FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

Hacktivist Exposes 500,000 Stalkerware Payments

Gregory Zuckerman
Last updated: February 9, 2026 5:17 pm
By Gregory Zuckerman
Technology
7 Min Read
SHARE

A self-described hacktivist has scraped more than 500,000 payment records tied to consumer-grade stalkerware and phone-tracking services, exposing buyers’ email addresses and partial payment details associated with apps marketed for covert surveillance. The cache links hundreds of thousands of transactions to a cluster of monitoring tools, highlighting poor security practices in an industry that thrives on secrecy.

What the Leaked Payment Records Actually Exposed

The dataset contains checkout records for phone and account monitoring products including uMobix, Geofinder, and Peekviewer (formerly Glassagram), along with entries for Xnspy, a known surveillance app previously tied to a significant data leak. The exposed fields include customer email addresses, transaction identifiers, amounts, and partial payment information drawn from the vendors’ purchase systems.

Table of Contents
  • What the Leaked Payment Records Actually Exposed
  • How the Checkout Data Was Scraped at Massive Scale
  • A Tangled Web of Surveillance Brands and Entities
  • A Pattern of Security Failures Across Stalkerware
  • Legal and Safety Implications for Buyers and Victims
  • Why the Payment Trail Matters for Enforcement Actions
  • What Platforms and Users Can Do Now to Reduce Harm
  • The Bottom Line on This Large Stalkerware Payment Leak
A woman looking thoughtful and a boy smiling while looking at a phone, with the text Learn more about uMobix and a play button in the center.

While the leak does not appear to include full card numbers, security experts warn that even truncated payment details and emails can enable targeted extortion, doxxing, and identity fraud. It also creates a paper trail for law enforcement and civil litigants by linking individual buyers to services often advertised for illegal spying on partners and family members.

How the Checkout Data Was Scraped at Massive Scale

The records were obtained through insecure checkout infrastructure that exposed customer and invoice data without robust authentication. In effect, sequential or guessable identifiers and unauthenticated endpoints allowed an attacker to enumerate transactions and pull related details at scale.

This is a textbook breakdown of basic web security controls: lack of access gating, predictable object references, and insufficient rate limiting. Payment platforms subject to PCI DSS are expected to enforce strict authorization, minimize data retention, and segregate sensitive systems—requirements that appear to have been brushed aside.

A Tangled Web of Surveillance Brands and Entities

The transactions point to a sprawling vendor network tied to a Ukrainian software company known as Struktura and a U.K.-presenting entity called Ersten Group. The brands in this ecosystem sell overlapping capabilities: GPS tracking, access to messages and photos, social media viewing, and activity logs that can be pulled from a target’s phone once the spyware is installed.

Industry researchers have long noted that stalkerware businesses operate through a patchwork of company names and white-label apps. Rebranding and jurisdiction hopping are common, making it harder for app stores, regulators, and payment processors to keep pace with enforcement.

A Pattern of Security Failures Across Stalkerware

Stalkerware vendors have a track record of mishandling sensitive data from both targets and purchasers. In 2022, Xnspy leaked private data harvested from tens of thousands of Android and iOS devices. Earlier incidents hit mSpy and Retina-X, and the U.S. Federal Trade Commission in 2021 banned the makers of SpyFone from the surveillance business for egregious security lapses and illegal tracking.

Telemetry from the Kaspersky State of Stalkerware report indicates tens of thousands of unique mobile users are flagged annually with stalkerware installations worldwide, underscoring a persistent threat that blends intimate partner abuse with commercial spyware. The Coalition Against Stalkerware, which includes advocacy groups and security firms, continues to document widespread harms from these tools.

Hacktivist exposes 500,000 stalkerware payments in data breach; leaked records and code

Legal and Safety Implications for Buyers and Victims

Using stalkerware to monitor spouses, partners, or anyone without consent is illegal in many jurisdictions and can carry criminal and civil penalties. The newly exposed payment records heighten buyers’ legal risk by tying emails and invoices to specific surveillance services—and may also identify resellers or affiliates who profit from distribution.

For survivors of abuse, the incident is a double-edged sword. While exposure of buyer identities may aid investigations, the underlying business model depends on quietly harvesting victims’ messages, locations, and photos. Privacy regulators in Europe and elsewhere could scrutinize whether these companies processed personal data lawfully under frameworks such as GDPR, and whether they breached security and accountability obligations.

Why the Payment Trail Matters for Enforcement Actions

Financial records are often the most durable form of evidence. Even if apps rebrand or domains vanish, invoices, processor logs, and customer support tickets can persist in third-party systems. That makes payment data a powerful lever for regulators, banks, and card networks to sever services and for investigators to map relationships between entities that present as separate but operate in concert.

Card networks have previously cut off high-risk merchants, and payment providers can require remediation or offboarding when PCI DSS violations surface. If the scraped dataset is validated at scale, pressure will likely mount on processors and hosting providers that enable these operations.

What Platforms and Users Can Do Now to Reduce Harm

App stores and certificate authorities can intensify reviews of surveillance-linked binaries and revoke trust for stealth monitoring apps. Payment processors should audit merchants tied to stalkerware keywords, enforce stronger merchant due diligence, and mandate third-party security assessments before onboarding.

For potential victims, safety groups recommend checking device settings for unknown device administrators, suspicious accessibility services, and profiles that grant remote control; keeping operating systems updated; and seeking support from organizations in the Coalition Against Stalkerware. Survivors should prioritize personal safety planning and consult advocates before attempting device cleanups that might escalate abuse.

The Bottom Line on This Large Stalkerware Payment Leak

This scrape is not just another leak—it is a rare look at the financial backbone of a shadowy industry that preys on intimate access and weak security. By exposing who pays for these tools, the breach raises the cost of doing business for stalkerware vendors and could accelerate regulatory, financial, and criminal consequences across their networks.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
YouTube TV Users Score Hidden $80 Discount
Apple Readies 12th Gen iPad With Apple Intelligence
Amazon Offers Gift Card Deals On Uber And DoorDash
YouTube TV Rolls Out New Genre-Based Subscription Plans
Samsung Confirms Next Galaxy Unpacked Date
YouTube TV Unveils Cheaper Bundles With $65 Sports Plan
Discord Launches Global Age Verification Next Month
The Hidden Risks of Deploying AI Chatbots Without Real-World Testing
Five Free Linux Servers Challenge Public Cloud
Galaxy S26 Ultra Leaks Raise Concerns And Upgrade Hopes
Uber to acquire Getir’s restaurant delivery business
Online Learning in 2026: The Courses Worth Paying For and the Email Funnels Behind the Best Platforms
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.