Amazon Web Services, which has a commercial interest in retaining paying customers, made $39.8 billion in profit during 2024, per the company’s 2024 full-year earnings, representing a majority share of Amazon’s total annual income.
The storage buckets used by Cocospy, Spyic, and Spyzie, are still active as of the time of publication.
Why this matters
Amazon’s own acceptable use policy broadly spells out what the company allows customers to host on its platform. Amazon does not appear to dispute that it disallows spyware and stalkerware operations to upload data on its platform. Instead, Amazon’s dispute appears to be entirely procedural.
It’s not a journalist’s job — or anyone else’s — to police what is hosted on Amazon’s platform, or the cloud platform of any other company.
Amazon has huge resources, both financially and technologically, to use to enforce its own policies by ensuring that bad actors are not abusing its service.
In the end, TechCrunch provided notice to Amazon, including information that directly points to the locations of the troves of stolen private phone data. Amazon made a choice not to act on the information it received.
How we found victims’ data hosted on Amazon
When TechCrunch learns of a surveillance-related data breach — there have been dozens of stalkerware hacks and leaks in recent years — we investigate to learn as much about the operations as possible.
Our investigations can help to identify victims whose phones were hacked, but can also reveal the oft-hidden real-world identities of the surveillance operators themselves, as well as which platforms are used to facilitate the surveillance or host the victims’ stolen data. TechCrunch will also analyze the apps (where available) to help victims determine how to identify and remove the apps.
Leave feedback about this
You must be logged in to post a comment.