Learn what stalkerware is, how to spot it on Android and iPhone, and step-by-step ways to remove it safely while protecting your privacy.

What is Stalkerware? How to Find & Remove it From Your Phone

Imagine carrying a tracking device, a hidden microphone, and a live screen recorder with you everywhere you go, like in your pocket, on your bedside table, next to you while you sleep. Now imagine someone else is controlling it.

That’s what stalkerware does.

Stalkerware is a particular kind of spyware and surveillance software used for Cyber stalking, usually by someone you know.

This could be a partner, ex-partner, family member, roommate, or sometimes even an employer. It runs silently on your phone, watching where you go, who you talk to, what you type, what you search for, often in real time.

This guide walks you through:

  • What stalkerware actually is (and how it compares to “normal” spyware or monitoring apps)
  • How it works technically on Android and iOS
  • How to spot the signs your phone might be infected
  • How to safely detect and remove stalkerware
  • When not to remove anything yourself (for your safety)
  • How to harden your devices against stalkerware and Cyber stalking

You do not need to be technical to follow this. You do deserve privacy, safety, and control over your own devices.

What is Stalkerware?

Stalkerware is software installed on a device (usually a smartphone) that secretly monitors a person’s activity and sends that data to someone else without the victim’s informed consent.

Depending on the app, stalkerware can often track real-time and historical GPS location, read text messages, chat apps, email, and log call history.

Not only that, stalkerware sometimes records calls, captures photos and screenshots and even records audio or video, monitors social media and browser history, and logs keystrokes (what you type), including passwords

Stalkerware is typically marketed as:

  • “Parental control” apps
  • “Employee monitoring” tools
  • “Phone tracker” or “anti-theft” utilities
  • “Relationship safety” or “catch a cheating partner” solutions

The Coalition Against Stalkerware describes these tools as apps that “enable someone to secretly spy on another person’s private life via their mobile device,” often monitoring location, web searches, messages, photos, calls, and more.

A growing global problem

Many security vendors have reported tens of thousands of unique users affected by stalkerware every year, and those are just the cases they can see.

The true scale is larger, because a lot of victims never realize they’re being monitored or never run security tools that would detect it.

The same research and frontline experience from domestic abuse organizations shows that digital stalking and monitoring are part of a broader pattern of technology-facilitated abuse.

Stalkerware Vs Spyware, Surveillance software, and Monitoring apps

It’s easy to get lost in terminology, so let’s clear that up.

Spyware vs stalkerware

  • Spyware is a broad category of malicious software that steals data, often for financial gain: passwords, banking details, login cookies, and so on.
  • Stalkerware is usually considered a subtype of spyware:
    • It’s targeted (usually at one person)
    • It’s part of Cyber stalking and abuse
    • It’s often installed by someone the victim personally knows (partner, family member, or acquaintance)

Both are harmful, but stalkerware is deeply personal. It’s about control and surveillance in a relationship, not just money.

Surveillance software and monitoring apps

There are legitimate monitoring apps:

  • Parental control tools
  • Corporate device management / MDM (Mobile Device Management)
  • Anti-theft apps

Used with full, informed consent and clear limits, these tools can be legitimate. But the same apps — or very similar ones — can also be used as stalkerware when:

  • They are installed without your consent
  • They are hidden or disguised
  • The person monitoring you misuses them to control, intimidate, or harass

Many stalkerware apps are marketed under innocent labels like “parental control” or “employee monitoring.”

But they are then abused to secretly track partners or family members, which is in clear violation of privacy and, in many regions, the law.

Bottom line: The technology might look like any other monitoring tool. What turns it into stalkerware is lack of consent and abusive intent.

How Stalkerware Works Under The Hood

You don’t need to be an engineer, but understanding the basics helps you spot red flags and remove stalkerware more safely.

The typical stalkerware setup

Most stalkerware products follow the same basic model:

  1. Installation on the victim’s device
    • Usually requires physical access to the phone for a few minutes.
    • On Android, often installed as a sideloaded APK (outside the Play Store).
    • On iOS, traditional stalkerware often requires a jailbreak, but more commonly abuses iCloud account access.
  2. Stealth mode
    • The app hides its icon, renames itself as “System Service,” “Device Health,” “Update Service,” etc.
    • It may not appear in the usual app launcher or settings screens.
  3. Data harvesting
    • Uses permissions like Location, SMS, Phone, Accessibility, Notification access, or Device Admin (Android) or configuration profiles and iCloud (iOS).
    • Intercepts incoming notifications, messages, GPS updates, microphone/camera access, and more.
  4. Exfiltration
    • Sends collected data to a remote dashboard or via email/web panel.
    • The abuser can log in from any browser and watch in near real time.

