Stalkerware Leak Reveals 86,859 Private Screenshots Including Celebrity Chats
An unsecured server exposed 86,859 screenshots from a stalkerware‑infected device, revealing private chats of a European celebrity and many influencers.

*TL;DR: An unsecured database containing 86,859 screenshots captured by stalkerware was found online, exposing private chats from Facebook, WhatsApp, Instagram and TikTok, including conversations of a high‑profile European celebrity.*
Context Cybersecurity researcher Jeremiah Fowler discovered the leak while scanning for exposed data stores. The database, likely hosted on a misconfigured cloud bucket, held images of screen captures taken from a single compromised mobile device. Stalkerware—spyware installed covertly on a target’s phone—collects messages, photos, contacts and even video‑call recordings, then uploads them to a remote server.
Key Facts - The exposed collection totals 86,859 image screenshots. - Screenshots contain chats from Facebook, WhatsApp, Instagram and TikTok, plus personal photos, video‑call frames, contact lists and business documents. - Fowler identified the primary victim as a prominent European celebrity, entrepreneur and media personality. The images show conversations with influencers who have millions of followers, as well as with friends, family and business associates. - The data dump includes phone numbers, email addresses and other identifiers, creating a rich profile of the victim’s network. - The breach originated from a single infected device; however, the centralized storage of the harvested data amplified the impact, exposing thousands of secondary contacts.
What It Means Stalkerware’s ability to aggregate data on a remote server makes misconfiguration a critical risk. When such servers are left open, attackers can harvest entire communication ecosystems from a single compromised phone. The leaked screenshots provide attackers with authentic conversation threads, enabling highly convincing social‑engineering attacks, credential stuffing or targeted phishing against the victim’s contacts.
For organizations, the incident underscores the need for strict access controls on any storage used for mobile‑device telemetry. Security teams should audit cloud buckets for public read permissions and enforce encryption at rest. Endpoint protection must include anti‑spyware modules capable of detecting known stalkerware signatures, such as those cataloged under MITRE ATT&CK technique T1059.001 (Command‑line Interface) and T1114 (Email Collection).
Mitigations - Audit all cloud storage for public exposure; lock down permissions to least‑privilege access. - Deploy mobile‑device management (MDM) solutions that enforce app whitelisting and block installation from unknown sources. - Update operating systems and apps promptly; many stalkerware variants exploit outdated libraries. - Enable endpoint detection and response (EDR) tools that flag abnormal data exfiltration patterns, such as large batches of screenshots being uploaded. - Educate users to recognize signs of spyware, including unexpected battery drain or data spikes, and to report suspicious behavior immediately.
Looking Ahead Watch for increased scrutiny of cloud‑storage configurations and potential regulatory actions targeting stalkerware distributors as privacy advocates push for stricter controls.
Continue reading
More in this thread
Law Firm Investigates Hematology Oncology Consultants After RHYSIDA Ransomware Exposes Patient Data
Peter Olaleru
Law Firm Probes Hematology Oncology Consultants After RHYSIDA Ransomware Leak
Peter Olaleru
ShinyHunters Allegedly Steals 275 Million Records from Instructure's Canvas Platform
Peter Olaleru
Conversation
Reader notes
Loading comments...