Stalkerware

Spyware and stalkerware are similar, yet not the same. Both are types of malware used to track a person’s activity on a device. But stalkerware is a more personal way of invading another person’s privacy. Stalkerware has to be physically installed, meaning that the attacker has to have direct access to the devices they are trying to compromise. Stalkerware is most likely used by a parent or partner.

Stalkerware is less likely to masquerade as something else entirely. Not always. In some cases it claims to be a child protection app, featuring disguise, in which case it is clear it is used to spy on a partner without him/her knowing. Even without, when intended to track children’s activities, its intent is always considered malicious, as it invades privacy.

With stalkerware installed on another person’s device, the adversary can activate the camera or microphone, view login details to different accounts, and sometimes even intercept phone calls.

Growing list of found stalkerware

Tool Claims Platform
mSpy Chats, photos, videos, and location. Android and iOS
XNSPY Photos, videos, and social media chats Android
eyeZy Feature-heavy phone spying app Android and iOS
ClevGuard Activities Android, iOS, and Windows
SpyBubble Real-time complete phone tracking iOS and Android
Cocospy Control and Remote Surveillance Android and iOS
uMobix Remote streaming of audio and video Android and iOS
Hoverwatch Full-Featured Invisible Android Tracker Android and iOS
FlexiSPY Emails, IM and browser activity Android
pcTattetale Activities Android & Windows
TheOneSpy Activities including live streaming Android
Spyine Monitoring smartphone in stealth mode Android and iOS
TheWiSpy Tracking location and monitoring files Android

Detection

Stalkerware is designed to be stealthy so that the victim never realises their smartphone has been infected. Many of the usual tell-tale signs of spyware (unwanted pop-ups, slow performance, over-heating) are not present with stalkerware.

Mitigation

Use a security app to scan the device. If you find stalkerware, report it to law enforcement (may not always and everywhere be an option).

Prevention

  • Equip devices with a password, fingerprint login, or similar. This adds an extra layer of protection, as stalkerware cannot be remotely installed.

  • Use routine malware scans (security app).