Why Android is more exposed

Android allows installation of apps from outside the official Google Play Store and offers more powerful APIs for background access. That flexibility can be abused by stalkerware that:

  • Misuses Accessibility Services to read content from other apps
  • Misuses Notification access to read all incoming notifications
  • Registers as a Device admin or device owner, making it harder to remove
  • Runs as a persistent background service to send data 24/7

How stalkerware works on iOS

iOS is more locked down, but stalkerware is still possible:

  1. Jailbreak-based apps
    • The device is jailbroken (removing Apple’s protections).
    • Stalkerware is installed from unauthorized repositories.
    • You may see apps like Cydia, Sileo, or similar, which are common jailbreak package managers.
  2. iCloud abuse (no app needed)
    • Someone who knows your Apple ID and password can sign in on another device.
    • They can then access iCloud-synced data: messages (where enabled), photos, contacts, notes, and location via Find My.
    • This kind of surveillance leaves no icon or app on your phone — it’s account-based.
  3. Configuration profiles & device management
    • Malicious device management profiles can be installed to route traffic, install hidden certificates, or push settings that expose your data.
    • Abusers sometimes misuse remote management tools originally meant for enterprise IT.

Apple has responded by introducing features like Safety Check and a detailed Personal Safety guide, specifically to help people escape technology-facilitated abuse and stalking.

Short answer: installing stalkerware on someone else’s device without their informed consent is illegal in most jurisdictions.

The legal landscape is complicated because:

  • Many stalkerware tools are sold as parental control or employee monitoring tools.
  • The apps themselves sometimes operate in a “gray zone,” but what’s illegal is the usage without consent.

However, secret surveillance of an adult’s personal device usually violates:

  • Privacy and wiretapping laws
  • Computer misuse / unauthorized access laws
  • Domestic abuse or harassment statutes when used as part of coercive control

Rights organizations and researchers have repeatedly called for stronger regulation and accountability for stalkerware vendors and abusers.

If you discover stalkerware, it can become evidence of a crime. That’s one reason you should think carefully before deleting it. More on that later.

Who Uses Stalkerware And Why?

Stalkerware is almost never about random hackers. It’s nearly always about intimate threats, meaning, people who are already close to you.

Common scenarios include:

  • Abusive partners or ex-partners
    • Tracking where you go, who you meet, what you say
    • Trying to stop you from leaving, seeking help, or starting a new life
  • Controlling family members
    • Parents spying on adult children
    • Relatives monitoring finances, relationships, or medical issues
  • Roommates or acquaintances
    • Installing stalkerware after briefly borrowing your phone
  • Employers
    • Misusing monitoring tools on personal devices instead of company-owned hardware

Studies and reports from domestic violence shelters show that tech-based tracking and eavesdropping are very common in abuse cases. Tech abuse is widely recognized as a component of coercive control.

Digital surveillance is itself a form of abuse. It often escalates to more overt control, harassment, and physical violence.

How To Tell If Your Phone Has Stalkerware

There is no single, guaranteed sign. Some stalkerware is very stealthy. But if you’re worried, look for a pattern of clues.

Technical red flags

  • Strange battery drain
    • Your battery suddenly starts dying much faster than usual, even when you’re not using the phone.
    • The phone feels warm while idle.
  • Unexplained data usage
    • Your mobile data usage jumps for no obvious reason.
    • Data is being sent in the background at odd times (e.g., late at night while you’re not using the phone).
  • Weird behavior and glitches
    • The device turns on or off by itself.
    • Apps crash more than usual, or the phone freezes.
    • You notice random pop-ups or system dialogs you didn’t trigger.
  • Unknown apps or “system services”
    • You see unfamiliar apps in Settings → Apps/Applications, especially ones with generic names like:
      • “System Service,” “Device Health,” “Update Service,” “Phone Manager,” etc.
    • On iOS, you may see configuration profiles you don’t recognize.
  • Enabled “Unknown sources” or sideloading (Android)
    • Under security settings, “Install unknown apps” is enabled for apps that shouldn’t have it.
    • This can indicate someone enabled sideloading to install stalkerware.

Behavioral red flags

Often, the clearest warning signs show up in someone’s behavior.

They seem to know where you are even when you haven’t shared it. They bring up private messages or calls they shouldn’t have access to. They get angry or panicked if you don’t reply quickly, or if your phone goes offline. They pressure you to share your passcode or demand you “prove trust” by handing it over.

