How to find and remove spyware from your phone (2024)

How to find and remove spyware from your phone (1)

There are multiple ways to prevent a government agency, country, or cybercriminal from peeking into our digital lives, for example, by using virtual private networks (VPNs), end-to-end encryption, and browsers that do not track user activity.

Special Feature

Cybersecurity Best Practices for Protecting your Digital Assets Face it: Your personal and business data is under threat 24/7 -- and protecting those digital assets while you shop, bank, and play online remains job one. Here's the good news: More security-focused tools and strategies are available than ever. ZDNET's most up-to-date cybersecurity guides deliver practical tips to stay safe and productive today amid the ever-evolving threat landscape tomorrow. Read now

But, it can be extremely difficult to detect or remove spyware once it's implanted in a device.

This guide will run through different forms of malicious software that could end up on your iOS or Android handset, what the warning signs of infection are, and how to remove such pestilence from your mobile devices -- whenever it is possible to do so.

We will also touch upon stalkerware and other ways threats closer to home may spy on you -- and what you can do about it.

What is spyware?

Spyware comes in many forms, and before you can tackle the problem, it's useful to know the basic differences.

Nuisanceware is often bundled with legitimate apps. It interrupts your web browsing with pop-ups, changes your homepage or search engine settings, and may also gather your browsing data in order to sell it off to advertising agencies and networks.

Although consideredmalvertising, nuisanceware is generally not dangerous or a threat to your core security. Instead, these malware packages are focused on illicit revenue generation by infecting machines and creating forced ad views or clicks.

Also: How to protect and secure your password manager

There's also basic spyware. These generic forms of malware steal operating system and clipboard data and anything of potential value, such as cryptocurrency wallet data or account credentials. Spyware isn't always targeted and may be used in generalphishingattacks.

Spyware may land on your device through phishing, malicious email attachments, social media links, or fraudulent SMS messages.

Advanced spyware, also known as stalkerware, is a step up from basic spyware. Unethical and sometimes dangerous, this malware is sometimes found on desktop systems, but it is now most commonly implanted on phones. Spyware and stalkerware may be used to monitor emails and SMS and MMS messages sent and received; to intercept live calls for the purpose of eavesdropping across standard telephone lines or Voice over IP (VoIP) applications; to covertly record environmental noise or take photos; to track victims via GPS; or to hijack social media apps such as Facebook and WhatsApp. Stalkerware may also include keylogging features.

Stalkerware is typically used to spy on someone as an individual and watch what they do, say, and where they go. Stalkerware is commonly linked to cases ofdomestic abuse.

Finally, there's government-grade commercial spyware.Pegasusis the most well-known recent case, sold to governments as a tool for combating terrorism and for law enforcement purposes. Pegasus ultimately was found on smartphones belonging to journalists, activists, political dissidents, and lawyers.

In November 2022, the Google Threat Analysis Group (TAG) publisheddetails on Heliconia, a new commercial spyware framework with a potential link to a private Spanish company.

What are the warning signs of a spyware infection attempt?

There are several signs to watch for that might indicate you are being targeted by a spyware or stalkerware operator.

Finding yourself the recipient of odd or unusual social media messages or emails might be part of a spyware infection attempt. You should delete these without clicking on any links or downloading any files.

The same is true for SMS messages, which may contain links to trick you into unwittingly downloading malware.

Also:This notorious ransomware has now found a new target

To catch a victim unaware, these phishing messages will lure you into clicking a link or executing software that hosts a spyware or stalkerware payload. If the malware is being loaded remotely, user interaction is required, and so these messages might try to panic you -- for example, by demanding payment to a tax office or bank, or by posing as a failed delivery notice. Messages could potentially use spoofed addresses from a contact you trust, too.

When it comes to stalkerware, initial infection messages may be more personal and tailored to the victim.

Physical access or the accidental installation of spyware by the victim is necessary. However, it can take less than a minute to install some variants of spyware and stalkerware.

If your phone goes missing or has been out of your possession for a time, and reappears with different settings or changes that you do not recognize, this may be an indicator of tampering.

What are the typical signs that spyware is on my phone?

You may experience unexpected handset battery drain, overheating, and strange behavior from the device's operating system or apps. Settings such as GPS and location functions may turn on unexpectedly or you may see random reboots. If you are suddenly using far more data than normal, this could be an indication that information is being sent from your smartphone or that remote connections are active. You may also have trouble turning off your device completely.

Certain forms of spyware focused on fraudulent revenue generation may be able to secure enough permissions to impact your bank balance. If you are signed up for services or premium SMS plans and you know you didn't consent to them, this could be a sign that spyware is on your device. Keep an eye on your credit cards for any signs of suspicious payments.

