach Risk Index
40
Data Value
25
Market Recency
702
days
Since Breach

Risk Interpretation

Exceptionally sensitive. Exposure can reveal intimate device activity, workplace surveillance records, and private user behavior, enabling extortion, insider targeting, blackmail, and operational compromise.

🎯 Impact & Downstream Threats

The institutional impact on pcTattletale was effectively terminal. The company ceased operations, its AWS infrastructure was locked by Amazon, and founder Bryan Fleming has pleaded guilty to federal charges with sentencing pending. The case has been formally cited by U.S. Federal Trade Commission and Department of Justice officials in subsequent stalkerware enforcement actions and is part of a broader U.S. enforcement push against domestic stalkerware operators. The breach affected not only pcTa

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

🔓 Threat Vectors

Device fingerprinting & targeted exploitation
Phishing, credential stuffing & account takeover
Name-based social engineering
Geolocation & account flagging
SIM swap confirmation & relationship exploitation
Credential stuffing & account takeover
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Cross-platform tracking & credential stuffing

📋 Breach Intelligence

EntitypcTattletale
OrganizationPrivate Company • USA
Breach Date2024-05-01
HIBP Added2024-05-25
Records~139K (138,800 records)
Attack VectorMisconfiguration
Threat ActorAnonymous hacker (researcher disclosure via Maia Arson Crimew + Eric Daigle)
Data SubjectsTarget
Breach PathwayDirect
SourceHave I Been Pwned / ObscureIQ
SensitivityStalkerware
Breach ID1040.0
StatusConfirmed

📝 Executive Summary

pcTattletale, a U.S.-based stalkerware and surveillance application, suffered a data breach on May 24-25, 2024 when a hacker exploited multiple vulnerabilities in the company's infrastructure to gain full access to the backend systems and Amazon Web Services credentials. The breach occurred after a separate security researcher had disclosed a vulnerability to pcTattletale that allowed any unauthenticated party to access the most recent screen capture from any device running the spyware, and pcTattletale had failed to remediate the issue. The hacker defaced pcTattletale's homepage with a writeup of the operation and links to tens of gigabytes of stolen data, and the AWS infrastructure was subsequently locked by Amazon. Founder Bryan Fleming attempted unsuccessfully to restore the website for over twenty hours, and his attempts were captured by his own software because his computer was running pcTattletale.

The breach affected approximately 138,751 customer accounts in the leaked dataset, alongside 17 terabytes of victim device screenshots representing more than 300 million captured screenshots from over 10,000 monitored devices, with some material dating back to 2018. The publicly leaked dataset itself did not contain the screenshots due to size constraints but did contain the customer-account database, the application's webroot files, and various Amazon S3 bucket contents. Compromised fields in the customer-account database included email addresses, names, IP addresses, device information, passwords, phone numbers, physical addresses, captured SMS messages from monitored devices, and usernames.

For surveillance targets and customers alike, the practical risk profile is exceptionally severe and varies between the two populations. For surveillance targets (the people whose devices were being secretly monitored), the breach exposed years of intimate device data including SMS messages, screenshots of private communications, and detailed location and activity logs that may have been collected without their knowledge or consent. Many targets are domestic-violence victims and individuals whose partners, family members, or employers installed the software covertly. The U.S. National Domestic Violence Hotline (1-800-799-7233) and the Coalition Against Stalkerware provide resources for individuals who suspect they may have been monitored. For customers (the people who installed the software), the breach exposed their identification as someone who purchased and used stalkerware to surveil another person, with potential employment, relationship, and legal consequences depending on the jurisdiction and the consent status of the surveillance target. Wyndham hotels and other organizations whose internal systems were compromised through pcTattletale deployment may have additional disclosure and remediation obligations to their customers and employees.

🏢 About pcTattletale

pcTattletale was a U.S.-based consumer-grade spyware and stalkerware product founded in approximately 2002 and operated by Bryan Fleming from Bruce Township, Michigan, registered as Parental Control Products, LLC. The application was marketed as 'employee and child monitoring' software but actively promoted to consumers as a tool to 'catch a cheater' and 'surreptitiously spy on spouses and partners.' Once installed on a target's Android or Windows device (typically with knowledge of the target's passcode or login), pcTattletale continuously captured screenshots and uploaded them to pcTattletale's Amazon S3 storage infrastructure, where the customer who installed the software could review them through an online portal. The software bragged about being '100% Undetectable.' pcTattletale has been classified as stalkerware by the Coalition Against Stalkerware and other industry coalitions because of its surveillance-of-adults marketing and design.

Platform | Employee monitoring and surveillance tools | Workforce monitoring software | USA
Private CompanyUSApctattletale.com

🗂 Why They Hold Your Data

Monitoring software platforms collect account data, device identifiers, keystrokes, screenshots, activity logs, and surveillance-linked records tied to workforce or endpoint monitoring.

📰 Recent Developments

pcTattletale ceased operations following the May 2024 breach. Founder Bryan Fleming told TechCrunch that the company was 'out of business and completely done,' and Amazon Web Services locked the entire pcTattletale AWS infrastructure. U.S. Homeland Security Investigations (HSI) had begun investigating Fleming in June 2021, and a U.S. judge authorized a search of Fleming's Michigan home in November 2022 (warrant unsealed in December 2025). Fleming pleaded guilty on January 6, 2026 in a San Diego federal court to computer hacking, conspiracy, and the unlawful advertising of surveillance software. Fleming faces up to 15 years in prison, with sentencing scheduled for April 3, 2026. Fleming's prosecution is one of the few successful U.S. prosecutions of a stalkerware operator and has been widely cited by privacy advocates including Eva Galperin of the Electronic Frontier Foundation as potentially shifting the risk calculus for stalkerware operators.

🔍 Data Points Exposed

9 verified field types:
Device information
Email
IP addresses
Names
Passwords
Phone numbers
Physical addresses
SMS messages
Usernames

Exposure Categories

LocationPHYS ADDR

Canonical Fields

device_information, email_address, full_name, ip_address, messages_and_chat:sms_message, password, phone_number, physical_address, username

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~139K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: pcTattletale Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of pcTattletale
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationSpywareEmailPhoneAddressPasswords

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom