MODERATE SEVERITYSpyware

Catwatchful Data Breach

Catwatchful Android Stalkerware Breach (2025): 62K Operator Accounts Including Plaintext Passwords Exposed via SQL Injection

Android stalkerware platform used for covert device monitoring and surveillance.

Verified by ObscureIQ Intelligence

5.0Severity
62KRecords
2Fields
2025Year

ObscureIQ Breach Intelligence Scores
24.0
Breach Risk Index
40
Data Value
40
Market Recency
298
days
Since Breach

Risk Interpretation

Extremely sensitive. Exposure can reveal both operators and victims of covert monitoring, enabling extortion, stalking, domestic abuse escalation, and severe privacy harm.

🎯 Impact & Downstream Threats

The institutional impact on Catwatchful has been significant given the public identification of its administrator, hosting termination, and Google Play Protect detection. The case has been formally cited by TechCrunch as the fifth major stalkerware compromise of 2025, alongside the Cocospy/Spyic/Spyzie sibling chain and SpyX. The administrator's identification is particularly consequential because Catwatchful's continued operation in violation of consent and surveillance laws across multiple jur

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Credential stuffing & account takeover

📋 Breach Intelligence

EntityCatwatchful
Organization • Global
Breach Date2025-06-01
HIBP Added2025-07-03
Records~62K (61,600 records)
Attack VectorMisconfiguration
Threat Actorn/a (researcher disclosure – Eric Daigle via SQL injection)
SourceHave I Been Pwned / ObscureIQ
SensitivityStalkerware
Breach ID262.0
StatusConfirmed

📝 Executive Summary

Catwatchful, an Android stalkerware application administered by Uruguay-based developer Omar Soca Charcov, suffered a data breach that was disclosed publicly on July 2-3, 2025 by Canadian security researcher Eric Daigle. The breach was enabled by a SQL injection vulnerability in an unauthenticated PHP API endpoint (servicios.php) on the catwatchful.pink backend domain that handled communication between the planted Android applications and the Catwatchful command servers. Daigle exploited the vulnerability using the standard SQL injection automation tool sqlmap and confirmed that a non-blind UNION-based injection technique could be used to extract the entire customer database. The breach was subsequently provided to Have I Been Pwned, which indexed it on July 3, 2025, and reported by TechCrunch on July 2, 2025.

The breach affected approximately 62,050 customer accounts and approximately 26,000 victims whose phone data was being captured by Catwatchful at the time of the breach, with some surveillance data dating back to 2018. Compromised fields for the customer population included email addresses and passwords stored in plaintext. The plaintext password storage represents a critical security failure that exposes the original credential values directly. The exposed customer data also revealed Catwatchful's administrator identity (Omar Soca Charcov, who appeared as the first entry in the database, consistent with the developer testing the application against personal devices). Affected victim devices were concentrated in Latin America (Mexico, Colombia, Peru, Argentina, Ecuador, and Bolivia) and India. Captured victim data including photos and audio recordings was hosted on Google Firebase infrastructure and was accessible to anyone holding a customer account credential.

For surveillance targets and customers alike, the practical risk profile is exceptionally severe and varies between the two populations. For surveillance targets (the people whose devices were being secretly monitored), the breach exposed live and historical device data including photos, messages, call logs, real-time location, and ambient microphone audio that may have been collected without their knowledge or consent. Many targets are likely domestic-violence victims and individuals whose partners, family members, or employers installed the software covertly. The U.S. National Domestic Violence Hotline (1-800-799-7233) and the Coalition Against Stalkerware provide resources for individuals who suspect they may have been monitored. Android users can detect Catwatchful by entering 543210 on the Android phone dialer and pressing call, which exploits a built-in backdoor feature to reveal the otherwise-hidden application; victims should establish a safety plan before removal because disabling the application may alert the person who installed it. For customers (the people who installed the spyware), the breach exposed their identification as someone who purchased and used surveillance software, with potential employment, relationship, and legal consequences depending on the jurisdiction and the consent status of the surveillance target. Customers should change all reused passwords on other accounts because the plaintext password exposure means any account where the same password was reused is fully compromised.

🏢 About Catwatchful

Catwatchful was an Android-based stalkerware application marketed as undetectable parental and child-monitoring software, but designed to facilitate covert surveillance of any Android device. Operated under the catwatchful.com brand and the catwatchful.pink backend domain, Catwatchful was administered by Omar Soca Charcov, a Uruguay-based developer whose identity was revealed through the breach itself. The application was distributed outside official app stores (because stalkerware is prohibited by Google Play and Apple App Store policies) and required physical installation on a target Android device, after which it operated invisibly to upload screenshots, photographs, text messages, call logs, real-time location, and ambient microphone audio to a dashboard accessible by the customer who installed the application. As a stalkerware platform, Catwatchful maintained two distinct populations of data: customer accounts (the people who installed the spyware on someone else's device) and exfiltrated device data (the surveillance content captured from the monitored devices).

Spyware / Stalkerware | Covert device monitoring and surveillance | Android stalkerware platform | Global
Global* defunct catwatchful.com

🗂 Why They Hold Your Data

Stalkerware platforms collect customer records, target-device identifiers, monitoring configurations, and exfiltrated device data tied to covert surveillance workflows.

📰 Recent Developments

Catwatchful's hosting was terminated by Hosting.com on June 25, 2025 after TechCrunch security editor Zack Whittaker contacted the host with details of the breach. The service was briefly restored under the alternate domain xng.vju.temporary.site before migrating to HostGator infrastructure, and the operator subsequently added a web application firewall to mitigate further SQL injection attempts. Google added Catwatchful detection to its Google Play Protect service following the disclosure, alerting Android users who attempt to install the application. The Coalition Against Stalkerware and Malwarebytes have been actively involved in publishing user guidance for affected victims and in advocacy commentary about the case. Despite hosting changes and Play Protect detection, the platform continued to operate at the time of the original July 2025 reporting, with victim data still hosted on Google Firebase infrastructure.

🔍 Data Points Exposed

2 verified field types:
Email
Passwords

Canonical Fields

email_address, password

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~62K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: Catwatchful Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Catwatchful
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationSpywareEmailPasswords

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom