Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

The FBI says that China's salt typhoon has hacked at least 200 US companies

August 27, 2025

From streaming to healthcare to AI, Mark Cuba reveals his “formula of confusion”

August 27, 2025

US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

August 27, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Google Vids adds AI avatars to the video editor and launches the consumer version

    August 27, 2025

    Libby's library app adds AI discovery, but not everyone is excited

    August 26, 2025

    Google Translate accepts Duolingo with a new language learning tool

    August 26, 2025

    YouTube's “hype” feature that boosts small creators launches globally

    August 26, 2025

    Skylight's Tiktok Alternative adds community curators to the mix

    August 26, 2025
  • Crypto

    Coinbase CEO explains why he fired an engineer who didn't try AI right away

    August 22, 2025

    Your next customer is destroying the 2025 Expo floor

    August 19, 2025

    Crypto Company Gemini File for Winklevoss Twins IPO

    August 16, 2025

    North Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says

    August 4, 2025

    Telegram's Crypto Wallet will be released in the US

    July 22, 2025
  • Security

    The FBI says that China's salt typhoon has hacked at least 200 US companies

    August 27, 2025

    US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

    August 27, 2025

    Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

    August 26, 2025

    Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

    August 26, 2025

    Thetruthspy phone spyware new security flaw puts victims at risk

    August 25, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    From streaming to healthcare to AI, Mark Cuba reveals his “formula of confusion”

    August 27, 2025

    Uncork Capital in a 21-year venture cycle – and what's the difference between this?

    August 26, 2025

    A16z spends $1.49 million on lobbying in Washington, with rivals mostly going outside

    August 25, 2025

    Openai warns against SPVs and other “unauthorized” investments

    August 23, 2025

    Amazon AGI Labs Chief defends his reverse Acquihire

    August 23, 2025
TechBrunchTechBrunch

This sleazy Android spyware requires a password to uninstall. Below is how to delete it without one.

TechBrunchBy TechBrunchApril 3, 20256 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Consumer-grade phone monitoring apps aren't just meant to keep you stealthy. Some of these apps are making them increasingly difficult to remove.

TechCrunch has effectively blocked the stealth phone monitoring app for Android so that it can remove the app by Android device owners who require a password to identify and uninstall it.

Spyware apps that don't name them to promote relying on people who plant their apps and enable Android's built-in features, allowing their apps to “overlay” content over all other apps. Once this permission is granted, the Spyware app will use this overlay access to force a password prompt whenever a user attempts to uninstall or disable an app via Android settings.

Worse, the password to uninstall this spyware is set by the planter.

Animated GIF for Android Uninstall screen that forces you to display a password prompt when you try to uninstall an app. Entering the wrong password will close the page on the home screen.

Image credit: TechCrunch

There is a solution. TechCrunch's own tests showed that when restarting an affected Android device to “safe mode”, third-party apps containing spyware can temporarily prevent loading, allowing affected individuals to delete the app without a password prompt.

This Consumer-Grade Spyware app is part of an ecosystem of mobile phone monitoring services that promotes and sells apps under the guise of allowing parents to monitor their children's phone activities and businesses to track employees. However, these apps are also the term “Stalkerware” (or “spouse wear”). This is because many people explicitly advertise the app as a way to sn-snap your spouse or romantic partner without their consent.

These spyware apps are usually downloaded from outside the official Android app store and are usually planted by people with knowledge of passcodes and have physical access to a person's phone.

These apps will be intentionally hidden when an installation is installed to keep the app icons stealth from the victim's home screen. Meanwhile, we continuously upload people's mobile phone content, including text messages, photos and real-time locations, to web dashboards that are accessible to abusers.

Often, the only way to identify an app is to look into specific Android device settings that are commonly configured to facilitate monitoring of secret devices and identify the specific apps to remove.

However, for this particular Spyware app, the password popup blocks the ability to uninstall unless the correct password is entered.

A screenshot shows a password prompt overlaying Android uninstall settings to prevent users from deleting the app.

Image credit: TechCrunch

A screenshot shows a password prompt overlaying Android uninstall settings to prevent users from deleting the app.

