Amazon said the three phone monitoring seedlings were planned to take action on the private seedlings of individuals in the server of the individuals of Amazon.
Amazon told TechCrunch to Techcrunch, “its following” process “in the time of the release of this article after the February notification. Stalkerwareware Spyroll and Spyrolic and Spyzie Continue photos of people from the Amazon Web services. Are stored and stored.
Cocicrovy, Spyicversus Spyzie According to the safety researchers that discovered it, the three Android apps and TechCrunch is sent to the sharing of the same source code and common security errors. The researchers said the operation could identify the phone data with 3.1 million collections. The researcher shared the notice that violates data. I have pwned.
In terms of stalkerware applications in the stalkerware, the participation of the investigation of the investigation is posted by storage or AWs in part of our investigation.
TechCrunch has called on the Amazon on February 20 on February 20.
In both emails, TechCrunch includes the name of the Amazon-Hosted Storage “Bucket”.
Amazon spokesman for Ryan Walsh, a spokeswoman for our services in AWCRUNCH, to take steps to be used in order to review our services in accordance with the violations of the rules. “Walsh hosting the form of abuse Amazon is connected to a webpage, but not comment on the status of Amazon servers using the applications.
This week, TechCrunch refers to 20 emails that include Amazon-Hosted Storage Names in February 20.
As a response, Walsh appreciates TechCrunch to “make this attention to this.” When Amazon is planned to take action, Walsh has not received the TechCrunch TechCrunch Technunch Report through the link we provided earlier. “
Amazon spokesman, Casey McGee, who has copied the Amazon spokesman, said the yarker said that this is the exact accurate “of the” TECCUNCUNCUnch “to describe the” SIC. “
Amazon Web services who maintain customers earned $ 39.8 billion in 2024 2024 years of earnings of the companyRepresents most of Amazon's annual income.
The storage boxes used in conropy, spyic and spyzie are still active in the time of publication.
Why these matters
Amazon's own Acceptable Usage Policy The company broadcasts what the customer allows customers to be accepted as a host on its platform. Amazon has no disputes to prevent spalware and stalkerware to upload data on its platform. Instead, Amazon's dispute is completely procedures.
It provides services to the cloud platform or other company in the platform of a journalist or other company.
There are large resources for the use of large policies to enforce its own policies in the Amazon and bad actors in both financially and bad actors are not abusing services.
Finally, TechCrunch warns to Amazon from TechCrunch. Amazon has made a choice to do not perform information.
How we found the information of the householder in Amazon
TechCrunch-Descriendly Data Brow of Broach: In recent years there have been a lot of stalkerware and leaks – We investigate to investigate to study to study the business as possible.
Our investigations can Help identify the victims who hacked phones hackedThe main source of the secret operator is mainly used to express authentic evidence and to accept the stolen information of the victims. TechCrunch will analyze the applications (available space) to help victims Decide how to determine and remove apps.
As part of our reporting process, TechCrunch will contact any company to support the Speedware and Stalkerware for the criteria for a company planned in a company. It is not uncommon for companies Web Hosts and Payment ProcessantsTo suspend accounts or remove data Breaking the terms of their own serviceIncluding Previous spitic activities hosted as a host in Amazon.
In February, TechCrunch is a violation of pests and spyic, and it is planned to investigate further investigation.
In the data, most of the victims are Android devices owners, identify cocicrons and spyic apps on the virtual Android device; It started with download and installation. (Virtual device is included in the Sandbox, which does not provide any real data without our location.
We use a network traffic analysis tool to determine what phone data works and determine what phone data is being addressed and to determine which phone data is being handled and determine what phone data is being addressed and to determine which phone data is being done and determine what phone data is being done and determine what phone data is being made and determine what phone data is being done and determine what phone data is being made and determine what phone data is being done and determine what phone data is being done and determine what phone data is being done and determine what phone data is being done and determine what phone data is being made and determine what phone data is being done and determine what phone data is being done and determine what phone data is being done and determine what phone data is being made and determine what phone data is being done and determine what phone data is being made and determine what phone data is being made.
In the Amazon Web service, the information of the names such as photos from Hisporwards of HISPORNINGS in HISPORTINGS OF HISPORTS OF HELPEDS.

We confirmed the Cocicroly and Spyic Usernames again by logging into the dashboards. Web Dashboards allow the contents of the Childroid Device Gallery of our Virtual Android Device Gallery.
When we open content from a photo gallery of our device's showroom from each photo's showroom of our device, When we open the content from a photo showroom of our device, amazonaws.com
Domain operating with Amazon Web services.
News of SPyzie's Data BreachTechCrunch uses Spyzie's Android application to the network analysis. The analysis and cocicy surroundings are the same. The Spyzie app has similarly posted the information of the victim's material information to its own Namesake storage box in the cloud of the Amazon's cloud.
Hotline (1-800-7999-7233) if you need help or someone you know is 24/7 free, If you are in an emergency, call 911. The Stalkerware Against Coalition Resources are resources if you think the resources are hurt by Spyswant.