News

Learn how to remove stalkerware from your Android

Security vulnerabilities can put your Android smartphone at risk. Among the most common are flaws in surveillance applications, also called stalkerware (stalking) or spyware (spying). These are applications installed without the permission of the phone’s owner that pass data to another person.

These apps are designed to be hidden in the smartphone interface. When the owner realizes, he is already being spied on. Knowing how to remove them is important. However, rest assured that the removal can be done safely.

Removing the app sometimes reveals that the person under surveillance is reacting, which can intensify the paranoia of the person who installed the app. For victims of domestic violence, it is important to seek help. For the Maria da Penha Law Service Center, dial 180 for qualified reception for victims of violence.

Stalkerware is also sought after by parents who want to monitor their children. In this case, it is important to note that the lack of consent in the use of these applications can bring even more problems than solutions.

Due to its dubious nature, stalkerware can often be found outside of the Google Play store and is installed without shortcut to your phone’s home screen. It can make the smartphone run overheating or sluggish even when the user is not using it.

Stalkerware abuses native Android functions for monitoring. Removing the application does not mean erasing the data that has already been collected and sent to the servers. It is also possible that different versions of Android have variations in how these applications are installed.

Steps to remove stalkerware from Android

1 – Check if Play Protect is enabled

1 – Enable Play Protect – (Image: Playback)

Play Protect is a native Google store protection that can prevent the installation of malicious software from both the Play Store and third parties. So ensure that this service is enabled for constant protection. Do regular scans of your device.

2 – Check if the accessibility functions have been modified

2 - Stalkerware Accessibility

2 – Check apps with accessibility permissions – (Image: Reproduction)

Android’s accessibility functions are intended to give access to the operating system to allow the screen reader and other assistive technologies to work. If you don’t recognize an app in the accessibility options, it’s a good idea to remove it. Much of the stalkerware masquerades as simple apps called “Accessibility” or “Device Health”.

3 – Check if an unknown app has admin permission

Stalkerware - admin

3 – Under Security, see apps with administrator permissions – (Image: Reproduction)

A smartphone’s administration options have broad access, even more than accessibility options. The objective is to find lost cell phones, erase data or prevent access remotely. They are used by stalkerware to record the screen and monitor the user remotely. In case there is an app with unknown admin permission, it is an indication of compromised phone. They can be named with generic titles like “System Services”, “Equipment Health” or “Device Admin”.

4 – Periodically uninstall apps

Stalkerware - uninstall

4 – Uninstall unnecessary apps – (Image: Playback)

In Android settings, view your apps. You might find an app with a harmless name like “Equipment Maintenance” or “Phone Services” with generic-looking icons. These apps can have access to your calendar, call history, camera, contacts and location. When you notice an app that you don’t install or don’t recognize, uninstall it.

5 – Protect your phone

5 - Stalkerware blocking

5 – Lock the home screen – (Image: Playback)

For a person to improperly install an app on your phone, you may not have your home screen locked or your lock vulnerable. Try to implement security protections such as a strong password screen lock and multi-factor authentication of your email.

In addition to these tips, it is important to start demanding privacy by design from companies. Smartphone and operating system manufacturers can develop security features that protect against abuses such as stalkerware.

Via TechCrunch

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *