The idea behind the software is simple. When the spying party installs the stalkerware, they grant permission to record what happens on the targeted Android or Windows device. The observer can then log in on an online portal and activate recording, at which point a screen capture is taken on the target's device. What goes around comes around, you might say. As you may have read many times before on our blog, some spyware companies have a surprisingly low standard of security . In 2021, we reported that “employee and child-monitoring” software vendor pcTattleTale hadn’t been very careful about securing the screenshots it sneakily took from its victims’ phones. A security researcher found an issue while using a trial version of pcTattleTale, noticing that the company uploaded the screenshots to an unsecured online database (meaning anyone could view the screenshots as they weren't protected by any form of authentication—such as a user name and password). Last week another security researcher, Eric Daigle, found the company appears to have learned nothing from its previous security issue. Daigle found that pcTattleTale's Application Programming Interface (API) allows any attacker to access the most recent screen capture recorded from any device on which the spyware is installed. Despite repeated warnings from Daigle and others, no improvements were made. Then, yet another researcher found yet another bug in pcTattletale which allowed them to gain full access to the backend…Read More
pcTattleTale spyware leaks database containing victim screenshots, gets website defaced