Image credit: TechCrunch

How to identify and remove spyware that supports Android passwords

It's quick and easy to see if your Android device is compromised by consumer-grade spyware. Remember that removing spyware is more likely to warn those who planted it, so it's important to have a safety plan before proceeding.

TechCrunch has a general Android Spyware removal guide that will help you identify and remove common types of phone spyware and stalkerware and turn on the correct settings to protect your Android devices.

This particular spyware may not appear as a home screen icon, but the list of installed apps will appear as an unexplained app called “System Settings” that features the default Android icon.

The Spyware app takes advantage of another built-in Android feature called “Device Admin.” This allows businesses to remotely manage employee mobile phones, but is frequently abused by the Spyware app, giving wide access to victims' devices and data. If your device has an unrecognized device management app enabled, it may be a spyware app. You may receive a password prompt when you try to uninstall an app.

However, when you restart your Android device to “Safe Mode”, only the Android Core System app can run by default, allowing users to troubleshoot or remove buggy or problematic apps. (The 2016 stack exchange thread confirms this technique.)

TechCrunch tested and checked this process on several virtual Android devices. I planted this with spyware. Virtual devices allow you to run your apps in a protected sandbox without providing real data such as location.

Before proceeding, please note that if you enter the following steps to identify and remove safe modes and spyware apps, they may differ depending on your Android device model and software version.

Normally you will be prompted to press and hold the power button on your Android device until you see a set of options on your screen, then touch the “Power Off” button and ask if you want to “Reboot to Safe Mode.”[OK]and wait for the device to restart.

Android screenshot showing power options, with a red arrow above it "Turn off the power" button

Image credit: TechCrunch

Android screenshot with a read dialog box, "Reboot to safe mode," The text continues: "Do you want to restart to safe mode? This will disable all third-party applications you have installed. Reboot will restore it." There is a red arrow above "got it" button.

Image credit: TechCrunch

Android devices will display “Safe Mode” in the corner of the screen when the device successfully enters Safe Mode.

From here you can find the spyware app in question by looking into the installed “Device Management” app in your Android settings. If you have an unrecognized device management app, you can turn off the switch and then select “Deactivate and Uninstall” from the Device Management app settings.

Android phone screenshot showing "Device Management App" Set with the arrow pointing to switch apps using Device Management Access.

Image credit: TechCrunch

Android screenshot shows a device management app with spyware installed called

Image credit: TechCrunch

Once the spyware app is removed as a device administrator, you can uninstall the app completely from your device. This can be done by opening Android settings and then opening “Apps”.

From here you will be able to identify the specified spyware app from the list of apps installed on your device. If you look at the SAFE mode app information screen, you should be able to select “Uninstall.” If you are asked to delete the app, press OK.

(As an aside, Android cannot uninstall system apps that are essential for device functionality from this screen.)

A screenshot of Android in safe mode showing a spyware app called

Image credit: TechCrunch

Screenshot of Android in Safe Mode with an app that uninstalls the dialog box, with a red arrow above it "got it" button

Image credit: TechCrunch

At this point the spyware has been removed. Forced stopping and deleting a Spyware app can warn the person who planted the app no ​​longer works.

To exit Android Safe Mode and return the device to normal state, you can restart the device by pressing the power button and selecting “Reboot”.

You also need to create immediate steps to protect your device, such as setting a longer, unique passcode or alphanumeric password to prevent future physical access. You can also protect web accounts on devices that include Google accounts to prevent further misuse.

–

If you or someone you know needs help, the domestic domestic violence hotline (1-800-799-7233) provides secret support to victims of domestic abuse and violence 24/7. If you are in an emergency, call 911. If you think your phone is compromised by Spyware, then the federation against Stalkerware has resources.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

The FBI says that China's salt typhoon has hacked at least 200 US companies

August 27, 2025

US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

August 27, 2025

Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

August 26, 2025

Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

August 26, 2025

Thetruthspy phone spyware new security flaw puts victims at risk

August 25, 2025

Developers get prison time to disrupt the ex-employer's network with “kill switch”

August 22, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

The FBI says that China's salt typhoon has hacked at least 200 US companies

August 27, 2025

From streaming to healthcare to AI, Mark Cuba reveals his “formula of confusion”

August 27, 2025

US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

August 27, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.