Is your phone acting weird? Has your spouse or partner complained that you are spending too much time at a certain location even though you never mentioned it? It might be that they’ve betrayed your trust by installing stalkerware on your phone. Find out what stalkerware is, how it works, and what to do if you suspect that someone is spying on you.
Stalkerware (or spyware) is a spying app or software used to let someone else track your device. It is usually installed without the user’s consent or even knowledge. In most cases, the stalker and the victim have a close relationship, and the victim does not suspect they’re being spied on. Such apps can be used by parents to monitor their kids, employers to track their employees, and insecure spouses to check on their partners.
Stalkerware can be split into two categories – dedicated spyware abused by everyday users and 'dual-use' apps, which are accessible to anyone on legitimate and well-known app stores.
The former usually openly advertises itself as spyware, can cost up to a couple of hundred dollars, and gives stalkers full access to the victim's device. With such an app, they can:
These apps can also work in “stealth mode,” meaning that the victim won't see the app on their phone or in their settings. However, it will secretly feed all their personal information to the stalker.
Advanced spyware sounds scary enough, though we shouldn't discount 'dual-use' apps as they are free, easily installed and there's a chance the victim already has it on their phone. For example, it can be a pre-installed Apple's 'Find My Friends' or 'Google Maps.'
'Dual-use' apps can masquerade themselves as something else like an app that finds nearby Wi-Fi hotspots. The victim might download it accidentally and without their knowledge be streaming their location in real time. (These apps usually have limitations and only can give away your location, but won't give access to your messages or photos). Similarly to advanced spyware, It's also difficult to notice the stealth activity of these apps.
If someone has installed stalkerware on your device and are using it to track you, they are violating your privacy and your physical security. You never gave consent to this person, and no one should ever have access to this much personal information about you. You also don't know what that person might do with your data or where it's going to end up. They might blackmail you or use your live location to follow you at night. If the stalker is someone close to you, they’re also fundamentally violating your trust.
There are few, if any, laws to punish stalkers who use spyware, especially if the victim willingly shared their passwords. Spyware to monitor kids or employees is unethical but not illegal, and repurposing it to spy on spouses or partners doesn't change that.
In addition to the privacy violations and knowing that someone has full access to your device, you also have to worry about hackers who might access that data. Hacktivists have started targeting spyware industry to show how easy it is to hack these companies.
Like your stalker, the app providers also have access to all your information; however, they store it on servers that may or may not be secure. Just imagine that your private texts and pictures being accessible not only to your stalker but to anyone.
It's hard to defend yourself from such apps. They can be used in stealth mode and not all antiviruses pick up on them. Also, app stores don't always screen the apps that appear on their platforms, making malicious apps easily accessible to anyone.
Phone manufacturers also don’t seem to believe that such apps raise privacy and security concerns, so they haven't yet implemented notifications that would indicate background app activity or unusual access permissions.
If your phone battery is getting drained quicker than usual or your spouse, partner, or someone else you know mentions facts you only mentioned to someone over a private message, it might be that they've installed stalkerware on your phone. If you suspect that might be true, try the following:
For more cybersecurity news and tips, subscribe to our monthly blog newsletter below!