Stalkerware Blunder: SQL Slip Exposes 62,000 Accounts!

A security researcher found an SQL vulnerability in Catwatchful, a stalkerware, allowing him to extract a database of 62,000 user accounts. Despite attempts to take it down, Catwatchful remains online with temporary sites. Oops, indeed!

Pro Dashboard

Hot Take:

Stalkerware, the “creepy uncle” of software, just got outed by a security researcher who found its pants down with an SQL vulnerability. Not only did the pants fall, but 62,000 user accounts fell out. Maybe this stalkerware should consider a new hobby, like knitting or yoga.

Key Points:

  • Eric Daigle discovered an SQL vulnerability in Catwatchful, a piece of stalkerware.
  • Daigle managed to extract plaintext login details for 62,000 accounts, including admin credentials.
  • Despite being temporarily taken down, Catwatchful managed to stay online with new domains and patched vulnerabilities.
  • Google patched a Chrome zero-day vulnerability affecting the V8 JavaScript engine.
  • The Swiss government reported a ransomware attack on a partner NGO, but no federal data was compromised.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?