Technologist Mag
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On
How Shivon Zilis Operated as Elon Musk’s OpenAI Insider

How Shivon Zilis Operated as Elon Musk’s OpenAI Insider

30 April 2026
Gemini is reshaping the in-car experience — here’s how

Gemini is reshaping the in-car experience — here’s how

30 April 2026
90,000 Screenshots of One Celebrity’s Phone Were Exposed Online

90,000 Screenshots of One Celebrity’s Phone Were Exposed Online

30 April 2026
The 6,000 mAh battery on the Razr Fold should worry Samsung and Google: Here’s why

The 6,000 mAh battery on the Razr Fold should worry Samsung and Google: Here’s why

30 April 2026
Good Luck Getting a Mac Mini for the Next ‘Several Months’

Good Luck Getting a Mac Mini for the Next ‘Several Months’

30 April 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Technologist Mag
SUBSCRIBE
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release
Technologist Mag
Home » 90,000 Screenshots of One Celebrity’s Phone Were Exposed Online
Tech News

90,000 Screenshots of One Celebrity’s Phone Were Exposed Online

By technologistmag.com30 April 20264 Mins Read
90,000 Screenshots of One Celebrity’s Phone Were Exposed Online
Share
Facebook Twitter Reddit Telegram Pinterest Email

Stalkerware allows people to secretly spy on romantic partners, family members or other associates by infecting a target’s phone and then silently amassing their text messages, photos, location information, and other data. The malware is profoundly intrusive in and of itself, but digital rights advocates have long cautioned that on top of violating victims’ personal privacy, it also creates an additional risk that data gathered using spyware could then separately be breached by an additional, unrelated actor, creating a true privacy disaster. New research this week illustrates one such example of a true worst-case scenario.

In findings released on Thursday, a security researcher details the discovery of a cloud repository that was publicly accessible on the open internet with no access controls. It contained nearly 90,000 screenshots showing a European celebrity’s private messages, photos, and phone usage—seemingly compiled using stalkerware.

“All the selfies were one person, all the chats were one person, and it was basically everyone they chatted with divided into Instagram, Facebook, TikTok, and WhatsApp,” Jeremiah Fowler, a researcher with Black Hills Information Security who discovered the exposed data, tells WIRED. “There was a lot of nudity, there were pictures that you wouldn’t want out in the public.”

Among the 86,859 images, Fowlers’ analysis says, were ones capturing the celebrity talking privately with models, influencers, and other high-profile individuals, some of whom have millions of followers on their social media accounts. The screenshots, he says, captured business conversations with invoices and personal payment details, phone numbers, some partial credit card numbers, and huge volumes of sensitive information.

“You capture the initial victim, but you also victimize everyone they communicate with,” he says.

Fowler is not naming the apparent victim or their associates and says he reported the incident to local law enforcement. “Even though this is a very public person, even public people deserve privacy,” Fowler says.

Mistakenly exposed cloud repositories are a long-standing privacy and digital security problem, but these open data troves typically belong to companies that leave access open, exposing corporate secrets or customer information, because of misconfigurations or other oversights. In this case, though, the exposed data appeared to be owned by an individual. Based on the material in the dataset, Fowler attempted to contact the apparent victim, but ultimately notified the cloud service that was hosting the data. The company contacted the owner to have the data secured. Fowler is not publicly naming the host.

The exposed files have all of the characteristics of data collected using spyware—screenshots of particularly sensitive and intimate digital activity taken during a specific time span. And Fowler, who regularly investigates exposed datasets, specifically noticed this trove because the repository was called “Cocospy,” the name of a notorious off-the-shelf spyware tool. Fowler says the exposed data spanned mid-2024 to mid-2025.

Early last year, Cocospy and two other related apps that shared much of the same source code went offline after exposing user information. They became the latest in a long line of stalkerware apps to have suffered security breaches and exposed sensitive information. A flaw in the apps made it possible for anyone to access the huge troves of information that had been gathered from stalkerware victims and simultaneously exposed millions of Cocospy customer email addresses, TechCrunch reported at the time.

“Their malware on Android was full-blown spyware,” says Vangelis Stykas, a security researcher who has analyzed Cocospy and related apps, and is the cofounder and CTO of security firm Kumio AI. “It pretty much uploads everything from your phone to their cloud.”

Cocospy included a “stealth mode” that could take screenshots of what was on a person’s screen every few minutes and upload pictures or the contents of applications from a target device. “Having access to someone’s phone means you have unobstructed access to all of his or her life,” Stykas says.

Share. Facebook Twitter Pinterest LinkedIn Telegram Reddit Email
Previous ArticleThe 6,000 mAh battery on the Razr Fold should worry Samsung and Google: Here’s why
Next Article Gemini is reshaping the in-car experience — here’s how

Related Articles

How Shivon Zilis Operated as Elon Musk’s OpenAI Insider

How Shivon Zilis Operated as Elon Musk’s OpenAI Insider

30 April 2026
Gemini is reshaping the in-car experience — here’s how

Gemini is reshaping the in-car experience — here’s how

30 April 2026
The 6,000 mAh battery on the Razr Fold should worry Samsung and Google: Here’s why

The 6,000 mAh battery on the Razr Fold should worry Samsung and Google: Here’s why

30 April 2026
Good Luck Getting a Mac Mini for the Next ‘Several Months’

Good Luck Getting a Mac Mini for the Next ‘Several Months’

30 April 2026
Meta’s creepiest lawsuit in recent years will make you rethink its AI smart glasses

Meta’s creepiest lawsuit in recent years will make you rethink its AI smart glasses

30 April 2026
These Men Allegedly Profit Off Teaching People How to Make AI Porn

These Men Allegedly Profit Off Teaching People How to Make AI Porn

30 April 2026
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Don't Miss
Gemini is reshaping the in-car experience — here’s how

Gemini is reshaping the in-car experience — here’s how

By technologistmag.com30 April 2026

There’s a very specific kind of frustration that comes with talking to your car. You…

90,000 Screenshots of One Celebrity’s Phone Were Exposed Online

90,000 Screenshots of One Celebrity’s Phone Were Exposed Online

30 April 2026
The 6,000 mAh battery on the Razr Fold should worry Samsung and Google: Here’s why

The 6,000 mAh battery on the Razr Fold should worry Samsung and Google: Here’s why

30 April 2026
Good Luck Getting a Mac Mini for the Next ‘Several Months’

Good Luck Getting a Mac Mini for the Next ‘Several Months’

30 April 2026
Meta’s creepiest lawsuit in recent years will make you rethink its AI smart glasses

Meta’s creepiest lawsuit in recent years will make you rethink its AI smart glasses

30 April 2026
Technologist Mag
Facebook X (Twitter) Instagram Pinterest
  • Privacy
  • Terms
  • Advertise
  • Contact
© 2026 Technologist Mag. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.