Stalkerware (spy apps) can be installed to monitor someone without consent. These apps may access messages, call logs, location, microphone or even device activity, depending on the tool.
This guide helps you recognise suspicious signs and follow safe removal steps in 2026.
π Table of Contents
π What is stalkerware?
Stalkerware is software designed for covert monitoring. It can be installed on a phone and then controlled by the person who installed it.
It is different from legitimate parental control or shared family features because it is used without consent and often hides its presence.
π Signs you might have stalkerware
- You see unknown apps or apps you cannot explain.
- Admin permissions or accessibility settings were enabled without your knowledge.
- Your phone shows unusual battery drain, heat or network activity.
- Someone can access your location or messages when you do not share them.
- Security settings look βchangedβ or locked by device policy.
- New βdevice managementβ or profiles appear.
π¨ If you feel unsafe, prioritize your physical safety and use local support services. Digital removal steps can sometimes trigger alerts for the stalker. Plan carefully.
π§± Where it hides: permissions, device admin and profiles
Common hiding places include:
- Device administrator access (Android)
- Accessibility permissions
- Profiles / device management (MDM)
- Background activity disguised as βsystemβ processes
- App visibility (hidden icons or misleading names)
β οΈ Safe removal steps
Follow a cautious, defensive workflow:
- Disconnect from WiFi/mobile data temporarily.
- Check for unknown admin / accessibility permissions and disable them.
- Look for unknown apps and uninstall those you do not trust.
- Check for device management profiles and remove them if you did not add them.
- Reboot and verify that suspicious behaviour stops.
- If unsure, consider a factory reset after backing up only what is safe to keep.
π‘ After you remove stalkerware, be careful when changing passwords. Use another trusted device if possible.
π After removal: secure accounts and recovery
Once stalkerware is removed, you should secure your digital accounts:
- Change passwords for your email and other critical accounts.
- Enable 2FA (authenticator app or security key).
- Revoke active sessions and remove unknown devices.
- Check whether your passwords appear in leaks and rotate again if needed.
- Review backup codes and recovery methods.
β‘ Lock down your email first
Your email typically controls password resets. Protect it immediately after cleanup.
π‘οΈ Enable 2FA