Hacktivist scrapes over 500,000 stalkerware customers’ payment records

Published: (February 9, 2026 at 11:20 AM EST)
3 min read
Source: TechCrunch

Source: TechCrunch

A hacktivist has scraped more than half a million payment records from a provider of consumer‑grade “stalkerware” phone surveillance apps, exposing the email addresses and partial payment information of customers who paid to spy on others.

The transactions contain records of payments for phone‑tracking services like Geofinder and uMobix, as well as services like Peekviewer (formerly Glassagram), which purport to allow access to private Instagram accounts, among several other monitoring and tracking apps provided by the same vendor, a Ukrainian company called Struktura.

The customer data also includes transaction records from Xnspy, a known phone surveillance app, which in 2022 spilled the private data from tens of thousands of unsuspecting people’s Android devices and iPhones [source].

Context

This is the latest example of a surveillance vendor exposing the information of its customers due to security flaws. Over the past few years, dozens of stalkerware apps have been hacked, or have lost, spilled, or exposed people’s private data — often the victims themselves — thanks to shoddy cybersecurity by the stalkerware operators [reference].

Stalkerware apps like uMobix and Xnspy, once planted on someone’s phone, upload the victim’s private data (call records, text messages, photos, browsing history, precise location) and share it with the person who installed the app. These apps have explicitly marketed their services for spying on spouses and domestic partners, which is illegal [source].

Leak Details

  • Approximately 536,000 lines of customer email addresses.
  • For each record: the app or brand purchased, amount paid, payment card type (Visa, Mastercard, etc.), and the last four digits of the card.
  • Payment dates were not included.

TechCrunch verified the data’s authenticity by:

  1. Using disposable email addresses (e.g., Mailinator) found in the dataset to reset passwords via the apps’ password‑reset portals, confirming the accounts were real.
  2. Matching each transaction’s unique invoice number with the vendor’s checkout pages, which exposed the same customer and transaction data without requiring a password.

Hacktivist Claims

The hacktivist, who goes by the moniker “wikkid,” told TechCrunch they scraped the data from the stalkerware vendor thanks to a “trivial” bug in its website. They said they “have fun targeting apps that are used to spy on people,” and subsequently published the scraped data on a known hacking forum.

The forum listing identifies the surveillance vendor as Ersten Group, presented as a U.K.-based software development startup. However, TechCrunch found several email addresses in the dataset used for testing and customer support that reference Struktura, a Ukrainian company with an identical website to Ersten Group. The earliest record in the dataset contains the email address of Struktura’s chief executive, Viktoriia Zosim, for a $1 transaction.

Representatives for Ersten Group did not respond to requests for comment, and Struktura’s Zosim did not return a request for comment.

0 views
Back to Blog

Related posts

Read more »

과기정통부, “쿠팡 3000건 유출 주장은 신뢰도 떨어져” 정면 반박

배경훈 부총리 겸 과학기술정보통신부 장관은 2월 11일 국회 과학기술정보방송통신위원회 과기정통부 업무보고에서 쿠팡이 개인정보 유출 사고와 관련해 언급한 “약 3000건 유출” 주장에 대해 “신뢰도가 떨어진다”고 반박했다. 이는 전날2월 10일 정부·민관합동조사단이 발표한 “3367만 3...

쿠팡 3367만건 고객정보 유출 공식 확인

!https://cdn.byline.network/wp-content/uploads/2026/02/COOPANG1112.jpg 개요 쿠팡 전 직원이 무단으로 고객 개인정보 33,673,817건을 유출하고, 배송지 정보 약 1억 4,800만 회를 조회한 사실이 정부 조사를 통해 확인되었습...