Sometimes they even “gift” you a phone or tablet and insist you use that device instead of your own.

If you have a persistent feeling that you’re being watched, don’t brush it aside. Survivors and advocates often say that intuition is worth taking seriously.

First Priority: Your Safety, Not Just Your Phone

Before you start scanning, uninstalling, or factory resetting anything, pause and consider:

Could removing this app or changing my behavior put me at risk?

In abusive situations, removing stalkerware can:

  • Alert the abuser (many apps notify when the software is disabled or disappears).
  • Cause them to escalate with more control, more monitoring, or physical violence.
  • Erase evidence that could help you if you go to the police, court, or a support organization.

If you suspect your partner or family member is dangerous:

  1. Use a safer device for research and help
    • Use a friend’s phone, a work device, a library computer, or a device you know they can’t access.
    • Assume your own phone might be monitored until proven otherwise.
  2. Reach out to support services first
    • Domestic violence hotlines, NGOs, or local support organizations.
    • Many coalitions and nonprofits now specialize in technology-facilitated abuse and understand stalkerware.
  3. Document what you see
    • Take photos or notes (from a safe device if possible) of suspicious apps, settings, or behavior.
    • This can be used later as evidence.

If you are not in a high-risk situation (e.g., it’s a nosy friend or questionable employer, not a violent abuser), you still want to be careful, but the immediate safety risk is usually lower.

The sections below assume you feel reasonably safe taking action yourself. If you don’t, stop and get expert help before you proceed.

How To Check For Stalkerware On Android

Once you’ve thought about your safety and decided it’s okay to investigate your phone directly, the next step is to look for concrete technical signs on the device itself.

Android is the platform where stalkerware is most commonly installed, but it also gives you powerful tools to inspect apps, permissions, and security settings if you know where to look. 

In this section, you’ll use built-in features like Google Play Protect, app lists, special permissions, and account checks to spot suspicious activity without having to root your phone or do anything advanced. 

Work through these steps slowly and methodically; even if you don’t find definitive proof, they can still help you tighten your security and rule out some of the most common stealthy monitoring apps.

Step 1: Check Google Play Protect

  1. Open the Google Play Store app.
  2. Tap your profile icon (top right).
  3. Tap Play Protect.
  4. Make sure it’s turned on and tap Scan.

Play Protect can catch some malicious apps, though it won’t detect all stalkerware.

Step 2: Manually review installed apps

  1. Open Settings → Apps or Apps & notifications.
  2. Tap See all apps / Manage apps.
  3. Slowly scroll through every app. Look for:
    • Names you don’t recognize
    • Generic names like “System Service,” “Update Service,” “Device Health,” “Phone Manager,” etc.
    • Apps with very high permissions (tap into them → Permissions to see what they can access).

If in doubt, search the app name online from another device. Legitimate apps will have clear documentation and a reputation.

Step 3: Check special permissions

Stalkerware often abuses powerful permissions.

On most modern Android devices, review:

  • Accessibility services – anything enabled that you don’t recognize is suspicious.
  • Notification access – see which apps can read all your notifications.
  • Device admin apps / Device admin – look for unknown or unnecessary entries.
  • Install unknown apps – check which apps can install from outside the Play Store.

Disable access for anything that looks suspicious (if it’s safe to do so).

Step 4: Check for device management or “Find My” abuse

  • In Settings → Security → Find My Device / Find My Phone:
    • Make sure only your account or trusted services are enabled.
  • Check if your Google account is logged in on devices you don’t recognize by reviewing the devices list in your Google Account security settings.

If something looks wrong, don’t log devices out yet. If you’re in danger, talk to a support organization first. Logging an abuser’s device out can tip them off.

Step 5: Run a reputable mobile security / anti-spyware app

Install a well-known mobile security app from the official Play Store (for example, from established vendors) and run a full scan. Many of these tools now specifically look for stalkerware and “monitoring apps.”

These tools may classify some apps as PUA/monitoring rather than outright malware, since they can have dual-use purposes. Treat any such detection very seriously.

How To Check For Stalkerware On iPhone

Traditional stalkerware is less common on iOS because of Apple’s restrictions, but account-based spying is very real. Check both the device and your Apple ID.

Step 1: Look for unfamiliar apps and jailbreak signs

  • On your home screens and in Settings → General → iPhone Storage, scan for apps you don’t recognize.
  • Look specifically for jailbreak-related apps like Cydia, Sileo, Zebra, or anything that looks like a “tweaks” or “package manager” app.

