This is What Happens When Your Phone is Spying on You (2024)

Media contact:

Share This:

Smartphone spyware apps that allow people to spy on each other are not only hard to notice and detect, they also will easily leak the sensitive personal information they collect, says a team of computer scientists from New York and San Diego.

While publicly marketed as tools to monitor underage children and employees using their employer’s equipment, spyware apps are also frequently used by abusers to covertly spy on a spouse or a partner. These apps require little to no technical expertise from the abusers; offer detailed installation instructions; and only need temporary access to a victim’s device. After installation, they covertly record the victim’s device activities — including any text messages, emails, photos, or voice calls — and allow abusers to remotely review this information through a web portal.

Spyware has become an increasingly serious problem. In one recent study from Norton Labs, the number of devices with spyware apps in the United States increased by 63% between September 2020 and May 2021. A similar report from Avast in the United Kingdom recorded a stunning 93% increase in the use of spyware apps over a similar period.

If you want to know if your device has been infected by one of these apps, you should check your privacy dashboard and the listing of all apps in settings, the research team says.

“This is a real-life problem and we want to raise awareness for everyone, from victims to the research community,” said Enze Liu, the first author of the paper No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps and a computer science Ph.D. student at the University of California San Diego.

Liu and the research team will present their work at the Privacy Enhancing Technologies Symposium in summer 2023 in Zurich, Switzerland.

Researchers performed an in-depth technical analysis of 14 leading spyware apps for Android phones. While Google does not permit the sale of such apps on its Google Play app store, Android phones commonly allow such invasive apps to be downloaded separately via the Web. The iPhone, in comparison, does not allow such “side loading” and thus consumer spyware apps on this platform tend to be far more limited and less invasive in capabilities.

This is What Happens When Your Phone is Spying on You (5)

What are spyware apps?

Spyware apps surreptitiously run on a device, most often without the device owner’s awareness. They collect a range of sensitive information such as location, texts and calls, as well as audio and video. Some apps can even stream live audio and video. All this information is delivered to an abuser via an online spyware portal.

Spyware apps are marketed directly to the general public and are relatively cheap–typically between $30 and $100 per month. They are easy to install on a smartphone and require no specialized knowledge to deploy or operate. But users need to have temporary physical access to their target’s device and the ability to install apps that are not in the pre-approved app stores.

This is What Happens When Your Phone is Spying on You (6)

How do spyware apps gather data?

Researchers found that spyware apps use a wide range of techniques to surreptitiously record data. For example, one app uses an invisible browser that can stream live video from the device’s camera to a spyware server. Apps also are able to record phone calls via the device’s microphone, sometimes activating the speaker function in hopes of capturing what interlocutors are saying as well.

Several apps also exploit accessibility features on smartphones, designed to read what appears on the screen for vision-impaired users. On Android, these features effectively allow spyware to record keystrokes, for example.

Researchers also found several methods the apps use to hide on the target’s device.

For example, apps can specify that they do not appear in the launch bar when they initially open. App icons also masquerade as “Wi-Fi” or “Internet Service.”

Four of the spyware apps accept commands via SMS messages. Two of the apps the researchers analyzed didn’t check whether the text message came from their client and executed the commands anyway. One app could even execute a command that could remotely wipe the victim’s phone.

Gaps in data security

Researchers also investigated how seriously spyware apps protected the sensitive user data they collected. The short answer is: not very seriously. Several spyware apps use unencrypted communication channels to transmit the data they collect, such as photos, texts and location. Only four out of the 14 the researchers studied did this. That data also includes login credentials of the person who bought the app. All this information could be easily harvested by someone else over WiFi.

In a majority of the applications the researchers analyzed, the same data is stored in public URLs accessible to anyone with the link. In addition, in some cases, user data is stored in predictable URLs that make it possible to access data across several accounts by simply switching out a few characters in the URLs. In one instance, the researchers identified an authentication weakness in one leading spyware service that would allow all the data for every account to be accessed by any party.

Moreover, many of these apps retain sensitive data without a customer contract or after a customer has stopped using them. Four out of the 14 apps studied don’t delete data from the spyware servers even if the user deleted their account or the app’s license expired. One app captures data from the victim during a free trial period, but only makes it available to the abuser after they paid for a subscription. And if the abuser doesn’t get a subscription, the app keeps the data anyway.

How to counter spyware

“Our recommendation is that Android should enforce stricter requirements on what apps can hide icons,” researchers write. “Most apps that run on Android phones should be required to have an icon that would appear in the launch bar.”

