Google Shuts Down Catwatchful Spyware Hosted on Firebase

Google shuts down Catwatchful spyware operation hosted on Firebase

Google has officially shut down Catwatchful, a phone spyware operation that had been secretly running on its Firebase platform. Catwatchful, disguised as a child-monitoring tool, harvested data from thousands of Android devices without users’ consent. The spyware uploaded sensitive information such as private messages, photos, and location details to a web dashboard accessed by the app’s operator. While Google eventually suspended the associated Firebase account for violating its terms of service, questions remain around the delay in response and the need for tighter oversight of app misuse on its cloud infrastructure.

Image Credits:Bryce Durbin

How Google responded to the Catwatchful spyware exposure

Google’s shutdown of the Catwatchful spyware only followed public exposure by TechCrunch, which had initially flagged the spyware’s activities in mid-June. Despite Firebase’s terms of service clearly prohibiting malicious use, it took nearly a month for Google to suspend Catwatchful’s account. During this time, the spyware continued to collect and transmit highly sensitive user data. A Google spokesperson confirmed to TechCrunch that the operations violated company policy, stating, “We’ve investigated these reported Firebase operations and suspended them for violating our terms of service.” However, the company refrained from providing a detailed explanation for the delayed response. Critics argue that Google’s sluggish handling reflects systemic gaps in detecting and swiftly neutralizing such threats within its infrastructure, particularly when profit-generating customers are involved.

Inside the Catwatchful spyware and its dangerous capabilities

Catwatchful operated as Android-specific spyware, disguised under the pretense of a child monitoring app. Once physically installed—often requiring prior access to the victim’s phone and passcode—the app would become invisible on the home screen and function covertly. Like other types of stalkerware or spouseware, it targeted unsuspecting victims by harvesting their private content. The spyware was capable of uploading call logs, messages, photos, browsing history, and even real-time location data to an online portal monitored by the person who installed it. This level of surveillance—without the consent of the victim—violates multiple privacy and legal standards. Such apps are frequently abused in domestic abuse contexts, raising serious ethical and legal red flags. Despite masquerading as parental control tools, the reality of how Catwatchful operated mirrors the tactics used in digital abuse and coercive control.

Security flaws and user data exposed through Firebase misuse

The true extent of Catwatchful’s operation came to light after security researcher Eric Daigle discovered a critical vulnerability. This bug exposed the spyware’s entire backend Firebase database to the public—without any password protection or authentication. As a result, anyone with the link could access highly sensitive data, including over 62,000 customer email addresses, plaintext passwords, and records from 26,000 compromised devices. The discovery highlights not only the invasive nature of spyware apps but also the careless storage practices employed by developers who rely on third-party platforms like Firebase. Google’s failure to proactively detect this misuse has led to further criticism regarding the risks associated with hosting user-generated apps that handle large volumes of sensitive data. Firebase, while offering convenience and scalability for developers, can also be exploited as a platform for malicious actors if not properly monitored.

Post a Comment

Previous Post Next Post