Article Hero
How-To5 minutes read
February 27, 2023
  • telegram
  • facebook
  • twitter
  • github

How to Protect Yourself from Stalkerware

If you're reading this article on your phone then you might not be reading alone. Stalkerware apps installed onto a device will allow an unauthorized user to see whatever you see, spy on whatever you do, and follow you wherever you go, both online and in real life, all via your mobile phone.

Stalkerware apps have been on the rise over the last few years. In 2019, the Avast threat research team removed eight stalkerware apps from the Google Play Store. Despite their efforts, the digital security leader still reported an increase of 93% in the use of stalkerware in the UK alone between 2020 and 2021.

So, what is stalkerware, is stalkerware legal, how can you detect it, and how can you remove stalker apps if you find one on your device?


What is stalkerware?

Stalkerware refers to unethical software programs, devices, and apps that allow someone to secretly track another individual's location and spy on their online activity and communication.

The use of stalkerware apps constitutes a form of tech abuse, taking away a victim's privacy and their physical and online freedom.

It's easy to purchase stalkerware apps online, and if an abuser has physical access to a person's phone, it is also easy to install. Stalkerware apps run “invisibly” in the background allowing the abuser to monitor the entire device remotely.

What can stalkerware apps see?

Without the victim's knowledge or consent, a stalkerware installer can see their victim's web searches, text messages, voice calls, photos, and geolocation. They will also have access to your SMS texts, emails, and any files saved on your device, including your photo gallery.

If you have passwords saved on your device, they'll see those too. They will also be able to read conversations conducted on encrypted messaging apps such as WhatsApp and Telegram.

You can think of it a bit like someone streaming your entire phone to theirs. But they can do more than just passively watch...

Stalkerware apps can also allow the stalker to activate the camera or microphone. With this, they can watch you in real time, film you, or record your voice.

What's the difference between stalkerware apps and spyware apps?

If you've just read the section on “What is stalkerware?” and thought that sounds awfully like spyware, then you're right. They do sound similar, there is a great deal of crossover but they are a little bit different.

Spyware is a form of malware that is usually accidentally installed onto a device by the device user/owner. They may have clicked a dodgy link in a phishing email or website pop-up. The spyware is downloaded onto their device and hides under the guise of another app or program.

The spyware is then able to secretly monitor activity much like stalkerware. Usually, though, spyware is used to steal sensitive information like login credentials or payment information and relay that info back to cyber criminals.

This is perhaps the biggest difference between spyware and stalkerware.

With spyware, the “spy” is usually a cybercriminal unknown to the victim, and the malicious software is downloaded remotely.

Stalkerware, on the other hand, is purposefully and secretly downloaded onto a victim's device by someone they know who has physical access to their device.

Users of stalkerware apps tend to be by jealous partners/ex-partners, concerned or controlling parents, or so-called “friends”.

Are stalkerware apps legal?

As a technology, stalkerware is legal in some countries and sits in a weird gray area in others. It can depend on the jurisdiction and the use case. Although electronic or digital spying and tracking of a person is considered illegal, the technology isn't.

So, while app stores try to block apps that are specifically for spying or stalking, developers get around the restrictions by marketing them as “surveillance apps” for legitimate purposes such as home security, parental control, or anti-theft.

In this way, the legality of stalkerware lies with the user's intentions and not the actual technology or the developer behind it.

This is concerning since the use of stalkerware is often connected with cases of domestic abuse. The Coalition Against Stalkerware reports:

“According to a study on cyberviolence in intimate relationships, conducted by the Centre Hubertine Auclert in France, 21% of victims have experienced stalkerware at the hands of their abusive partner and 69% of victims have the feeling that their personal information on their smartphone has been accessed by their partner in a hidden way.”

How to detect stalkerware apps

Detecting stalkerware apps can be very difficult as they are designed to be hidden. They may be labeled to look like a legitimate app or will hide on your phone with an “innocent” looking icon, like a calculator.

You can do a search online for known stalkerware apps, but remember if there is stalkerware on your device, the person who put it there will be able to see what you've searched for. The same goes if you do a search for “what is stalkerware?” If you can, do these searches on a different device, like a public library computer for instance.

