Your Android phone could have stalkerware. Here’s how to remove it

Spread the love

Customer-grade spyware applications that are secretly and constantly observed your personal messages, photos, phone calls and real-time positions are an ongoing problem for Android users.

This guide can help you identify and remove general surveillance applications from your Android phone, including Thetruthspy, Cocrospi and SpikeIn others.

Customer-grade spyware applications are often sold under child observation or family-tracking software, but without their consent, partner or spouse is referred to as “stalkerware” and “spouses” for track and monitoring skills. These are the spyware applications Download from the outside Google Play’s App Store is planted on a phone without the permission of a person and often disappears from the home screen to avoid identification.

Stalkerware applications depend on the built -in Android features abuse that companies usually use their employees to handle work phones or use Android accessibility mode to snoop on someone’s device.

You can use your phone abnormally, running warmer or slower than normal or use a lot of network data, even if you are not actively using it, you can even notice.

Checking whether your Android device has been compromised can be done quickly and easily.

Before you start

It is important to have a security plan and trusted support in place if you need it. Remember that removing the spyware from your phone can warn the person that has planted it, which can create an unsafe situation. The Alliance against stalkerware Provides advice and guidance for people who are affected and survived from stackerware.

Note that this guide only helps you identify and remove spyware applications, already collecting and uploaded data uploaded to its servers. Also, some versions of Android may have some different menu options. As a standard with any suggestion, you follow these steps at your own risk.

Make sure Google Play Security is on

Display Play Protect by scanning as well as three screenshots, then all the toggles are switched with the play settings with switching and the third screenshot shows the Google Play Protect enabled and shown "No harmful applications were found," Featured "Scan" Button to check for potentially malicious applications.
Make sure a security feature of Google Play Protect, Android phones has been enabled. Figure Credit:TechCrunch / Getty Figure

Google is in Play Protection One of the best protection to protect against malicious Android applications Serious applications downloaded from Google’s App Store and outer sources for potential malicious activities are screening. These safety stops working when the Play Protect is closed. It is important to make sure it is working for contaminated applications and the Play Protection has been introduced to ensure that it is scanning.

You can test the Play Protect enabled through the Play Store Application Settings. If you are not already scanned, you can also scan for harmful applications.

Check whether accessibility services have been changed

Access to stackerware data depends on deep access to your device and is known to abuse Android accessibility mode that requires a wide access to the operating system through design and your data and other accessibility features for screen readers.

Android users who do not use accessibility applications or features do not have to see any app in this section of Android settings.

If you do not recognize a downloaded service on accessibility options, you can switch off it in Settings and remove the app. Some stallerware applications are disguised as general appearance applications and often called “accessibility,” “device health,” “system service” or other innocent-sounding names.

Two screenshots as well as an app are shown by an app called Kidgard to hijack the accessibility feature on Android to snoop on users. The second screenshot shows three stallerware applications - which is called accessibility, kidsguard and system service - all are switched to 'off' so they don't actively work.
Android spyware often abuses built -in accessibility properties. Figure Credit:TechCrunch

Check any application access to notifications

Like the features of accessibility, Android also allows third -party applications to access and read your coming notifications, such as smart speakers loudly or your car to display notifications on its dashboard. Allows notifications to access the notifications to the Stackerware application to monitor your notifications, including the contents of the messages and other alerts.

You can check what applications your notifications have access to your Android Notification Settings under Special Application Access. Some of these applications like Android Auto you can recognize. You can switch off the notification access to any app you don’t recognize.

As well as three screenshots, how to turn off the notification access to an Android setting, then there is a screenshot called Screenshot of the Stacckerware app "System service" Switch off, and third one shows a list of applications under notifications in Settings as all display "Not allowed."
Spyware taps access to access to access to user messages and other alerts. Figure Credit:TechCrunch

Check if any device admin app has installed

Other features usually abused by stackerware are Android device admin options, which have the same but more extensive access to the data of Android devices and users.

Device Admin options are usually used to handle their employees’ phones remotely, such as deleting the phone in theft of device to prevent data damage. However, these features allow stalkerware applications to break the Android display and device data.

Two screenshots look aside, as well "Security settings" The app with full admin control over Android devices allows it to it "Delete all data" And "Lock the screen." The second screenshot shows the device admin applications currently installed as shown as switch -off.
Your device is a general index of negotiating an unknown item in the admin application settings.Figure Credit:TechCrunch

You can find the device admin application settings in the settings under security.

Most people will not have any device admin app on their private phone, so if you do not see any such app, then you are aware, “System Service,” “Device Health” or “Device Admin” has been named after something similar and vague. “

Check apps to uninstall

You will not see any home screen icon for any of these stackerware applications but they will still appear on your Android device app list.

You can see all the applications installed in the settings of Android. Look for applications and icons that you don’t recognize. These apps may also appear as a wide access to your calendar, call log, camera, contact and location data.

As well "Device Health," Another "Kidgard" And a third called "System Service." All of these applications are allowed to have additional access to any user data.
Spyware applications are designed to mix with generic face names and icons. Figure Credit:TechCrunch

The stalkerware app stopped and uninstalled forces would probably warn the person who put the stallerware that the app no ​​longer works.

Protect your device

If you have stalkerware on your phone, you have a good chance of unlocking, securing or learning your screen lock. The password of a strong lock screen can help protect your phone from intruders. You should also protect email and other online accounts using you Bi-quality Wherever possible


If you or someone you know requires help, National Domestic Violence Hotline (1-800-799-7233) provides the victims of domestic torture and violence 24/7 free, confidential assistance. If you are in an emergency situation please call 911. The Alliance against stalkerware If you think that your phone has been compromised by spyware then there is resourceThe

Leave a Reply

Your email address will not be published. Required fields are marked *