If your iPhone is jailbroken, it’s much more vulnerable to stalkerware and other malware.

Step 2: Check configuration profiles and device management

  1. Go to Settings → General → VPN & Device Management.
  2. Look for any configuration profiles or management entries you don’t recognize.
  3. If you see a suspicious profile (especially if you’re not on a corporate-managed device), note the details and consider removing it when it’s safe.

Profiles can be used to route your traffic, install root certificates, and silently control aspects of the device.

Step 3: Check iCloud and sharing

Because iOS is harder to infect directly, abusers often abuse your Apple ID instead:

  • Go to Settings → [your name] → Password & Security:
    • Turn on two-factor authentication if it isn’t already.
    • Review trusted phone numbers and trusted devices.
  • Go to Settings → [your name] → Find My:
    • See which devices are linked and how your location is being shared.
  • Check Family Sharing and location sharing in Messages and Find My to ensure you’re not sharing with someone you don’t trust.

If you suspect your iCloud has been compromised, consider:

  • Changing your Apple ID password (from a safe device).
  • Signing out of iCloud on devices you don’t recognize.
  • Enabling Advanced Data Protection to encrypt more of your iCloud data end-to-end.

Apple’s Safety Check (iOS 16+) can also help you quickly reset sharing and access in emergencies.

How To Safely Remove Stalkerware (Android & iOS)

If you’ve decided it’s safe to proceed and you’ve identified suspicious apps or settings, here’s how to remove them as carefully as possible.

Before you remove anything

  • Back up your important data (photos, contacts, documents).
    • On Android, use Google backup or manually copy files to a safe location.
    • On iOS, use an encrypted iCloud or computer backup.
  • If you may involve law enforcement later, document everything:
    • App names, screenshots, configuration profiles, suspicious settings, logs.
  • Consider talking to a legal adviser or support organization first, especially if the stalker is dangerous.

Step A – Remove stalkerware from Android

  1. Disable special permissions
    • Go to Settings → Apps and open the suspicious app.
    • Tap Permissions and revoke everything you can (Location, SMS, Phone, etc.).
    • Go to Settings → Accessibility, Notification access, and Device admin apps and disable the app there as well.
  2. Uninstall the app
    • In Settings → Apps → [suspicious app], tap Uninstall.
    • If the Uninstall button is greyed out, it may still have device admin rights — remove those first.
  3. Restart your phone
    • Reboot to stop any lingering processes.
  4. Run a full mobile security scan
    • Use your chosen security app to perform a comprehensive scan.
    • Remove or quarantine anything else that’s flagged as spyware, stalkerware, or monitoring software.
  5. Update Android and apps
    • Go to Settings → System → System update and install any available updates.
    • Open Google Play Store → Manage apps & device and update all apps.
  6. Change passwords and security settings
    Do this only after you believe the device is clean, or from a separate, safe device:
    • Change passwords for:
      • Email
      • Cloud storage (Google, Dropbox, etc.)
      • Social media
      • Banking and payment services
    • Turn on two-factor authentication everywhere possible, preferably using an authenticator app rather than SMS.
  7. Factory reset (if necessary)
    If the stalkerware reappears, you’re still seeing strange behavior, or you want to be absolutely sure:
    • Back up only the files you trust (photos, documents), not full system images.
    • Go to Settings → System → Reset → Erase all data (factory reset).
    • After reset, reinstall apps manually from trusted sources only.
  8. A factory reset will wipe apps and settings, including most stalkerware. Just be careful not to restore a full backup that includes the malicious app.

Step B – Remove stalkerware / restore security on iOS

Because iOS stalkerware is often tied to jailbreaks or iCloud abuse, the cleanest fix is usually to fully reset the device and lock down your Apple ID.

  1. Back up your iPhone safely
    • Use iCloud Backup or an encrypted backup on your computer (Finder / iTunes).
    • Avoid restoring from very old backups that might include jailbreak-related changes.
  2. Erase your iPhone
    • Go to Settings → General → Transfer or Reset iPhone → Erase All Content and Settings.
    • Follow the prompts to wipe the device.
  3. Set up as new or carefully restore
    • Ideally, set up the iPhone as New and manually reinstall apps you trust.
    • If you restore from backup, monitor the device closely for suspicious behavior afterward.
  4. Lock down your Apple ID
    • Change your Apple ID password from a safe device.
    • Turn on two-factor authentication.
    • Review and remove any devices you don’t recognize from Settings → [your name] → Devices.
    • Use Safety Check to reset sharing and access if needed.
  5. Review important app permissions
    • In Settings → Privacy & Security, review app access to:
      • Location Services
      • Contacts, Photos, Camera, Microphone
      • Calendars, Files, etc.
    • Remove permissions that don’t make sense.

