Stalkerware is a type of malicious application used by abusers to monitor and track victims without their consent. These apps are often installed discreetly on a target’s smartphone, allowing the perpetrator to spy on private data, track movements, and even listen in on conversations. What makes stalkerware particularly dangerous is that it operates covertly, tricking victims into believing that their device is functioning normally.
How do stalkerware apps work?
Stalkerware apps vary in functionality, but they typically enable abusers to:
Track real-time location
Access call logs and contact information
Read messages from SMS and messaging apps
Take screenshots and send them to the abuser
Use the camera to monitor surroundings remotely
Listen in through the microphone
Unlike other forms of malware, stalkerware is often installed manually by someone with physical access to the victim’s device. This differentiates it from other cyber threats like infostealers, which spread through phishing attacks or malicious downloads.
Who uses stalkerware — and why?
Stalkerware is primarily used by individuals who seek to control or surveil someone, including:
Intimate partners engaging in abusive behavior
Overprotective parents monitoring children
Employers tracking employees without consent
Acquaintances with malicious intent
Although some tracking apps are marketed for legitimate purposes — such as parental control or anti-theft measures — many are misused to invade privacy. The Coalition Against Stalkerware defines these apps as software that secretly spies on another person’s digital activity.
How to detect stalkerware on your device
Since stalkerware apps are designed to remain undetected, they may not always appear in your app list. However, there are warning signs to watch for:
1. Check device administrator settings
Many stalkerware apps require device administrator access to function. On Android, check your security settings for unfamiliar admin apps and revoke their permissions if necessary.
2. Review app permissions
Look through your phone’s app permissions and see if any suspicious apps have access to your camera, microphone, location, or messages. While having multiple permissions doesn’t confirm stalkerware, an unknown app with excessive access is a red flag.
3. Monitor battery and performance issues
Stalkerware constantly runs in the background, draining battery life and causing devices to overheat. If your phone suddenly slows down or becomes unusually warm, it could be due to unauthorized tracking software.
4. Use security tools
Running a security scan with antivirus software can help detect and remove known stalkerware apps. Additionally, visiting StopStalkerware.org provides guidance on identifying and handling stalkerware threats.
How to stay safe from stalkerware
If you suspect that stalkerware has been installed on your device, taking immediate action is essential:
Do not delete the app immediately. If the stalker is aware of its removal, they may escalate their actions.
Develop a safety plan. Visit Coalition Against Stalkerware for expert resources.
Use two-factor authentication (2FA). Secure all online accounts to prevent unauthorized access.
Reset your device. A factory reset can remove stalkerware, but backup essential data first.
Why stalkerware matters
The rise of stalkerware highlights the dangers of digital surveillance in abusive relationships. As Laura Kankaala, Head of Threat Intelligence at F-Secure, warns, “No one knows more about us than our smartphones. And few people can do more harm with that knowledge than a former or current intimate partner who has become abusive.”
While Apple and Google have banned the sale of covert monitoring apps from their app stores, stalkerware is still widely available across the internet. Awareness is the best defense against these invasive tools, and recognizing the signs can help individuals protect their digital privacy.
Final thoughts
So, what is stalkerware? It’s a dangerous surveillance tool that allows abusers to track, monitor, and control victims through their own devices. By staying informed and taking proactive security measures, users can safeguard their digital privacy against this growing threat.