Also: How to clear the cache on your Android phone or tablet (and why you should)

An important point to mention is that sometimes spyware or other forms of malicious software might end up on your device via an originally benign app. There have been cases of developers releasing a genuine, useful app in official repositories, such as a currency converter or weather app, and then -- after a large user base has been gathered -- the developers twist the app's functions.

Last year,Google removed malicious appsfrom the Google Play Store that had been masquerading as Bluetooth utilities and had been downloaded by over a million users. While the apps didn't appear malicious at first, within days, users were bombarded with ads and pop-ups.

What other signs might I see on Android and iOS devices?

Surveillance software is becoming more sophisticated and can be difficult to detect. However, not all forms of spyware and stalkerware are invisible, and it is possible to find out if you are being monitored.

Android

One telltale sign on an Android device is a setting that allows apps to be downloaded and installed outside of the official Google Play Store.

If this setting is enabled, this may indicate tampering and jailbreaking without your consent. Not every form of spyware and stalkerware requires a jailbroken device, though.

This setting is found in most modern Android builds inSettings>Security>Allow unknown sources. (This varies depending on the device and vendor.) You can also checkApps>Menu>Special Access>Install unknown appsto see if anything appears that you do not recognize, but there is no guarantee that spyware will show up on the app list.

Some forms of spyware will also use generic names and icons to avoid detection. For example, they may appear to be a useful utility app such as a calendar, calculator, or currency converter. If a process or app comes up on the app list that you are not familiar with, a quick search online may help you find out whether it is legitimate.

iOS

iOS devices that aren't jailbroken are generally harder to install malware on than Android handsets -- unless an exploit for a zero-day or unpatched vulnerability is used against you. However, the same malware principles apply: With the right tool, exploit, or software, your device could be compromised either with physical access or remotely. You may be more susceptible to infection if you have not updated your iPhone's firmware to the latest version and you do not run frequent antivirus scans.

Both iOS and Android phones, however, will typically show symptoms of a malware infection.

How can I remove spyware from my device?

By design, spyware and stalkerware are hard to detect and can be just as hard to remove. It is not impossible in most cases, but it may take some drastic steps on your part. Sometimes the last-resort option may be to abandon your device.

When spyware is removed, especially in the case of stalkerware, some attackers will receive an alert warning them that the victim's device has been cleaned up. Should the flow of your information suddenly stop, this would be another clear sign to the attacker that the malicious software has been removed.

Do not tamper with your device if you feel your physical safety may be in danger. Instead, reach out to the police and supporting agencies.

Also: Apple issues security fixes for iPhone, iPad, Apple Watch to fight Predator spyware

Now, here are some removal options:

  • Run a malware scan:There are mobile antivirus solutions available that can detect and remove spyware. This is the easiest solution available, but it may not be effective in every case. Cybersecurity vendors, includingMalwarebytes,Avast, and Bitdefender, all offer mobile spyware-scanning tools.
  • Update your operating system:It may seem obvious, but when an operating system releases a new version, which often comes with security patches and upgrades, this can -- if you're lucky -- cause conflict and problems with spyware. Keep this updated.
  • If all else fails, factory reset... or junk it:Performing a factory reset and clean install on the device you believe is compromised may help eradicate some forms of spyware and stalkerware. However, make sure to back up important content first. OnAndroidplatforms, the reset option is usually found underSettings>General Management>Reset>Factory Data Reset. OniOS, go toSettings>General> Transfer orReset phone.

Google's guide to factory resetting your device can be found here, and Apple has also provided instructions on its support website.

Unfortunately, some stalkerware services may survive factory resets. So, failing all of that, consider restoring to factory levels and then throwing your device away.

If you have found suspicious software on your handset, consider the following:

  • Change your passwords:If you suspect account compromise, change the passwords of every important account you have. Many of us have one or two central "hub" accounts, such as an email address linked to all of our other services. Remove access to any such hub services you use from a compromised device.
  • Creating a new email address:Known only to you, the new email becomes tethered to your main accounts and this should, if it is safe, be an option you consider if stalkerware is involved. This can help wrestle back control of your accounts in a covet and quiet way, without alerting anyone.

Also: How tech is a weapon in modern domestic abuse -- and how to protect yourself

What can I do about about advanced spyware like Pegasus?

Government-grade spyware can be more difficult to detect. However, as noted in a guide on Pegasus published by Kaspersky, there are some actions you can take to mitigate the risk of being subject to such surveillance, based on current research and findings:

  • Reboots: Reboot your device daily to prevent persistence from taking hold. The majority of infections have appeared to be based on zero-day exploits with little persistence; therefore, rebooting can hamper attackers.
  • Disable iMessage and FaceTime (iOS): As features enabled by default, iMessage and FaceTime are attractive avenues for exploitation. A number of new Safari and iMessage exploits have been developed in recent years.
  • Use an alternative browser other than Safari or default Chrome: Some exploits do not work well on alternatives such as Firefox Focus.

