/>
X

How to discover and destroy spyware on your smartphone (in pictures)

If you suspect your device has been tampered with, follow these steps.
screen-shot-2018-09-05-at-19-43-25.png
1 of 7 Charlie Osborne/ZDNET

What is the difference?

Nuisanceware, also known as Potentially Unwanted Programs (PUP), often comes in software bundles together with legitimate, free programs. These types of software may take your data to sell to ad agencies but are not generally considered dangerous.

Spyware & stalkerware: These are dangerous and may steal content including photos and videos, intercept calls, allow you to be tracked via GPS, compromise conversations in apps such as Facebook and WhatsApp, and permit attackers to remotely control devices.

While spyware is a generic term for software able to perform these functions, stalkerware is a term coined for software used by attackers close to you.

screen-shot-2018-09-05-at-19-45-02.png
2 of 7 Charlie Osborne/ZDNET

Common forms of spyware and stalkerware

-SpyPhone Android Rec Pro: This spyware claims to offer "full control" over a smartphone's functions, including listening in to calls, intercepting SMS and MMS messages, sending activity reports to the operator's email address, and more.

-FlexiSpy: FlexiSpy markets itself using the slogan: "It takes complete control of the device, letting you know everything, no matter where you are."

-mSpy: mSpy for the iPhone allows users to monitor SMS messages, phone calls, GPS locations, apps including Snapchat & WhatsApp, and also includes a keylogger to record every keystroke made.

-PhoneSpector: Designed for both Android and iOS handsets, PhoneSpector claims to offer "undetectable remote access."

Spyera, SpyBubble, Android Spy, and Mobistealth are a few other examples of commercial spyware.

screen-shot-2018-09-05-at-19-45-44.png
3 of 7 Charlie Osborne/ZDNET

How does my device become infected?

Often, spyware and stalkerware require physical access to a victim's device. However, some commercial solutions will also send the victim a crafted, malicious SMS message, email, or link over social media. These messages will contain code which, if executed, will covertly install spyware apps.

screen-shot-2018-09-05-at-19-46-29.png
4 of 7 Charlie Osborne/ZDNET

What are the warning signs of spyware infection?

Your mobile device may demonstrate some signs of infection, such as randomly rebooting, suspicious OS or app behavior, as well as overheating and unexplained battery drain. However, it is important to remember that the core purpose of spyware is to remain undetected, and so there may be no symptoms at all.

screen-shot-2018-09-05-at-19-47-15.png
5 of 7 Charlie Osborne/ZDNET

How can I remove spyware?

The easiest option is simply to run a malware scan and keep a mobile antivirus solution on your device and up-to-date. However, this may not always be effective.

You should also make sure operating systems are running their latest version, and if you suspect infection, change all passwords on your online accounts and enable two-factor authentication (2FA). Making sure you have a PIN code or biometrics set up for smartphone access can also help, if you suspect the operator is close to you.

screen-shot-2018-09-05-at-19-47-50.png
6 of 7 Charlie Osborne/ZDNET

What about particular brands?

If you think the spyware below is on your device, these instructions may help:

-FlexiSpy removal: FlexiSpy may masquerade on Android devices under the name "SyncManager." If you find this app on your phone, try to uninstall it directly, and then restart your phone. However, it may also appear under another generic name, and so before deleting any apps, perform a search on the app name first.

-mSpy: To remove mSpy, instructions are here as long as you have physical access to the device. On the iPhone, you need to access Cydia, search "Installed" and look for "IphoneInternalService." Press modify and remove. Additional options to try are explained here.

screen-shot-2018-09-05-at-19-48-30.png
7 of 7 Charlie Osborne/ZDNET

If all else fails?

Performing a factory reset and clean install on the device you believe is compromised may help eradicate some forms of spyware and stalkerware. Unfortunately, however, some stalkerware services claim to survive factory resets.

So, failing all of that, consider ditching your device, as a physical object is not worth sacrificing your privacy for.

Related Galleries

Hyundai Ioniq 5 and Kia EV6: Electric vehicle extravaganza
img-8825

Related Galleries

Hyundai Ioniq 5 and Kia EV6: Electric vehicle extravaganza

26 Photos
A weekend with Google's Chrome OS Flex
img-9792-2

Related Galleries

A weekend with Google's Chrome OS Flex

22 Photos
Cybersecurity flaws, customer experiences, smartphone losses, and more: ZDNet's research roundup
shutterstock-1024665187.jpg

Related Galleries

Cybersecurity flaws, customer experiences, smartphone losses, and more: ZDNet's research roundup

8 Photos
Inside a fake $20 '16TB external M.2 SSD'
Full of promises!

Related Galleries

Inside a fake $20 '16TB external M.2 SSD'

8 Photos
Hybrid working, touchscreen MacBook hopes, cybersecurity concerns, and more: ZDNet's tech research roundup
Asian woman working at a desk in front of a computer and calculator

Related Galleries

Hybrid working, touchscreen MacBook hopes, cybersecurity concerns, and more: ZDNet's tech research roundup

8 Photos
Developer trends, zero-day risks, 5G speeds, and more: Tech research roundup
Person seated at a booth in a cafe looks at their phone and laptop.

Related Galleries

Developer trends, zero-day risks, 5G speeds, and more: Tech research roundup

10 Photos
Drive Electric Day: A dizzying array of EVs in sunny Florida
ca3b4019-26c5-4ce0-a844-5aac39e2c34b.jpg

Related Galleries

Drive Electric Day: A dizzying array of EVs in sunny Florida

16 Photos