In this article:
In this article:
Stalkerware — or spyware — gives hackers or abusive partners an excessive amount of access to your devices and data, and needs to be dealt with carefully.
Stalkerware — or spyware — gives hackers or abusive partners an excessive amount of access to your devices and data, and needs to be dealt with carefully.
In this article:
In this article:
Stalkerware is a type of monitoring software secretly installed on a mobile device to track its activity. While it's often grouped in with spyware and other forms of malware, stalkerware should be taken more seriously due to its association with abusive partners and invasive employers.
Here are some of the red flags that could indicate you have stalkerware installed on your phone:
These warning signs apply to stalkerware and many malware infections, so it's critical that you take immediate steps to secure your device if you notice any of the above red flags.
{{show-toc}}
Stalkerware is a surveillance software program used to spy on people without their knowledge. These programs can track a phone's GPS location, call logs, and keystrokes. Stalkerware can also take screenshots, intercept phone calls, and access photos, emails, and text messages.
Named for their connection to stalking and domestic abuse, stalkerware programs pose dangers beyond the obvious invasion of privacy.
Since 2017, at least 24 stalkerware companies have leaked sensitive customer and victim data. These programs can also undermine your phone's built-in security features, especially when they require jailbreaking or rooting of the device.
But how does your phone get infected by stalkerware? There are multiple ways that stalkers and hackers can use your phone against you, including:
Regardless of how or why it's been added to a device, the use of stalkerware to monitor someone without their consent is a clear form of abuse.
A recent State of Stalkerware report identified over 31,000 victims of stalkerware in 2023, the majority of whom were Android users.
While iPhones are generally more secure, they can be vulnerable when jailbroken. Since stalkerware installation usually requires physical access to the phone — also a requirement for jailbreaking — no device is completely safe.
While suspicious apps appearing on your homescreen can be easy to spot, many other forms of stalkerware can be difficult to detect. If you think someone might be monitoring your device, follow some or all of these steps to check for and remove stalkerware.
Some stalkerware is classified as malicious spyware, which means that reputable antivirus software can detect and remove it. These programs look for common spyware apps and signatures, suspicious permissions, and hidden processes running in the background.
Note: Not all forms of spyware are flagged by antivirus software — such as when a stalker is abusing your phone’s built-in tools, or in instances of legitimate apps marketed as parental controls or employee tracking tools.
Google Play Protect is a built-in security feature for Android devices, which scans apps and devices for harmful programs and sends warnings or deactivates them. While this feature is enabled by default, it can be turned off to sideload malicious apps onto your device.
How to enable Google Play Protect:
Once enabled, Play Protect will automatically scan your apps and identify anything malicious.
Legitimate family-tracking and parental control apps may be misused as stalkerware. Apps like Apple’s Family Sharing or Google’s Family Link can track location, purchases, and online activities. If your device has been enrolled in a family plan without your consent, someone may be monitoring your activity remotely.
Consider any app with excessive permissions a major stalkerware red flag. Unfortunately, these apps can hide from the home screen by disguising themselves as system apps with legitimate-sounding names, such as “System Info” or “Wi-Fi.”
To find hidden apps, you may need to go through the device settings:
Stalkerware often exploits device accessibility and administrator privileges to gain greater access and control. This may allow someone to record your screen, log your keystrokes, and transfer data from your phone without your knowledge.
To find apps that have administrator or accessibility privileges:
Some types of advanced stalkerware can gain access to your notifications or even send notifications from your device to another. These apps take advantage of permissions to read your text message, phone call, and activity notifications.
To check the notification settings on apps:
Jailbreaking an iPhone or rooting an Android phone bypasses the device's built-in security features and allows stalkerware to access the device's system. If you find your device has been jailbroken or rooted without your knowledge, it could be monitored and controlled remotely.
NOTE: Restoring your phone to its factory settings may remove tampered apps and settings, but some jailbroken iPhones and many rooted Android phones may be more difficult to restore. For guidance, seek out professional technical support.
The use of stalkerware apps isn’t the only way for someone to spy on your device. Stalkers can monitor your messages and activities simply by logging in to your accounts from another device. While you may receive notifications about these logins, it’s best to manually check to see if any other devices have access to your accounts and information.
If you discover — or even suspect — the presence of stalkerware on your phone, the best course of action is to get a new, secure device.
If that's not an option, performing a factory reset can return your phone to its factory settings with only the default apps. While this will likely remove stalkerware from your phone, it will also delete your photos and files, so back up all of your important data first (if possible).
Once your device is cleaned, it's crucial that you take preventative steps to stop the stalker from reinstalling the spyware.
Here are some things you can do to protect your device and yourself:
The use of stalkerware is a major violation of privacy and a serious form of abuse.
If you find stalkerware on your device, it's imperative that you deal with the situation carefully so as not to put yourself in more danger.
First, seek out help if you need it. Check out the National Network to End Domestic Violence for more information and resources. Then, replace or clean out your device and take the necessary steps to secure it.
Finally, consider Aura for comprehensive protection against malware, hackers, and scammers. Aura also alerts you to data and password leaks, account breaches, and identity theft — while providing generous insurance coverage and 24/7 U.S.-based support to help you recover quickly if something does happen.
Editorial note: Our articles provide educational information for you to increase awareness about digital safety. Aura’s services may not provide the exact features we write about, nor may cover or protect against every type of crime, fraud, or threat discussed in our articles. Please review our Terms during enrollment or setup for more information. Remember that no one can prevent all identity theft or cybercrime.