Researchers also found that many spyware apps resisted attempts to uninstall them. Some also automatically restarted themselves after being stopped by the Android system or after device reboots. “We recommend adding a dashboard for monitoring apps that will automatically start themselves,” the researchers write.

To counter spyware, Android devices use various methods, including a visible indicator to the user that can’t be dismissed while an app is using the microphone or camera. But these methods can fail for various reasons. For example, legitimate uses of the device can also trigger the indicator for the microphone or camera.

“Instead, we recommend that all actions to access sensitive data be added to the privacy dashboard and that users should be periodically notified of the existence of apps with an excessive number of permissions,” the researchers write.

Disclosures, safeguards and next steps

Researchers disclosed all their findings to all the affected app vendors. No one replied to the disclosures by the paper’s publication date.

In order to avoid abuse of the code they developed, the researchers will only make their work available upon request to users that can demonstrate they have a legitimate use for it.

Future work will continue at New York University, in the group of associate professor Damon McCoy, who is a UC San Diego Ph.D. alumnus. Many spyware apps seem to be developed in China and Brazil, so further study of the supply chain that allows them to be installed outside of these countries is needed.

“All of these challenges highlight the need for a more creative, diverse and comprehensive set of interventions from industry, government and the research community,” the researchers write. “While technical defenses can be part of the solution, the problem scope is much bigger. A broader range of measures should be considered, including payment interventions from companies such as Visa and Paypal, regular crackdowns from the government, and further law enforcement action may also be necessary to prevent surveillance from becoming a consumer commodity.”

The work was funded in part by the National Science Foundation and had operational support from the UC San Diego Center for Networked Systems.

No Privacy Among Spies: Assessing the Functionality and INsecurity of Consumer Android Spyware Apps

UC San Diego: Enze Liu, Sumanth Rao, Grant Ho, Stefan Savage and Geoffrey M. Voelker
Cornell Tech: Sam Havron
New York University: Damon McCoy

This is What Happens When Your Phone is Spying on You (2024)

FAQs

What happens when your phone is being monitored? ›

If a mobile phone is tapped, spyware records your conversations and activities and transmits them to a third party, working constantly in the background to monitor your activity. This leaves a footprint in the form of increased battery usage and a phone whose battery drains faster.

What is the code to know if someone is spying on your phone? ›

Code to show unknown connections and tracking (for Android): *#*#4636#*#* or *#*#197328640#*#* Code to show unknown connections and if someone is tracing you (for iPhone): *3001#12345#*

How do you know if someone is spying on your cell phone? ›

If your phone shows signs of activity, such as the screen lighting up, apps opening or closing, or the device making sounds while it's supposed to be in standby mode, it may be under someone else's control. Your camera being remotely tapped into is potentially an even worse privacy invasion.

Can someone watch you through your phone without you knowing? ›

You might keep your cell phone safe and locked with a PIN code, a fingerprint, facial recognition, etc. But is that enough? Sadly, there is a way someone can spy on your phone without ever touching it. It's called spyware and has many ways to get inside your mobile device.

Can I stop my phone from being monitored? ›

If you want to stop phone tracking, you can change your phone settings, switch to a private browser, configure your app permissions more carefully, or use a VPN. We'll dive into those methods below. For now, install AVG Secureline VPN to encrypt your connection and help stop your phone from being tracked.

Can someone see exactly what your doing on your phone? ›

There is a way someone can monitor your mobile phone without ever touching the actual device. Spyware (a portmanteau of 'spying software) and stalkerware can be installed on a phone without the owner's knowledge, allowing an attacker to steal information, track activity, and more.

How do I block someone from monitoring my phone? ›

What can I do to prevent my phone from being tracked?
  1. Use strong antivirus software. ...
  2. Use a VPN. ...
  3. Don't use a public WiFi network. ...
  4. Turn off location settings for certain apps. ...
  5. Check your Google account. ...
  6. Use a strong password. ...
  7. Enable biometrics and 2-factor authentication. ...
  8. Keep your phone updated.

Does *#21 tell you if your phone is tapped? ›

You can find out if your phone has been tapped using unconditional data forwarding with the help of MMI codes. On GSM networks, dial *#21# to list, and ##21# to clear your unconditional data forwarding settings. CDMA network customers can view and modify these settings too by dialing **21*.

