Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Sri Mandir keeps investors hooked as digital dedication grows

July 1, 2025

Instagram lets you share Spotify songs with your story to your sound

June 30, 2025

At every stage of TechCrunch, Charles Hudson tells us what investors really see

June 30, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Sri Mandir keeps investors hooked as digital dedication grows

    July 1, 2025

    Instagram lets you share Spotify songs with your story to your sound

    June 30, 2025

    The best iPad app to unleash and explore your creativity

    June 30, 2025

    Privacy-centric app maker Proton sues Apple over anti-competitive practices and charges alleged

    June 30, 2025

    Google is adopting AI in classrooms, including new Gemini tools for educators and chatbots for students

    June 30, 2025
  • Crypto

    Vitalik Buterin reserves for Sam Altman's global project

    June 28, 2025

    Calci will close a $185 million round as rival Polymeruk reportedly seeks $200 million

    June 25, 2025

    Stablecoin Evangelist: Katie Haun's Battle of Digital Dollars

    June 22, 2025

    Hackers steal and destroy millions of Iran's biggest crypto exchanges

    June 18, 2025

    Unique, a new social media app

    June 17, 2025
  • Security

    US government overthrows North Korea's major “workers” management

    June 30, 2025

    Mexican drug cartel hackers spy on FBI officials' phones to track and kill informants, the report says

    June 30, 2025

    FBI, cybersecurity firms say prolific hacking crews are currently targeting airlines and transportation sectors

    June 28, 2025

    Prolific cybercrime gangs currently targeting the airline and transportation sector

    June 27, 2025

    US and French authorities confirm arrest of a violation form hacker

    June 26, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    At every stage of TechCrunch, Charles Hudson tells us what investors really see

    June 30, 2025

    From $5 to Financial Empowerment: Why Stash co-founder Brandon Krieg is a must-see for TechCrunch All Stage 2025

    June 30, 2025

    A comprehensive list of 2025 tech layoffs

    June 30, 2025

    How to prepare for a second semester salary increase now live in 2025

    June 30, 2025

    Tiffany is lucky to have won a VCS at TC at every stage.

    June 30, 2025
TechBrunchTechBrunch

Your Android phone may have stalkerware – Here's how to remove it

TechBrunchBy TechBrunchFebruary 20, 20255 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Consumer-grade spyware apps that secretly monitor private messages, photos, phone calls and real-time locations are an ongoing problem for Android users.

This guide will help you identify and remove popular surveillance apps from your Android phone, such as Thetruthspy, Cocospy, Spyic.

Consumer grade spyware apps are frequently sold in the guise of child surveillance or family tracking software, but for their ability to track and monitor partners and spouses without consent, they are available in the “stalkerware” and “spouseware” It is called “. These spyware apps are downloaded from outside the Google Play App Store, planted on phones without permission, and disappear from the home screen to avoid detection.

The Stalkerware app is a built-in Android feature that is normally used by businesses to remotely manage employee work phones or snoop someone's device using Android's accessibility mode. It depends on abuse.

Even if your phone is not actively using it, you may notice that your phone is operating abnormally, running warmer than normal, and using a large amount of network data.

Checking if your Android device is compromised is quick and easy.

Before you begin

It is important to have a safety plan and reliable support installed if necessary. Keep in mind that removing spyware from your phone will alert those who plant it and can lead to unsafe situations. The Coalition against Stalkerware provides advice and guidance to Stalkerware victims and survivors.

Please note that this guide will only help you identify and remove spyware apps and will not delete any already collected data and upload it to the server. Additionally, some versions of Android may have slightly different menu options. As any advice is standard, you follow these steps at your own risk.

Make sure Google Play Protect is turned on

With the Scan switch off, show three screenshots of play protection lined up, then Plate Play settings are turned on with all toggles on, and enable and display Google Play Protect The third screenshot shows "No harmful apps found," a "scan" A button to check for potentially malicious apps.Make sure Google Play Protect, a security feature for Android phones, is enabled. Image credits: TechCrunch / Getty Images

Google Play Protect is the best way to protect against malicious Android apps by screening apps downloaded from Google's App Store and downloading them from external sources for signs of potentially malicious activity It is one of the safeguards of the These protections will no longer work when Play Protect is turned off. It's important to make sure Play Protect is turned on and check for malicious app behavior and scans.

You can check that Play Protect is enabled through the Play Store app settings. You can also scan for harmful apps if the scan is not already running.

