Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Jack Altman raised $275 million in new early stage funds just a week

September 16, 2025

Coderabbit raised $60 million and values ​​the launch of an AI code review two years ago at $550 million

September 16, 2025

Waymo's co-CEO on the truth behind self-driving cars in 2025

September 16, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Google brings Pixel 6 and new devices to Material3 Expressive, along with other features, to the Pixel 6 and new devices

    September 3, 2025

    Google's NoteBookLM now allows you to customize the tone of your AI podcasts

    September 3, 2025

    Roblox expands the use of age estimation techniques and introduces standardized assessments

    September 3, 2025

    Instagram finally launches the iPad app

    September 3, 2025

    Complete the 2025 Confusion Builder Stage Agenda with the Maximum Scaling Voice

    September 3, 2025
  • Crypto

    PayPal will add a new one-to-one payment link to support Crypto soon

    September 15, 2025

    10 additional exhibition tables open and open in 2025

    September 15, 2025

    Stripe will showcase who WHO including Humanity, Openai and Paradigm to build a new blockchain

    September 4, 2025

    Coinbase CEO explains why he fired an engineer who didn't try AI right away

    August 22, 2025

    Your next customer is destroying the 2025 Expo floor

    August 19, 2025
  • Security

    Samsung Patch Zero Day Security Flaws are used to hack into customer's mobile phones

    September 16, 2025

    Gucci, Balenciaga and other brands own companies checking hacks

    September 15, 2025

    Israel announces $1.5 million seizure from crypto wallet linked to Iran

    September 15, 2025

    This is Tech Powering that drives the crackdown on Ice's deportation.

    September 13, 2025

    Apple's latest iPhone security features have made life even more difficult for spyware makers

    September 11, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Jack Altman raised $275 million in new early stage funds just a week

    September 16, 2025

    Coderabbit raised $60 million and values ​​the launch of an AI code review two years ago at $550 million

    September 16, 2025

    Waymo's co-CEO on the truth behind self-driving cars in 2025

    September 16, 2025

    D-ID gets Simpleshow, a Berlin-based video startup

    September 16, 2025

    Robinhood plans to launch a startup fund that is open to all retail investors

    September 15, 2025
TechBrunchTechBrunch

You may have stalkerware installed on your Android phone — here's how to remove it

TechBrunchBy TechBrunchApril 19, 20245 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Consumer spyware apps that covertly and continuously monitor private messages, photos, calls, and real-time location are a major problem for Android users.

This guide will help you identify and remove common surveillance apps from your Android smartphone, including TheTruthSpy, KidsGuard, and other apps.

Read our exclusive research

Consumer spyware apps are often sold under the guise of child monitoring or family tracking software, but their ability to track and monitor partners or spouses without their consent makes them known as “stalkerware” or “stalkerware.” Also called “sport wear”. These spyware apps are downloaded from outside the Google Play app store, implanted on a person's phone without their permission, and often disappear from the home screen to avoid detection.

Stalkerware apps are typically built-in Android features that are used by companies to remotely manage employees' work phones or use Android's accessibility mode to snoop on someone's device. It relies on exploitation.

Even if you are not actively using your phone, your phone may behave strangely, run warmer than usual, run slower, or use a large amount of network data.

Checking if your Android device has been compromised is quick and easy.

Before you start

It's important to have a safety plan in place and reliable support if needed. Please note that removing spyware from your phone may alert the person who implanted it, creating a potentially dangerous situation. The Coalition Against Stalkerware provides advice and guidance to victims and survivors of stalkerware.

Please note that this guide only helps you identify and remove spyware apps and does not remove data that has already been collected and uploaded to our servers. Also, menu options may vary slightly on some versions of Android. As with all advice standards, the following steps are taken at your own risk.

Check your Google Play Protect settings

Three side-by-side screenshots showing Play Protect with scanning turned off and Protect Play Protect settings with all toggles turned on.  The third screenshot shows Google Play Protect enabled. "No harmful apps were found." featuring "scan" Click the button to check for potentially malicious apps.

Make sure Google Play Protect, a security feature on your Android phone, is enabled. Image credit: TechCrunch

Google Play Protect screens apps downloaded from Google's app store and external sources for signs of potential malicious activity and provides the best protection available to protect against malicious Android apps. One. When Play Protect is turned off, these protections no longer work. It's important to make sure Play Protect is turned on to ensure it's working and scanning for malicious apps.

You can check whether Play Protect is enabled in your Play Store app settings. You can also scan for harmful apps if a scan has not already been done.

