In the digital age, our smartphones have become an extension of ourselves, storing personal information, messages, photos, and much more. However, this convenience also comes with risks, especially when it comes to spyware applications known as "stalkerware."
This article by ITD Consulting will explore what stalkerware is, how to identify it, and how to protect yourself from it. Learn how to safeguard yourself from stalkerware with the help of ITD Consulting.
What is Stalkerware?
Stalkerware is a type of spyware that is installed on mobile devices without the user’s knowledge. These stalkerware apps are often marketed as monitoring tools for parents or family tracking, but they can also be used maliciously by partners or spouses to spy without consent.
These stalkerware apps are typically downloaded outside of official app stores like Google Play and are often hidden to avoid detection.
Features of Stalkerware
1. Activity Monitoring
Stalkerware can monitor a wide variety of activities on the victim’s device. Once installed, stalkerware can track text messages, emails, GPS locations, call history, and activity on social media.
This allows the person who installed the stalkerware app to access practically all of the victim’s personal information and digital interactions.
This tracking and continuous monitoring capability makes stalkerware an extremely invasive tool, enabling stalkers to collect intimate and confidential details about the affected person’s life without their knowledge or consent.
2. Concealment
One of the most concerning features of stalkerware is its ability to hide on the infected device. After installation, these stalkerware apps disappear from the home screen, making it harder for the user to detect them.
This ability of stalkerware apps to remain invisible ensures that victims are unaware they are being spied on.
Additionally, stalkerware software can disguise itself under names and icons that appear harmless or are difficult to identify as suspicious, adding another layer of difficulty for users in detecting and removing them.

3. Remote Control
Stalkerware utilizes built-in features of Android, originally designed for business device management, to spy on users. These apps take advantage of Mobile Device Management (MDM) tools to enable extensive remote control over the victim’s device.
This includes the ability to activate the microphone and camera without the user's knowledge, access files and apps, and monitor in real-time what’s happening on the device. This remote-control capability makes stalkerware a powerful and dangerous tool for those looking to spy on and control others.
Signs That Your Phone May Be Infected with Stalkerware
Detecting stalkerware on your device can be tricky, but there are several signs to watch out for. ITD Consulting reveals some of the main indicators.
- Unusual behavior: If your phone is overheating, running slower than usual, or using a large amount of data for no apparent reason, it could be a sign that something is wrong.
- Strange notifications: Receiving unusual notifications might indicate the presence of spyware or stalkerware.
- Battery life: A rapidly draining battery could be a sign of a stalkerware app running in the background.
- Data usage: Spikes in data usage may suggest that a stalkerware app is transmitting information without your knowledge.
How to Remove Stalkerware
If you suspect your device may be infected with stalkerware, follow these steps to remove it:
1. Google Play Protect Settings
Google Play Protect is a tool that scans apps downloaded from the Google Play store for signs of malicious activity. Make sure it is enabled on your device to help combat stalkerware.
2. Accessibility Verification
Accessing Android’s accessibility mode requires a more complex process. If you don’t use accessibility apps or features, none should be enabled on your device. Some spyware apps disguise themselves under names like ‘Accessibility’ or ‘Device Status.’
3. Notification Access
Check which apps have access to your notifications using Android’s notification access settings. Disable access for any apps you don’t recognize, as they may be stalkerware.
4. Device Management Apps
Device management apps can be used to spy on your screen and data. If you see any app with an unusually simple name, delete it immediately.
5. Identify and Uninstall Unknown Apps
Search for any apps or icons you don’t recognize and uninstall them. Force-stopping these apps could alert the person who installed them, so proceed with caution.
The Stalkerware Industry and Its Risks
The stalkerware industry has grown significantly in recent years, along with the security risks. Since 2017, at least 20 stalkerware companies have been hacked or suffered major data breaches, including personal information of victims and clients.
Security Breaches in Stalkerware
- mSpy: One of the oldest stalkerware apps, mSpy, was hacked in 2024, exposing millions of customer support tickets and personal data.
- pcTattletale: Another recent incident involved pcTattletale, where a hacker stole and leaked the company’s internal data, as well as defaced their official website.
- FlexiSpy y Retina-X: In 2017, these two companies were hacked, revealing data from 130,000 customers in total.

Risks for Users
The use of stalkerware is not only illegal and ethically questionable, but it also poses a significant risk to the users of these applications. Stalkerware companies have repeatedly demonstrated that they are unable to adequately protect the data of their clients or their victims.
Tips to Avoid Stalkerware
1. Don’t Share Your Password
57% of people in Argentina know their partner’s phone password. Avoid sharing passwords to reduce the risk of someone close to you installing stalkerware on your device.
2. Review App Permissions
Regularly check the permissions granted to the apps on your phone. Stalkerware may disguise itself as a legitimate app with suspicious permissions.
3. Disable “Unknown Sources”
On Android devices, make sure that the “Unknown Sources” option is disabled to prevent the installation of unauthorized software.
4. Check Browser History
Your browser history can reveal if someone has downloaded stalkerware onto your device. There may also be signs if the history has been deleted.
5. Use Cybersecurity Protection
Install security apps that protect your device from mobile threats and perform periodic scans to detect any suspicious activity.
In Case You Find Stalkerware
If you find stalkerware on your device, don’t rush to uninstall it, as the person who installed it may be alerted and take retaliatory action. Follow these steps:
- Document Evidence: Keep evidence of the stalkerware for potential legal actions.
- Contact Authorities: Report the issue to local authorities and seek support from organizations that assist victims of domestic violence.
- Change Your Passwords: Change all your passwords for accounts and devices to prevent future unauthorized access.
- Factory Reset Your Device: Consider resetting your device to factory settings to remove any spyware.
The Role of the Anti Stalkerware Coalition
In 2019, several organizations and companies came together to form the Anti Stalkerware Coalition (CAS), with the goal of effectively combating digital harassment. The CAS consists of over 40 members from around the world who collaborate on key areas such as victim support, digital rights advocacy, and cybersecurity.
The coalition brings together technology specialists, human rights activists, and cybersecurity experts to tackle the problem of stalkerware from multiple perspectives and provide comprehensive solutions.
One of CAS's main impacts is the direct support it provides to stalkerware victims. The coalition offers resources and assistance to those affected by these spy apps, helping them protect themselves and regain their privacy.
Through its network of members, CAS offers technical guidance, legal advice, and emotional support to victims, facilitating a holistic approach to addressing and mitigating the harm caused by stalkerware.
In addition to supporting victims, CAS works to raise public awareness about the dangers of stalkerware. The coalition educates the public on how to identify and protect against these malicious apps.
CAS also advocates for legislative changes that protect victims and punish perpetrators. Through awareness campaigns, collaborations with lawmakers, and the promotion of stricter legal frameworks, CAS seeks to create a safer environment free from digital harassment.

Stalkerware is a real and growing threat in our digital society. Protecting yourself from this type of spyware requires being informed and proactive in reviewing and managing the applications and permissions on our devices.
By taking steps to protect your privacy and being aware of the warning signs, you can significantly reduce the risk of being spied on. Additionally, it is crucial to support and seek resources from organizations like the Anti Stalkerware Coalition to combat this form of digital harassment.
Remember, privacy and security are fundamental rights in the digital age. Stay informed and protect your personal data from stalkerware and other cybersecurity threats.
If you want to learn more mechanisms to protect yourself from stalkerware apps, feel free to contact us at [email protected]. We have a dedicated cybersecurity team to provide you with tailored advice and solutions.