How to Find and Remove Stalkerware on Your Device

Imagine if someone else saw everything you did on your mobile device. They could see who you send text messages to, check your Internet browsing activity, and even follow your physical location by watching your device’s GPS.

Scary, right?

Apps that allow people to monitor others without their consent are becoming more popular, and they’re posing a dangerous threat. Sure, monitoring apps might be useful for parents or employers, but some of these apps, known as “stalkerware,” are being used by domestic abusers to stalk and monitor their intimate partners.

Stalkerware is supposed to be stealthy so if you have some on your device, you most likely won’t realize it. For this reason, you should take extra caution with your devices and learn how to recognize and remove stalkerware. 

What is stalkerware?

Stalkerware is a type of app that, once installed on a device, tracks a user’s activity. It can log keystrokes, track location, take screenshots, record video, and much more. Stalkerware apps also have a stealth mode which allows them to pass as innocuous calendar or calculator apps, so the phone’s user is unaware that they’re being tracked.

While there are legitimate uses for these kinds of tracking apps, such as parental monitoring, there is also overwhelming evidence showing that they’re being used to stalk individuals. Stalkerware apps are particularly prominent in domestic abuse cases, allowing abusers to track and spy on their intimate partners.

Stalkerware apps have been around for years, but they proliferated starting in 2020. NortonLifeLock carried out a study on stalkerware and found a 63% jump in the number of devices reporting stalkerware samples on a daily basis between 2020 and 2021. 

As these apps become increasingly popular, it’s vital to know what they do, how they get installed on your device, and what you can do to protect yourself from them.

How stalkerware gets installed on your device

Stalkerware apps are usually installed by someone who has access to your phone. They need to be able to download and install the app without your noticing and this is difficult to do remotely. In most cases, the person who installs the stalkerware is someone close to you. Either they have your passcode or are able to use your phone after you’ve left it unlocked and unattended.

Why antivirus and malware tech don’t catch stalkerware

A few years ago, stalkerware apps weren’t even on antivirus and malware detection companies’ radar and antivirus programs were only detecting about 10% of stalkerware. The most recent report from AV Comparatives, an antivirus testing site, found that antivirus software is now detecting anywhere from 60-95% of stalkerware. 

Why was detection of stalkerware lacking?

Eva Galperin, founder of the Coalition Against Stalkerware and director of cyber security at the Electronic Frontier Foundation, tested different antivirus solutions to answer that question. She says,

“Different companies had all kinds of justifications for why they might classify stalkerware as a sort of legitimate use. Because you can use it to track your children or your employees.”

She adds that some companies even thought letting intimate partners track each other was acceptable. Galperin started putting pressure on these companies to not only identify stalkerware but also to send alerts about the presence of stalkerware to users.

How do you find stalkerware?

The first protection against stalkerware is being able to identify it. There are few tactics to finding stalkerware on your device. The first is scanning your device with a malware scanning tool such as Malwarebytes, an official partner with the Coalition Against Stalkerware. If you are unable to scan a device because you are fearful of angering an abusive partner, you should contact the National Network to End Domestic Violence (NNEDV) from a safe place to explain your situation instead.

If you’re unable to scan your device, you can look for some of the following signs on your phone:

  • Your battery drains more quickly
  • The phone is warm to the touch even when not in use or charging
  • You can hear clicking, static, or distant voices when you are on a call
  • It takes your phone longer to shut down
  • You notice increased Internet activity or data usage
  • Your phone operates more slowly

How to remove stalkerware

Before you scan your phone with an anti-malware tool or remove the stalkerware from your device, consider your safety. If your abuser finds out you removed the app, it could put you in a bad situation. You may also want to keep the stalkerware app as evidence if you pursue legal action later.

You can remove stalkerware from your device in two ways:

  1. Use a malware scanner to find and delete the stalkerware app for you.
  2. Do a factory reset of your phone.

The factory reset is the safest option because your phone will get rid of any stalkerware without you risking a scan to find it out if it’s actually present.

Protect yourself from stalkerware

Stalkerware is a growing threat that everyone should be aware of. You should be careful when granting other people access to your devices, but that doesn’t always stop stalkerware. Try to keep tabs on all the apps on your phone so you’ll notice if there is a new one that you didn’t install. Also, keep your phone’s operating system and all your apps up to date.

