The Infinite Brief

A researcher found the data on an Amazon S3 bucket owned by Spyfone, one of many companies that sell software that is designed to intercept text messages, calls, emails, and track locations of a monitored device.

The data exposed included selfies, text messages, audio recordings, contacts, location, hashed passwords and logins, Facebook messages and more.

The company’s backend services were also left wide open, not requiring a password to log into them, according to the researcher, who said he was able to create admin accounts and see customer data.