Federal Trade Commission

FTC Bans Company From Selling ‘Stalkerware’ Monitoring Apps

Retina-X’s apps posed several security risks to users thanks to lax data protections and loopholes that allowed mobile devices to be monitored without the user’s knowledge.

In an unprecedented step, the Federal Trade Commission has barred a company and its owner from selling “stalking” apps that allow people to monitor mobile devices unless significant steps are taken to ensure the apps are being used for “legitimate purposes.”

Retina-X Studios, LLC and its owner, James N. Johns, were charged with developing three mobile apps that allowed buyers to monitor the mobile devices on which they were installed. This monitoring could take place without the permission or knowledge of the device’s user, according to a release from the FTC.

One app, MobileSpy, was promoted as a way to monitor employees and children. Two other apps created by Retina-X, PhoneSheriff and TeenShield, were marketed as tools to monitor children’s phone use. More than 15,000 subscriptions were purchased before the company stopped selling the apps in 2018.

Perhaps most concerning was the company’s instructions to users about how to bypass mobile device manufacturer restrictions and how to remove an app icon from appearing on a device screen. These moves exposed the devices to security vulnerabilities and prevented a user from knowing the app was installed on their device, according to the FTC complaint.

“This is our first action against a so-called ‘stalking app,’” Andrew Smith, the director of the FTC’s Bureau of Consumer Protection, said in a statement. “Although there may be legitimate reasons to track a phone, these apps were designed to run surreptitiously in the background and are uniquely suited to illegal and dangerous uses. Under these circumstances, we will seek to hold app developers accountable for designing and marketing a dangerous product.”

In addition, the FTC found that Retina-X failed to “adequately secure” sensitive information collected from the devices and outsourced most of its maintenance and development to third parties. A hacker was able to gain access to sensitive information at least twice between 2017 and 2018. Allegations against the company included a lack of information security policies and regular security testing on its apps as well as inadequate oversight of its service providers.

Under the FTC’s proposed settlement of the case, Johns and Retina-X must agree to delete the data it collected from the apps. Most notably, the settlement prohibits the company from promoting, selling or distributing any monitoring app that requires users to go around a device’s security protections to install it.

Users must also go through a process to determine if they are using the app for “legitimate purposes,” as dictated by the FTC.

“Retina-X and Johns must require purchasers to state that they will only use the app to monitor a child or an employee, or another adult who has provided written consent,” the FTC said. “In addition, they must include an icon with the name of the app on the mobile device, which is only removable by a parent or legal guardian who has installed the app on their minor child’s phone.”

Retina-X is also required to develop a comprehensive information security program to ensure data security. Johns and his company will be subject to required third-party assessments of the program every two years, according to the FTC.

While cybersecurity activist group Fight for the Future applauded the commission’s actions against so-called “stalkerware,” Eva Galperin, the group’s cybersecurity director, told VICE Motherboard that she will be watching closely to see if Retina-X can ensure apps are being used for “legitimate purposes.”

“Depending on the ways in which these apps are used and the jurisdictions involved, using these apps to monitor children or employees is not necessarily legal either,” Galperin said.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3