Kate Watchfelt is an app that claims to be a “child monitoring app” but in fact, a spyware app that works on the phone to send an affected person’s data back to the dashboard that has downloaded it.
It is also known as ‘Stalcker Ware’, the app suffered a data violation through a security error that exposed both the email addresses and passwords of thousands of users – and the phone data of thousands of victims.
Security researcher Eric Diegel reported in a blog post that a danger shows that more than 62,000 users and 26,000 victims have revealed a full database of spyware app’s email addresses and simple text passwords for phone data.
You can like
In addition, as Tech Crunch reported, the Kate Watchfield operator’s administrator was also exposed in violation. The compromised devices were between Mexico, Colombia, India, Peru and other people in Argentina (according to the victim).
The Kate Watchfelt app uploads the contents of the affected person’s phone on the dashboard, which is worth viewing by the person who has secretly installed the app, which includes a quantity of photos, messages, front and rear cameras, access to microphone and real -time location data.
This offers a protective risk for the victims. Stockware and spyware apps are non -agreed monitoring apps that are often used against domestic and romantic partners in ways that violate the rules, which is why such apps are banned and they need to download any physiological access directly to the phone.
Kate Watch is not the first spyware app to violate data. According to the Tech Crunch, this year is at least fifth – there is a clear indication that the offer of consumer grade spyware is spreading widespread, though what they are offering is “poor coding and security failure, which expose data violations to both paying users and non -contributors.”
According to Diegel, Kate Watchfelt API was unauthorized, which allowed anyone on the open internet to communicate with the user’s database without login. The entire database of email addresses and passwords was exposed. When the API was briefly down, it was returned again. Google is apparently investigating the involvement of the firebase, but has increased reservations that enable Google Play to alert users to detect a catwatch spyware or its installer on a user’s phone.
How to stay safe from spyware
(Image Credit: Caspersky)
Kate Watchfelt claims that it cannot be installed, however, there are still things that can be done. First, like any spyware or sticker ware, is a safety plan. Disapping this type of software can possibly inform the person who installed it in the first place, so always protect yourself first. If you are looking for additional resources, you want to contact the Alliance against StickerWare.
Android users who suspect they have a catwatch installed 543210 On their device’s capacity and hit call. If it is installed, it should appear on the screen – this code is a backdoor feature once after hiding the app but also shows whether the app is installed or not, so if you use it, you can also ping the person who has installed it.
Next steps: Make sure Google Play Protect is active, and check your phone permits. If you do not recognize apps that are allowed to be a clear warning symbol, especially capable access services. Check your Android device’s app list and remove anything that you have not approved or not.
Also make sure you have a lock screen active and protect your accounts using two factor verification to prevent anyone from accessing them whenever possible. Additional security, the best Android anti -virus apps can help you provide additional protection, such as VPN and identification theft protection.
Spyware and stickens are very real risks that need to be taken extra seriously because they are usually not installed on your phone by hackers, but by someone you know. This violation is certainly for those affected by it, but it also serves as a reminder of the wake -up call and the risk posed by such apps.