You can then check the list of all apps downloaded to your phone via the phone settings. This will give you a complete list beyond what appears on your home screen. Delete any apps that you don't recognize or no longer use, as they could be hiding stalkerware.

Check the permissions granted to apps to see what they have access to (like your photo gallery, location, or microphone). If your calculator has access to your camera, that's cause for concern!

Of course, since stalkerware has been designed to hide, there is no guarantee that even if you're looking for it, you'll be able to find it.

But there are other tell-tale signs that stalkerware apps may be lurking on your device. For example, if your phone's battery dies much faster than usual, it could be a sign that stalkerware is running 24/7 in the background.

Other signs are your phone becoming very hot when not in use, the keys or screen suddenly lagging, or noises during phone calls.

Spikes in data usage can also be an indication of large files (such as WhatsApp conversations or gallery images) being extracted.

How to remove stalkerware apps

If you do happen to find stalkerware on your phone, your first reaction may be to instantly delete it. But, keep in mind, whoever downloaded it will know it has been removed from your device which may escalate the abuse. Removing it may also remove any evidence should you wish to press charges against your abuser.

The National Cybersecurity Alliance has published tips on how to get assistance without deleting the stalkerware:

  • Speak with someone you trust and tell them by word of mouth (not using your device) that you suspect stalkerware is on your phone.
  • Connect with support services using a public computer or a device of a trusted friend that won't be compromised. The Coalition Against Stalkerware has a list of advocates and support services around the globe.

If you do decide to delete the app the best options available to you are:

A factory reset

This will delete everything from the device such as associated apps and accounts, and that will include the stalkerware. You can instigate the factory reset via your phone settings. The process will vary depending on the type of smartphone but a quick internet search will give you the exact instructions.

Just be sure to back up any necessary files beforehand. BUT you could be backing up the stalkerware too. Your best bet is to only restore the essentials, such as photos and contacts.

Get a new device

Buying a new device may be extreme, but that way you can be certain there is definitely no stalkerware on your device. Then, to make sure it stays that way...

Protect yourself against stalkerware apps

Protecting yourself from stalkerware apps can be a difficult task. While some anti-virus solutions will be able to prevent the download of stalkerware to your phone, or scan and detect it, it's not a 100% guarantee. As we mentioned before some stalkerware apps are considered “legal” and security solutions are unable to mark legal software as malicious.

Anti-virus programs might not stop all stalkerware apps but they can still offer some protection. So it's still a good idea to employ the use of an anti-virus solution.

Otherwise, it's up to you to be vigilant.

As always, awareness of cybersecurity risks is a good place to start. Then, it's a case of following best practices for mobile security.

For example, never leave your phone unattended, and keep it locked with a PIN or biometrics. If you go down the PIN route, never share it with anyone, including family, friends, or partners. Also, be sure to review your device settings and downloaded apps regularly.

Being aware of such risks is the first line of defense in protecting your privacy. Stay up to date with the latest news from across the digital privacy landscape with more from the Hoody Privacy Hub.

Ruby M
Hoody Editorial Team

Ruby is a full-time writer covering everything from tech innovations to SaaS, Web 3, and blockchain technology. She is now turning her virtual pen to the world of data privacy and online anonymity.

Latest


Blog
Timer7 minutes read

How the Government Hacks You, Final Chapter: IoT Hacks

Chapter 14: IoT Hacks

Will R
6 months ago
Blog
Timer9 minutes read

How the Government Hacks You, Chapter 13: GPS Tracking

Dive into the unsettling world of government-controlled GPS tracking!

Will R
6 months ago
Blog
Timer7 minutes read

How the Government Hacks You, Chapter 12: Garbage Day

Trash Talk: How your garbage can be exploited by hackers, law enforcement, and government agencies

Will R
7 months ago
Blog
Timer8 minutes read

How the Government Hacks You, Chapter 11: Resonance Attacks

It’s time to uncover how government surveillance gets personal.

Will R
7 months ago

Bulletproof privacy in one click

Discover the world's #1 privacy solution

  • Chrome Icon
  • Brave Icon
  • Edge Icon
  • Chromium Icon
  • Coming soon

    Firefox Icon
  • Coming soon

    Safari Icon
  • Coming soon

    Opera Icon

No name, no email, no credit card required

Create Key