Use a trusted, paid VPN service, and install an app that warns when your device has been jailbroken. Some AV apps also will perform this check.

It is also recommended that individuals who suspect a Pegasus infection make use of a secondary device, preferably running GrapheneOS, for secure communication.

How do I keep spyware and stalkerware off my device in the first place?

Unfortunately, no mobile device is completely protected against the scourge of spyware. However, we have provided some tips below to mitigate the risk of future infections:

  • Protect your device physically: Your first line of defense is to maintain adequate physical controls. Modern smartphones will allow you to set PIN codes and patterns or to use biometrics including fingerprints or retina scans to stop your handset from being physically tampered with.
  • Update your operating system:When system updates are available, ensure you install them in a timely fashion. As they contain security fixes and patches, they are one of the most important defenses you have against malware.
  • Use antivirus software:There are mobile antivirus solutions available that can detect and remove spyware. Running frequent scans will help protect your handset.
  • Only download apps from official sources: The majority of spyware and malware is found outside of Google Play and Apple's App Store, so be cautious about installing apps from third-party websites.
  • Watch out for malicious links: Mobile malware is often spread through phishing and malicious links, spread through platforms including social media services. These links may urge you to download apps from outside of Google Play or the App Store, and may be disguised as everything from antivirus software to streaming services.
  • Do not jailbreak your device: Jailbreaking not only voids your warranty but can open the door to malicious apps and software having a deep foothold in your OS, which may make removal extremely difficult, or impossible.
  • Enabletwo-factor authentication (2FA):When account activity and logins require further consent from a mobile device, this can also help protect individual accounts. (However, spyware may intercept the codes sent during2FAprotocols.)

Also: 5 quick tips to strengthen your Android phone security today

What are Google and Apple doing to protect Android and iOS devices?

Google and Apple are generally quick to tackle malicious apps that manage to avoid the privacy and security protections imposed in their respective official app stores.

Several years ago, Googleremoved seven appsfrom the Play Store that were marketed as employee and child trackers. The tech giant took a dim view of their overreaching functions -- including GPS device tracking, access to SMS messages, theft of contact lists, and potentially the exposure of communication taking place in messaging applications. Google has also banned stalkerware ads. However, some apps still apparentlyslip through the net.

Also: How to use iPhone's Security Keys feature to protect your Apple ID

Google's Threat Analysis Groupis constantly publishing research on new commercial spyware strains and their potential targets.

Apple hascracked downon parental control apps, citing privacy-invading functions as the reason for removal. The company offers its own parental device control service calledScreen Timefor parents who want to limit their child's device usage. Furthermore, the company does not allow sideloading-- that is, the installing of third-party apps from sources other than Apple's App Store.

In 2022, Apple revealed the details of a $10 million grant to research ways to combat state-sponsored spyware.

Are parental control apps spyware?

There are threats and inappropriate material around every corner online, and while children often want a smartphone and to be on social media at a young age, parents want to be able to monitor what they are viewing and who they are interacting with online. This, in itself, is responsible, but at the core, parental control apps are designed for surveillance.

The main issue is the capacity for abuse. Standalone parental control apps can be abused and the permissions they require can be incredibly intrusive -- not only for children but in relation to anyone's privacy.

Also: The best parental control apps to keep your kids safe online

A balance between a right to privacy and protection has to be maintained, and it's a difficult tightrope to walk. Both Apple and Google have introduced parental controls for Android devices, Chromebooks, iPhones, and iPads. These platforms focus on restricting screen time, locking and unlocking devices, and features such as permissions list management, restricting web content and app downloads, and purchase approvals.

Security

  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next
How to find and remove spyware from your phone (2024)

FAQs

How do I find and remove spyware from my phone? ›

The easiest way to check for spyware on your phone is to use a spyware removal tool. A spyware removal tool helps automatically root out and removes traces of hidden spies. But be careful. You shouldn't just go to the Google Play Store and download any antivirus app or detector tool.

How do I manually detect spyware? ›

How to detect spyware
  1. Increasing sluggishness and slow response.
  2. Unexpected advertising messages or pop-ups (spyware is often packaged with adware).
  3. New toolbars, search engines and internet home pages that you don't remember installing.
  4. Batteries becoming depleted more quickly than usual.

What detect and delete spyware? ›

Many antivirus or anti-malware programs are designed to isolate and delete spyware. Double-check that the software is compatible with your operating system before downloading. Update your operating system and apps.