Check if the accessibility service has changed

Stalkerware relies on deep access to devices to access data and is known to exploit Android's accessibility mode. This requires broader access to the data of screen readers and other accessibility features by design.

Android users who do not use accessibility apps or features should not display the app in this section of Android Settings.

If you are not aware of the service that was downloaded in the Accessibility Options, we recommend turning it off in Settings to remove the app. Some stalkerware apps are disguised as normal-looking apps and are often referred to as “accessibility”, “device health”, “system services”, or other harmless sound names.

Two screenshots show an app called KidsGuard hijacking Android accessibility features hijacking unsuspecting users with Snoop. The second screenshot shows three stalkerware apps called Accessibility, Kids Guard and System Services. All of these have been switched Android Spyware often abuses by incorporating accessibility features. Image credit: TechCrunch

Check app access to notifications

Similar to the accessibility feature, Android also allows you to access and read incoming notifications, such as the smart speakers can read alerts loudly, just as they can display notifications on the dashboard. Allow notification access to the Stalkerware app allows for persistent monitoring of notifications, including message content and other alerts.

You can see which apps have access to notifications by checking Android notification access settings under Special App Access. Some of these apps, like Android Auto. You can turn off notification access for unrecognized apps.

Three screenshots are lined up, the other shows how to turn off notification access in Android settings, followed by a screenshot of the Stalkerware app. "System Services" Switch off and the third will show the list of apps under Settings Notification Access to show all "Not allowed."Spyware taps to Notification Access to read user messages and other alerts. Image credit: TechCrunch

Check if the device management app is installed

Another feature commonly abused by Stalkerware is Android's device management options, which are similar but even broader access to Android devices and users' data.

Device management options are typically used by businesses to remotely manage employee phones, such as wiping phones in the event of device theft to prevent data loss. However, these features allow the Stalkerware app to snoop data from your Android display and device.

Two screenshots are lined up, one showing a dangerous look "Security Settings" Apps that fully manage the Android device in question, "Clear all data" and "Lock the screen." The second screenshot shows everything that the currently installed device management app shows when you switch it off.Unrecognized items in the device administrator app settings are a general indicator of phone compromise. Image credit: TechCrunch

Under Security, you can find the device administrator app settings in Settings.

Most people don't have a device management app on their personal phones, so if you see an app that you don't recognize, go to “System Services”, “Device Health”, “Device Management.”

To uninstall, check the app

You may not see the home screen icon in any of these Stalkerware apps, but they will appear in the app list on your Android device.

You can view all the apps installed in Android settings. Look for unrecognized apps and icons. These apps also show you that you have extensive access to calendars, call logs, cameras, contacts and location data.

Three screenshots line up, showing three stalkerware apps all disguised as regular regular apps. "Device health," Another call "Kids Guard" And the third one was called "System services." All of these apps have extensive access to user data.Spyware apps are designed to blend in with popular name names and icons. Image credit: TechCrunch

Stopping and uninstalling the Stalkerware app can warn those who planted Stalkerware that the app no ​​longer works.

Protect your device

If your phone has Stalkerware planted, it is entirely possible that the phone is unlocked, unprotected, or screen locking has been guessed or learned. A stronger lock screen password will help protect your phone from intruders. You should also use two-factor authentication whenever possible to protect your email and other online accounts.

If you or someone you know needs help, the domestic domestic violence hotline (1-800-799-7233) is secretly available to victims of domestic abuse and violence 24/7 We provide support for. If you are in an emergency, call 911. If you think your phone is compromised by Spyware, then the federation against Stalkerware has resources.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

US government overthrows North Korea's major “workers” management

June 30, 2025

Mexican drug cartel hackers spy on FBI officials' phones to track and kill informants, the report says

June 30, 2025

FBI, cybersecurity firms say prolific hacking crews are currently targeting airlines and transportation sectors

June 28, 2025

Prolific cybercrime gangs currently targeting the airline and transportation sector

June 27, 2025

US and French authorities confirm arrest of a violation form hacker

June 26, 2025

Homeland Security warns about Iran-backed cyberattacks targeting US networks

June 26, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Sri Mandir keeps investors hooked as digital dedication grows

July 1, 2025

Instagram lets you share Spotify songs with your story to your sound

June 30, 2025

At every stage of TechCrunch, Charles Hudson tells us what investors really see

June 30, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.