Security

Research

Stalkerware slinger LetMeSpy shuts down for good after database robbery

If you can't trust a spyware developer with your info, who can you trust?


Stalkerware slinger LetMeSpy will shut down for good this month after a miscreant breached its servers and stole a heap of data in June.

In a notice on its homepage, the Polish Android developer "would like kindly inform you that as of August 31, 2023, the letmespy.com website will cease operations."

According to the surveillance-ware maker, its security was comprehensively smashed on June 21 by persons unknown, who downloaded the entire contents of its website database before deleting that information. After that "data security incident," the developer said it had blocked access to user accounts, "for security reasons."

You may not feel that much sympathy for the users of this software – the people who download and install LetMeSpy on the phones of partners, children, or coworkers – in that their details were swiped by the intruder. Unfortunately that website database included records on those being snooped on, too, such as their messages, whereabouts, and call logs.

The app was marketed as being for completely legit purposes, such as child or employee monitoring, or for forgetful folks who want to easily locate their misplaced devices. Yes, those are real examples still listed on the developer's website as to why people should use LetMeSpy.

In reality, the app could be installed on an Android device, and depending on the OS version, hidden from view. It would then copy that device's text messages, call logs, location, and other info to the LetMeSpy website, allowing the user of the software to keep close tabs on that device. That would make it perfect for stalkers and abusive bosses and partners.

Then someone pwned LetMeSpy, grabbed all that data, and passed it around, shedding lots of light on the software and its maker.

According to security researcher Maia Arson Crimew, who received a copy of the stolen files and performed a quick scan of the email address domains of its users, government workers, two Malaysian and one Jordanian, had signed up for the service, plus a Louisiana police officer, as well as an employee from a competing stalkerware company, and a ton of US college students.

"If you wish to access the data available within your user account, please contact us individually regarding this matter by September 30, 2023, at: ibd[at]radeal[dot]pl," the LetMeSpy notice stated. "After the expiration of retention period under the applicable law, the data stored in user accounts will be deleted."

To that we say: good riddance.

The shutdown comes as America, which itself has a very complicated relationship with surveillance-ware, added commercial spyware makers Intellexa and Cytrox to its Entity List, citing national security concerns. ®

Send us news
4 Comments

Dump C++ and in Rust you should trust, Five Eyes agencies urge

Memory safety vulnerabilities need to be crushed with better code

Five Eyes nations warn Moscow's mates at the Star Blizzard gang have new phishing targets

The Russians are coming! Err, they've already infiltrated UK, US inboxes

Polish train maker denies claims its software bricked rolling stock maintained by competitor

Says it was probably hacked, which isn't good news either

Weak session keys let snoops take a byte out of your Bluetooth traffic

BLUFFS spying flaw present in iPhones, ThinkPad, plenty of chipsets

Uncle Sam probes cyberattack on Pennsylvania water system by suspected Iranian crew

CISA calls for stronger IT defenses as Texas district also hit by ransomware crew

Fancy Bear goes phishing in US, European high-value networks

GRU-linked crew going after our code warns Microsoft - Outlook not good

Hershey phishes! Crooks snarf chocolate lovers' creds

Stealing Kit Kat maker's data?! Give me a break

Scores of US credit unions offline after ransomware infects backend cloud outfit

Supply chain attacks: The gift that keeps on giving

Atlassian security advisory reveals four fresh critical flaws – in mail with dead links

Bitbucket, Confluence and Jira all in danger, again. Sigh

Belgian man charged with smuggling sanctioned military tech to Russia and China

Indictments allege plot to shift FPGAs, accelerometers, and spycams

Boffins devise 'universal backdoor' for image models to cause AI hallucinations

Data poisoning appears open to all

Amazon on the hook for predictably revolting use of concealed clothes hook spy cam

Judge finds plaintiff's claim – that Amazon knew about illicit usage – credible enough for case to proceed