Is there an app to detect spyware? ›

Clario Anti Spy is a cybersecurity app created by leading experts in response to the growing public need to fight digital spying and stalking.

What is the 3 digit number to see if your phone is tapped? ›

Fortunately, there's a code (netmonitor code) that helps you identify whether or not you're being tracked or tapped. To confirm this, dial any of the codes below for your phone's operating system: For Android devices, dial: *#*#197328640#*#* or *#*#4636#*#* For iPhones, dial: *3001#12345#*

How can I know if my phone is being monitored by someone? ›

If you receive strange text messages on your phone, it could be a sign that your phone is being tracked. Tracking apps can send commands and messages to your phone to control it remotely. So, if you receive any unusual or suspicious messages, it is a good idea to check your phone for any tracking apps.

How can I scan my phone for spyware for free? ›

Download Avast One and run a free spyware scan to protect against spyware and other online threats. Regain control of your privacy with a spyware scanner, detector, and remover that's ultra-fast and refreshingly lightweight — and 100% free.

How to find hidden spyware on Android? ›

Click on Apps or Applications, depending on the terminology your device uses. Click on the burger menu or the three vertical dots at the top right corner of your screen. Click on Show System Processes or Show System Apps. Review the list of applications displayed and look for anything suspicious or unfamiliar.

How can I tell if my phone has a spy app on it? ›

6 Signs Your Phone Has Spyware
  • Your phone camera and mic turn on randomly. ...
  • You hear noises during phone calls. ...
  • Your phone is experiencing performance issues. ...
  • You see unfamiliar apps or files on your phone. ...
  • You are getting unusual messages. ...
  • Your phone is constantly overheating. ...
  • Don't download apps from untrusted websites.
Feb 9, 2024

What are the basic ways of removing spyware? ›

Run a legitimate product specifically designed to remove spyware - Many vendors offer products that will scan your computer for spyware and remove any spyware software. Popular products include Lavasoft's Ad-Aware, Microsoft's Window Defender, Webroot's SpySweeper, and Spybot Search and Destroy.

What is evidence of spyware on phone? ›

In some cases, because spyware is running on the phone, you may notice increased battery usage or data usage. If the phone has been jailbroken or rooted, the phone is less secure, which could result in faulty type behaviour on the phone, such as the phone shutting down or consistent dropped calls.

How to run a spyware scan? ›

Open your Windows Security settings. Select Virus & threat protection > Scan options. Select Microsoft Defender Antivirus (offline scan), and then select Scan now.

Is there an app to detect spy devices? ›

If you are suspicious that there might be bugs or spywares somewhere around you, install Hidden Device Detector: Camera & Microphones app and detect hidden devices with one tap. This spyware detector for android is a free bug detector app that allows you to find out any spy cam or mic in any place.

How do I get spyware off my phone? ›

To remove a spy app from your Android, you can simply uninstall it in the Apps or Apps & notifications section of your Android Settings while in Safe mode. If you can't identify the spyware, you can use an antivirus like TotalAV and scan your device. This will automatically find and remove threats for you.

How do I scan my phone for malware or spyware? ›

Check for Android malware using Play Protect
  1. Open the Play Store on the Android device you want to scan.
  2. Tap on your profile in the upper-right corner.
  3. Tap on Play Protect.
  4. Tap Scan.
  5. Tap on the option to remove any detected malware.
Jan 5, 2023

Can someone install spyware on my phone without me knowing? ›

Keyloggers can even record everything you type. Another form of spyware is 'stalkerware', which involves someone you know installing a spying app on your device without your permission or knowledge. These types of apps can be used by jealous partners, suspicious employers, or over-anxious parents.

How do I know if I have hidden apps or spyware? ›

Detect spyware by reviewing your system settings regularly.

Keep an eye out for unfamiliar apps running, your phone turning off randomly, or strange icons popping up. Be aware that certain spyware may be well-hidden and difficult to detect through a basic system review.

How do I find hidden malware on my phone? ›

If you suspect that there's malware on your Android device, download a reputable antivirus from the Google Play app store and run a deep scan. If the antivirus finds anything, it will likely prompt you to quarantine, block, or delete the infected files.

Top Articles
Latest Posts
Article information

Author: Allyn Kozey

Last Updated:

Views: 5842

Rating: 4.2 / 5 (63 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Allyn Kozey

Birthday: 1993-12-21

Address: Suite 454 40343 Larson Union, Port Melia, TX 16164

Phone: +2456904400762

Job: Investor Administrator

Hobby: Sketching, Puzzles, Pet, Mountaineering, Skydiving, Dowsing, Sports

Introduction: My name is Allyn Kozey, I am a outstanding, colorful, adventurous, encouraging, zealous, tender, helpful person who loves writing and wants to share my knowledge and understanding with you.