HIGH SEVERITYSpyware

Cocospy Data Breach

Cocospy Mobile Stalkerware Breach (2025): 1.8 Million Operator Email Addresses Exposed :: Monitored Messages & Photos Also Accessible

Mobile device monitoring stalkerware application.

Verified by ObscureIQ Intelligence

6.0Severity
1.8MRecords
1Fields
2025Year

ObscureIQ Breach Intelligence Scores
11.2
Breach Risk Index
40
Data Value
25
Market Recency
431
days
Since Breach

Risk Interpretation

Extremely sensitive. Exposure can reveal abuse relationships, target identities, and monitoring behavior, enabling stalking, coercion, and severe privacy violations.

🎯 Impact & Downstream Threats

The institutional impact on Cocospy and its sibling operations was effectively terminal. All three applications ceased operation, their websites disappeared, and their AWS storage infrastructure was deleted. The case has been widely cited in stalkerware-industry coverage as illustrating the consistent pattern of consumer-grade spyware operators shutting down following breach disclosure rather than investing in security improvements. The reputational impact concentrated within the broader stalker

Primary downstream threats:
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Phishing, credential stuffing & account takeover

📋 Breach Intelligence

EntityCocospy
Organization • Global
Breach Date2025-02-01
HIBP Added2025-02-20
Records~1.8M (1,800,000 records)
Attack VectorMisconfiguration
Threat Actorn/a (anonymous researcher disclosure via TechCrunch)
Data SubjectsTarget
Breach PathwayDirect
SourceHave I Been Pwned / ObscureIQ
SensitivityStalkerware
Breach ID307.0
StatusConfirmed

📝 Executive Summary

Cocospy, a mobile stalkerware application sharing source code with sibling applications Spyic and Spyzie, suffered a data breach disclosed publicly on February 20, 2025 by TechCrunch. The breach was enabled by a security vulnerability shared across all three sibling applications that allowed any party to access the personal data exfiltrated from any device with the applications installed and to retrieve the email addresses of customers who had signed up to plant the spyware. The vulnerability was so trivial to exploit that TechCrunch and the involved security researcher declined to publish details to prevent further exploitation. The researcher used the vulnerability to scrape email addresses from all three applications and provided the dataset to Have I Been Pwned. Cocospy specifically was indexed on February 20, 2025.

The breach affected approximately 1.81 million unique Cocospy customer email addresses based on records indexed by Have I Been Pwned, alongside approximately 880,167 Spyic customer emails (with a deduplicated combined Cocospy and Spyic count of 2.65 million unique addresses) and approximately 518,643 Spyzie customer emails (for a combined trio total of approximately 3.2 million customer emails). Compromised customer fields were limited to email addresses for purposes of HIBP indexing, but the underlying vulnerability also enabled unauthorized access to captured surveillance data including messages, photos, call logs, and real-time location data from monitored devices. Earliest Spyzie iPhone surveillance records dated back to early 2020.

For surveillance targets and customers alike, the practical risk profile is exceptionally severe and varies between the two populations. For surveillance targets (the people whose devices were being monitored), the breach exposed live and historical device data captured by the spyware, with the U.S. National Domestic Violence Hotline (1-800-799-7233) and the Coalition Against Stalkerware providing resources for individuals who suspect they may have been monitored. Android users can detect Cocospy, Spyic, and Spyzie installations by entering ✱✱001✱✱ on the Android phone dialer and pressing call, which exploits a built-in backdoor feature to reveal the otherwise-hidden application (which appears as a generic-looking 'System Service' app); victims should establish a safety plan before removal because disabling the application may alert the person who installed it. For iPhone and iPad users, the spyware works by exploiting the victim's Apple Account credentials to access iCloud-stored data, and victims should ensure two-factor authentication on their Apple Account and review and remove unrecognized devices from their account. For customers, inclusion in the dataset confirms participation in a stalkerware operation that has now ceased operation, with potential employment, relationship, and legal consequences depending on the jurisdiction and the consent status of the surveillance target.

🏢 About Cocospy

Cocospy was a mobile stalkerware application marketed as parental control and employee-monitoring software for Android and iPhone devices. Cocospy operated as one of three near-identical sibling stalkerware applications (alongside Spyic and Spyzie) that shared substantially the same source code under different brand names. Security researchers Vangelis Stykas and Felipe Solferini linked the operation of Cocospy and Spyic to 711.icu, a China-based mobile app developer whose website is no longer accessible. Cocospy launched in approximately 2018, with sibling Spyic launching in 2019 and sibling Spyzie operating for an unknown earlier period. Capabilities included covert access to messages, photos, call logs, and real-time location data on monitored devices. As a stalkerware platform, Cocospy maintained customer accounts and exfiltrated device data captured from the monitored phones.

Spyware / Stalkerware | Covert device monitoring and surveillance | Mobile spyware platform | Global
Globalcocospy.com

🗂 Why They Hold Your Data

Mobile spyware platforms collect customer records, target-device identifiers, monitoring settings, and exfiltrated activity data tied to covert surveillance of phones.

📰 Recent Developments

Cocospy and its sibling stalkerware applications Spyic and Spyzie were taken offline in approximately May 2025 following the February 2025 disclosure of the shared security vulnerability. The Cocospy, Spyic, and Spyzie websites disappeared, the applications stopped functioning, and the operators' Amazon Web Services cloud storage was deleted. TechCrunch reported that the shutdown likely reflects an attempt to escape legal and reputational fallout rather than a genuine remediation. Operators of the three applications did not respond to TechCrunch requests for comment and have not publicly acknowledged the breach or the shutdown. The case has been counted by TechCrunch as among the 25 known stalkerware operations that have been hacked or otherwise exposed sensitive data since 2017, with at least 10 of those operations including Cocospy shutting down in the wake of breach disclosure.

🔍 Data Points Exposed

1 verified field types:
Email addresses

Canonical Fields

email_address

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~1.8M records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: Cocospy Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Cocospy
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationSpywareEmail

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom