90,000 Screenshots of One Celebrity's Phone Were Exposed Online
Matt Burgess, Lily Hay Newman ·
6 days ago ·
Read original ↗
ATT&CK techniques detected
5 predictions
T1113Screen Capture
61%
“long line of stalkerware apps to have suffered security breaches and exposed sensitive information. a flaw in the apps made it possible for anyone to access the huge troves of information that had been gathered from stalkerware victims and simultaneously exposed millions of cocos…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1213Data from Information Repositories
53%
“these open data troves typically belong to companies that leave access open, exposing corporate secrets or customer information, because of misconfigurations or other oversights. in this case, though, the exposed data appeared to be owned by an individual. based on the material i…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1530Data from Cloud Storage
48%
“these open data troves typically belong to companies that leave access open, exposing corporate secrets or customer information, because of misconfigurations or other oversights. in this case, though, the exposed data appeared to be owned by an individual. based on the material i…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1213.002Sharepoint
37%
“these open data troves typically belong to companies that leave access open, exposing corporate secrets or customer information, because of misconfigurations or other oversights. in this case, though, the exposed data appeared to be owned by an individual. based on the material i…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
“these open data troves typically belong to companies that leave access open, exposing corporate secrets or customer information, because of misconfigurations or other oversights. in this case, though, the exposed data appeared to be owned by an individual. based on the material i…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Spyware appears to have captured everything from intimate photos to private messages from the smartphone of European celebrity. They were publicly accessible until a researcher flagged the exposure.