Stalkerware

21st June 2021 | Cybrary Stalkerware


stalkerware cybrary

Stalkerware refers to tools, apps, software programs, and devices that let another person (a stalker) secretly watch and record information on another person’s device. Parents use this type of tool to keep an eye on their children. Criminals often use such software for invasive and intrusive spying on individuals of interest.

Stalkerware can see and monitor many things on your mobile devices including access photos/videos you take, web browser history, text message conversations, call history, and even your location. Stalkerware with privileged access to your device can turn on your webcam or microphone, take screenshots, see activity on third-party apps (Snapchat or WhatsApp), and intercept, forward, or even record phone calls.

Smartphone stalkerware tools typically require a hacker to have physical access to your device to install the malware. Once installed, it runs in stealth mode without any notification to the end-user of the device that it is present.  Stalkerware is difficult to detect and remove. 

What does this mean for an SMB?

Stalkerware, as well as other cyber threats, often get into your systems through end-users. Studies show that 90% of cyber-attacks are caused by human error where your users succumb to phishing or social engineering attacks. It’s so important for you to help employees avoid human errors.  Follow CyberHoot’s best practices to avoid, prepare for, and prevent damage from cyber attacks:

Start building your robust, defense-in-depth cybersecurity plan at CyberHoot.

To learn more about Stalkerware, watch this short 3-minute video:

Sources: 

Malwarebytes

TechSafety

Wikipedia

Additional Readings:

Mobile Stalkerware On The Rise

Stalkerware Could Be Spying On You

Related Terms:

Spyware

Phishing 

Ransomware

Leakware

CyberHoot does have some other resources available for your use. Below are links to all of our resources, feel free to check them out whenever you like: 

Note: If you’d like to subscribe to our newsletter, visit any link above (besides infographics) and enter your email address on the right-hand side of the page, and click ‘Send Me Newsletters’.

Find out how CyberHoot can secure your business.


Schedule a demo

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

CyberHoot Newsletter – June 2025

CyberHoot Newsletter – June 2025

CyberHoot June Newsletter: Stay Informed, Stay Secure Welcome to the June edition of CyberHoot’s newsletter,...

Read more
Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more
Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more