By being cautious and taking the appropriate action, you can protect yourself from stalkerware. For more information and resources, you can also visit the Coalition Against Stalkerware’s website.

Picture of <span>About The Author</span>Chris Parker

About The AuthorChris Parker

Chris Parker is the founder of WhatIsMyIPAddress.com, one of the world’s most popular websites for online privacy and security with over 13 million monthly visitors. He is also the host of the Easy Prey podcast, where he interviews experts and survivors to uncover the tactics behind scams, fraud, and digital manipulation. Chris is the author of Privacy Crisis: How to Maintain Your Privacy Without Becoming a Hermit, a practical guide to protecting personal information in today’s surveillance-driven world. His work has been featured on ABC News and numerous podcasts, making him a trusted voice on how to stay safe, secure, and private online.
Share Post:

INSIGHTS YOU

MAY ALSO LIKE

You play a role in preventing social engineering. So, just what is social engineering? It’s a vague term that’s used for online shenanigans and…

If you think that only your Internet Service Provider (ISP), such as Cox Cable or Verizon, knows your IP address, think again. (Your IP…

This post was moved over from an old blog of mine that I’ve since taken down. Several years ago I purchased an APC AP9630…

WHAT PEOPLE SAY

ABOUT CHRIS

DOWNLOAD CHRIS’ BOOK

PRIVACY CRISIS

DOWNLOAD YOUR FREE PDF, MP3, and workbook by entering your details below.

We respect your privacy. 

Don’t want to share your email?

Privacy Policy

This following document sets forth the Privacy Policy for this website.

Collection of your personal information

We collect Non-Personally Identifiable Information from visitors to this Website. Non-Personally Identifiable Information is information that cannot by itself be used to identify a particular person or entity, and may include your IP host address, pages viewed, browser type, Internet browsing and usage habits, advertisements that you click on, Internet Service Provider, domain name, the time/date of your visit to this Website, the referring URL and your computer’s operating system.

Free offers & opt-ins

Participation in providing your email address in return for an offer from this site is completely voluntary and the user therefore has a choice whether or not to disclose your information. You may unsubscribe at any time so that you will not receive future emails.

Sharing of your personal information

Your personal information that we collect as a result of you purchasing our products & services, will NOT be shared with any third party, nor will it be used for unsolicited email marketing or spam. We may send you occasional marketing material in relation to our design services.

What Information Do We Collect?

If you choose to correspond with us through email, we may retain the content of your email messages together with your email address and our responses.

Cookie Based Marketing

Some of our advertising campaigns may track users across different websites for the purpose of displaying advertising. We do not know which specific website are used in these campaigns, but you should assume tracking occurs, and if this is an issue you should turn-off third party cookies in your web browser.

How Do We Use Information We Collect from Cookies?

As you visit and browse Our Website, the Our Website uses cookies to differentiate you from other users. In some cases, we also use cookies to prevent you from having to log in more than is necessary for security. Cookies, in conjunction with our web server log files or pixels, allow us to calculate the aggregate number of people visiting Our Website and which parts of the site are most popular.

This helps us gather feedback to constantly improve Our Website and better serve our clients. Cookies and pixels do not allow us to gather any personal information about you and we do not intentionally store any personal information that your browser provided to us in your cookies.

IP Addresses

P addresses are used by your computer every time you are connected to the Internet. Your IP address is a number that is used by computers on the network to identify your computer. IP addresses are automatically collected by our web server as part of demographic and profile data known as traffic data so that data (such as the Web pages you request) can be sent to you.

Sharing and Selling Information

We do not share, sell, lend or lease any of the information that uniquely identify a subscriber (such as email addresses or personal details) with anyone except to the extent it is necessary to process transactions or provide Services that you have requested.

How Can You Access and Correct Your Information?

You may request access to all your personally identifiable information that we collect online and maintain in our database by using our contact page form.

Changes to this Privacy Policy

We reserve the right to make amendments to this Privacy Policy at any time. If you have objections to the Privacy Policy, you should not access or use this website. You may contact us at any time with regards to this privacy policy.