A group of notorious phone spying apps, known as Cocospy, Spyic, and Spyzie, have unexpectedly gone offline, months after a severe security breach exposed millions of users’ private data.
Earlier this year, these three stalkerware applications—which are essentially identical apart from their branding—came under scrutiny for allowing individuals to covertly monitor the phones of others. The apps gave unauthorized access to a victim’s personal information including text messages, photos, call logs, and even real-time location tracking, all without the device owner’s knowledge.
Stalkerware like Cocospy and its clones are notoriously difficult to detect because they are designed not to appear on home screens or app lists. In February, security researchers discovered a serious vulnerability shared across these applications. This flaw enabled anyone to remotely access personal information from devices infected with the spyware, exposing not only the victims’ data but also the email addresses of millions of spyware customers. Using this vulnerability, researchers collected and published approximately 3.2 million user email addresses from Cocospy, Spyic, and Spyzie, revealing the massive scale of these covert surveillance operations.
Following news coverage of the breach, researchers and media outlets now report that all three stalkerware brands have become nonfunctional. Their websites vanished without warning, and their Amazon-hosted cloud storage and associated servers have since been wiped clean. No official explanation has been given for their sudden shutdown, and the operators behind the applications have remained unreachable for comment.
It is fairly common practice in the surveillance software market for companies to dissolve or rebrand their services following security breaches, generally to evade potential legal repercussions or public backlash. Cocospy, Spyic, and Spyzie join a growing list of spyware programs that have similarly collapsed after being hacked or exposed. In the past several years alone, at least two dozen comparable operations underwent data breaches, and a significant number shut down shortly afterward.
Though frequently marketed as legitimate “parental control” or tracking services, these consumer-level surveillance tools have been widely criticized and banned by major tech platforms for their misuse in monitoring partners and spouses without consent—an act widely viewed as illegal and unethical. Major technology providers, such as app stores, hosting services, and search engines, prohibit stalkerware from operating on their platforms, although enforcement is sometimes inconsistent.
Despite the disappearance of these particular surveillance apps, affected users should ensure their devices are clear of spyware. To check for Cocospy, Spyic, or Spyzie on Android phones, entering the special command **001** on the phone dialer and pressing call will trigger an otherwise hidden app, usually disguised as “System Service,” to reveal itself. If detected, users should promptly uninstall the app from their device.
Victims and those concerned about stalking or digital harassment can seek resources and assistance from organizations like the National Domestic Violence Hotline or the Coalition Against Stalkerware, both of which offer guidance on addressing privacy violations and securing compromised devices.