Check if accessibility services have been tampered with

Stalkerware relies on deep access to the device to access data and is known to exploit Android's accessibility mode. By design, this mode requires extensive access to the operating system and data in order for screen readers and other accessibility features to work.

Android users who don't use accessibility apps or features should not see the app in their Android settings.

If a downloaded service isn't recognized by your accessibility options, we recommend turning off the service in settings and deleting the app. Some stalkerware apps disguise themselves as normal apps, often with innocuous-sounding names like “accessibility,” “device health,” or “system services.”

Two side-by-side screenshots showing how an app called KidsGuard hijacks Android's accessibility features to monitor unsuspecting users.  The second screenshot shows that his three stalkerware apps - Accessibility, KidsGuard, and System Service - have all been switched

Android spyware often exploits built-in accessibility features. Image credit: TechCrunch

Check access to notifications

Similar to accessibility features, Android also allows third-party apps to access and read your incoming notifications. For example, you can read alerts on your smart speaker or display notifications on your car's dashboard. Granting notification access to a stalkerware app allows it to continuously monitor notifications, including messages and other alerts.

[特別なアプリ アクセス]You can see which apps can access your notifications by checking your Android notification access settings. Some apps may look familiar, such as Android Auto. You can turn off notification access for apps you don't recognize.

View three screenshots side by side.  One shows you how to turn off notification access in Android settings, followed by a screenshot of the stalkerware app. "system services" The switch will turn off and you'll see a list of apps under Notification Access in the third setting and you'll see everything. "Forbidden."

Spyware uses notification access to read user messages and other alerts. Image credit: TechCrunch

Check if device management app is installed

Other features commonly exploited by stalkerware include Android device management options. It has similar but broader access to Android device and user data.

Device management options are typically used by businesses to remotely manage employee phones, such as wiping the phone to prevent data loss if the device is stolen. However, these features also allow stalkerware apps to snoop on your Android display and device data.

Two screenshots are shown side-by-side, one showing a dangerous appearance. "security settings" An app with full administrative control over the Android device in question. "Erase all data" and "Lock the screen." The second screenshot shows that all currently installed device management apps are turned off.

Unrecognized items in your device management app's settings are a common sign that your phone has been compromised. Image credit: TechCrunch

Device management app settings[セキュリティ]of[設定]It is located in

Most people don't have a device management app on their phone, so you'll see unfamiliar apps with similarly confusing and ambiguous names like “System Services,” “Device Status,” and “Device Management.” Please be careful if ”

Check which apps to uninstall

You may not see the home screen icon for these stalkerware apps, but they will appear in your Android device's app list.

You can view all installed apps in Android settings. Look for apps or icons you don't recognize. These apps may also appear with extensive access to your calendar, call logs, camera, contacts, and location data.

If you view the three screenshots side by side, you'll see three stalkerware apps disguised as regular, normal apps. "device health," another person called "kids guard" and the third called "system service." All of these apps have broad access to your data.

Spyware apps are designed to blend in with common names and icons. Image credit: TechCrunch

Force-stopping and uninstalling a stalkerware app may alert the person who planted the stalkerware that the app is no longer working.

Protect your device

If stalkerware has been placed on your phone, it is most likely that your phone is unlocked or unprotected, or that your screen lock has been guessed or learned. A stronger lock screen password can help protect your phone from intruders. You should also use two-factor authentication whenever possible to protect your email and other online accounts.

If you or someone you know needs help, the National Domestic Violence Hotline (1-800-799-7233) provides free, confidential support 24/7 to victims of domestic violence and violence. We provide. If you are in an emergency, please call 911. If you think your phone has been compromised by spyware, the Coalition Against Stalkerware has resources.

Read more on TechCrunch:



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Samsung Patch Zero Day Security Flaws are used to hack into customer's mobile phones

September 16, 2025

Gucci, Balenciaga and other brands own companies checking hacks

September 15, 2025

Israel announces $1.5 million seizure from crypto wallet linked to Iran

September 15, 2025

This is Tech Powering that drives the crackdown on Ice's deportation.

September 13, 2025

Apple's latest iPhone security features have made life even more difficult for spyware makers

September 11, 2025

France says Apple has notified victims of a new spyware attack

September 11, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Jack Altman raised $275 million in new early stage funds just a week

September 16, 2025

Coderabbit raised $60 million and values ​​the launch of an AI code review two years ago at $550 million

September 16, 2025

Waymo's co-CEO on the truth behind self-driving cars in 2025

September 16, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.