[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fxaWRNPVlC7t7ebrD48lr2X30-QnH1BmiGNpXDIFZwKM":3},{"article":4,"iocs":51},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":30,"category":31,"article_tags":35},"eab87bc8-521c-4166-bbef-a297827af0fd","Private Chats, Photos of Celebs Exposed in Suspected Stalkerware Leak","private-chats-photos-of-celebs-exposed-in-suspected-stalkerware-leak-13bbb3","Private chats and photos of celebrities and influencers were exposed after a suspected stalkerware setup left a database open, revealing sensitive messages and files.","Cybersecurity researcher Jeremiah Fowler discovered an unsecured database containing 86,859 images, private messages, and sensitive documents belonging to a prominent European celebrity and multiple influencers, exposed by a misconfigured stalkerware setup. The leaked data included chat logs from WhatsApp, Facebook, TikTok, and Instagram, along with personal details like phone numbers, email addresses, and ID document photos. Fowler contacted the victims and informed law enforcement, highlighting how stalkerware can bypass encryption by capturing screenshots and demonstrating the risks of inadequate server security.","Stalkerware database exposed private chats and photos of celebrities and influencers.","Security Leaks Malware PrivacyPrivate Chats, Photos of Celebs Exposed in Suspected Stalkerware Leak Private chats and photos of celebrities and influencers were exposed after a suspected stalkerware setup left a database open, revealing sensitive messages and files. byDeeba AhmedApril 30, 20263 minute read Cybersecurity researcher Jeremiah Fowler uncovered a large leak of private photos, screenshots, and messages linked to a well-known European celebrity and several social media figures. The files were stored in a publicly accessible database with no password protection, exposing 86,859 images. Further analysis showed many screenshots were taken directly from a victim’s phone, which points to the use of stalkerware. The leak also contained private chat logs from apps such as WhatsApp, Facebook, TikTok, and Instagram. Fowler suspects that the person(s) who set up the stalkerware probably didn’t put a password on their storage folder, which is why anyone with an internet connection and the ability to find misconfigured and unprotected servers could access these private files. Screenshot of files in the database (Source: ExpressVPN) Details of the Leak The data, as per Fowler’s research published by ExpressVPN and shared with Hackread.com, contained very personal details like romantic messages and private photos. In addition, the files also had phone numbers, email addresses, and photos of ID documents like invoices and receipts. The stalkerware even caught messages sent to influencers who have millions of followers. The main victim is a prominent European entrepreneur and media personality, and some popular influencers, but Fowler didn’t name those involved to protect their privacy. However, he used the leaked phone numbers to call and warn them, and also informed law enforcement about the situation to stop the tracking. Screenshots from the leaked data (Source: ExpressVPN) “I identified that the victim of the spyware is a prominent European celebrity, entrepreneur, and media personality. The images capture chat conversations with influencers that have millions of followers, as well as with friends, family, business associates, and others. For privacy reasons, I cannot identify the victim or others whose private communications were unknowingly exposed,” said Fowler. What is Stalkerware Stalkerware is a spying tool that a hacker or someone known to the victim secretly installs on a phone to track everything they do. Usually, it is used to monitor children, but threat actors use it to spy on others for their own gains. “The software operates covertly without any indications that it has been installed,” Fowler explained in his blog post. He further noted that this stalkerware can see GPS locations, read texts, and even turn on the phone’s camera or microphone. Generally, an attacker needs physical access to the device for a few minutes to install it, and once this is done, it sends all the data to a remote server. Although apps like WhatsApp are considered safe because of using end-to-end encryption, spyware can take pictures of the screen. As Fowler mentioned, “encryption only protects data in transit,” so when a message shows up on the screen, the spyware grabs it. Fowler concludes with some tips for the users. There are signs to tell if your phone has spyware, such as the phone’s battery dying quickly or the device getting too hot for no reason. So, look for these signs. Fowler also suggested always using strong passwords and never letting others hold your phone without your supervision. If you suspect stalkerware is on your phone, look for unfamiliar\u002Fsuspicious apps, run antivirus checks, inspect device administrator settings and accessibility permissions, and perform a full factory reset to remove the spyware. Deeba Ahmed Deeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform’s trusted coverage. View Posts CelebritiesCyber CrimeCybersecuritydata breacheuropeInfluencersJeremiah FowlerLEAKSMisconfigurationPrivacyStalkerware Leave a Reply Cancel reply View Comments (0) Related Posts Android Malware Security Tordow Banking Trojan – A Grave Threat for Android Users Just a couple of weeks ago we reported about “Gooligan” attack affecting millions of Android devices worldwide. Now,… byWaqas Privacy Security Snowden Explains Why Telegram Messenger App is Unsafe For years, the ex-NSA (National Security Agency) whistleblower Edward Snowden has been raising awareness about so-called secure messaging applications… byWaqas Security Android iPhone Technology DolphinAttack: Voice Assistant Apps Siri and Alexa Can Be Hacked Mainstream Voice Assistants Including Siri and Alexa Plagued with Serious Vulnerability. Voice assistant apps are not as reliable… byWaqas Hacking News Malware Security 70% of DC Police CCTV cameras were hacked before presidential inauguration According to the Secret Service officials and Washington D.C city administration, just eight days before the presidential inauguration… byWaqas","https:\u002F\u002Fhackread.com\u002Fprivate-chats-photos-celebs-expose-stalkerware-leak\u002F","https:\u002F\u002Fhackread.com\u002Fwp-content\u002Fuploads\u002F2026\u002F04\u002FFamous-Celebs-Private-Chats-and-Photos-Found-in-Open-Online-Database-1.png","2026-04-30T21:24:19+00:00","2026-04-30T22:00:28.000038+00:00",7,[18,21,24,26,28],{"name":19,"type":20},"stalkerware","technology",{"name":22,"type":23},"WhatsApp","product",{"name":25,"type":23},"Facebook",{"name":27,"type":23},"TikTok",{"name":29,"type":23},"Instagram","2e06f76c-d5b9-4f54-9eef-4d3447b10730",{"id":30,"icon":32,"name":33,"slug":34},null,"Breaches","breaches",[36,41,46],{"category":37},{"id":38,"icon":32,"name":39,"slug":40},"614132b8-5837-4952-b8b5-c6c9a32a1d85","Privacy","privacy",{"category":42},{"id":43,"icon":32,"name":44,"slug":45},"89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5","Malware","malware",{"category":47},{"id":48,"icon":32,"name":49,"slug":50},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[52],{"type":45,"value":19,"context":53},"Spyware tool used to secretly monitor victims' phones and capture private messages, photos, and location data; covertly installed and exfiltrates data to remote server"]