When You Shouldn’t Remove Stalkerware Yourself

Sometimes the safest move is not to touch the stalkerware yet.

You may want to hold off on removing anything if the suspected abuser is violent or has threatened violence, if you rely on the device to contact help and losing it would isolate you, or if you plan to pursue legal action and the stalkerware is important evidence.

In high-risk situations, it’s often safer to:

  • Use a different device for private communication.
  • Work with a domestic violence advocate, legal professional, or trusted tech expert.
  • Involve law enforcement where appropriate.

Some organizations and researchers use special tools that can detect stalkerware through network analysis instead of local scans, reducing the chances of alerting the abuser.

How To Protect Yourself From Stalkerware And Cyber Stalking

You can’t control other people’s actions, but you can make it much harder for someone to compromise your devices.

1. Lock your devices properly

  • Use a strong screen lock:
    • PIN (not 1234 or birth dates), passphrase, fingerprint, or facial recognition.
  • Do not share your passcode with partners, friends, or family members — even if they “just want to check something.”
  • Turn off lock-screen previews of sensitive notifications (messages, codes, etc.).

2. Practice strong password hygiene

  • Use unique passwords for each account.
  • Use a reputable password manager to generate and store them.
  • Change passwords if:
    • You leave a relationship or shared living situation.
    • Someone had access to your devices or accounts.

3. Turn on two-factor authentication (2FA) everywhere

  • Enable 2FA for email, cloud accounts, banking, and social media.
  • Prefer authenticator apps over SMS codes where possible.

4. Keep your OS and apps up to date

  • Install system updates promptly on Android and iOS; they often fix security flaws that can be abused to bypass protections.
  • Regularly update apps from the official app store only.

5. Control app permissions

On both Android and iOS, regularly review which apps can access your location, camera, microphone, SMS and call logs on Android, and your files and photos, and if an app doesn’t truly need a particular permission, deny it.

6. Avoid rooting or jailbreaking

Rooting (Android) and jailbreaking (iOS) remove built-in security protections. That can be fun for tweaking, but it massively increases your risk from stalkerware, spyware, and other malware.

If your phone is rooted or jailbroken and you didn’t do it yourself, treat that as a major red flag.

7. Be wary of “free gifts” and borrowed devices

  • Think twice about using a phone or tablet someone else pre-configured for you, especially if the relationship is controlling.
  • When possible, buy devices from reputable sources and set them up yourself from scratch.

8. Use reputable security tools

On Android, consider installing a trusted mobile security app that can detect spyware, stalkerware, and other threats, and on both Android and iOS.

You might also use a VPN when browsing on public or shared Wi-Fi to protect your traffic from network snooping.

While a VPN won’t directly remove stalkerware, it can reduce exposure if someone is trying to spy from the same network.

Ethical Monitoring Vs Abuse

Sometimes parents, caregivers, or employers genuinely want to keep people safe or protect company data.

But there is a hard line between responsible monitoring and abusive stalkerware.

Ask these questions:

  • Is there clear, informed consent?
    • Adults know the app is installed, what it does, and can say no.
  • Is monitoring necessary and proportionate?
    • Limiting app installs for a child is different from reading every message they send.
  • Is there transparency?
    • No hidden icons, no stealth mode, no disguises.
  • Can the person leave or opt out?
    • An employee should be able to use a personal device privately; a partner should never be monitored without explicit mutual agreement.

If the answer is “no” to these points, the software is leaning into stalkerware territory, no matter how it’s advertised.

Conclusion

Stalkerware turns the devices we rely on every day into tools of surveillance and control, but it does not have to stay that way.

By understanding what stalkerware is, how it operates on Android and iOS, and which warning signs to watch for, you can begin to take back control of your privacy.

Practical steps such as reviewing permissions, locking down accounts, using reputable security tools, and, when necessary, fully resetting devices give you a clear path toward a safer digital life.

Just as important, recognizing that your physical and emotional safety comes first helps you make smarter choices about when and how to act.

Whether you are supporting someone else or protecting yourself, knowledge, preparation, and the right support network can transform stalkerware from a hidden threat into a manageable, beatable risk.

Bit Scriber T1000
+ posts