Can you remove a hacker from your phone? ›

To remove a hacker from your phone, you need to update software and apps, carefully review permissions and account settings, and delete all suspicious apps, files, and downloads.

How do I know if my phone is synced to another device? ›

Look for a list of connected devices, such as Bluetooth devices or Wi-Fi networks, and make sure you recognize all of them. Check your accounts: If you have accounts connected to your phone, such as a Google or iCloud account, you can check to see if any other devices are syncing with those accounts.

What is the 3 digit number to see if your phone is tapped? ›

What is the 3-digit number to see if your phone is tapped? The three digits to see if your phone is tapped are 002. Specifically, you need to first dial *#062# or *#21# to check if your calls are being intercepted in any way – i.e., either redirected or diverted.

Can someone access my phone remotely? ›

When someone is remotely accessing your device, they leave cyber footprints. These can be reverse engineered to locate the source of the threat. Monitor the applications running in the background of your device and check whether there are any unknown applications.

Is my phone being watched by someone else? ›

New apps that appear without your knowledge, strange messages or notifications, and a slower-running device are also potential signs. Overheating, increased data usage, unusual noises during calls, and difficulties in shutting down the phone could also indicate tracking.

Can someone spy on your phone through WiFi? ›

A hacker can even hack into your phone over Wi-Fi and listen to your private conversations. They can basically monitor all of your unencrypted traffic. There are many warning signs of a Wi-Fi hack that you can watch for. Gaining access to your home network can be as simple as a hacker guessing a password.

What code do I use to check if my phone is being tracked? ›

*#21# ➡️ To Check if the Phone is Being Tacked or Tapped

For added security, dialing *#21# on some Android phones will display whether your device microphone is enabled and if any applications currently hold the “RECORD_AUDIO” permission, which could potentially mean your conversations are being recorded unlawfully.

Can you tell if your phone is being mirrored? ›

If your phone battery discharges faster than usual, this could be a sign of someone mirroring your device. Increased phone data usage. Mirroring malware and spyware communicate with a hacker's device, leading to a spike in cellular data usage. Call noises.

Is My phone hacked or monitored? ›

If your device is quick to heat up, it might be due to malicious activity. If apps you haven't downloaded suddenly appear on your screen, or if outgoing calls you don't remember making pop up on your phone bill, that is a definite red flag and a potential sign that your device has been hacked.

Top Articles
Here is Why Billiards is One of the Most Popular US Activities
Increase Browser Cache Size
Tattoo Shops Lansing Il
Global Foods Trading GmbH, Biebesheim a. Rhein
Caesars Rewards Loyalty Program Review [Previously Total Rewards]
No Limit Telegram Channel
Obor Guide Osrs
P2P4U Net Soccer
Mustangps.instructure
Rochester Ny Missed Connections
Mikayla Campinos Videos: A Deep Dive Into The Rising Star
Missing 2023 Showtimes Near Landmark Cinemas Peoria
What Is A Good Estimate For 380 Of 60
Flights To Frankfort Kentucky
Luna Lola: The Moon Wolf book by Park Kara
Scenes from Paradise: Where to Visit Filming Locations Around the World - Paradise
60 X 60 Christmas Tablecloths
CVS Near Me | Columbus, NE
Hobby Stores Near Me Now
Daytonaskipthegames
The BEST Soft and Chewy Sugar Cookie Recipe
Sussyclassroom
Shreveport City Warrants Lookup
Apartments / Housing For Rent near Lake Placid, FL - craigslist
Gs Dental Associates
1145 Barnett Drive
Lovindabooty
Wrights Camper & Auto Sales Llc
The Goonies Showtimes Near Marcus Rosemount Cinema
Viduthalai Movie Download
Craigslist Auburn Al
The Monitor Recent Obituaries: All Of The Monitor's Recent Obituaries
The Posturepedic Difference | Sealy New Zealand
Fedex Walgreens Pickup Times
Envy Nails Snoqualmie
Royals op zondag - "Een advertentie voor Center Parcs" of wat moeten we denken van de laatste video van prinses Kate?
Nacho Libre Baptized Gif
Devotion Showtimes Near Mjr Universal Grand Cinema 16
2008 DODGE RAM diesel for sale - Gladstone, OR - craigslist
Walgreens Agrees to Pay $106.8M to Resolve Allegations It Billed the Government for Prescriptions Never Dispensed
Three V Plymouth
Sdn Fertitta 2024
Unblocked Games Gun Games
Parent Portal Pat Med
My Eschedule Greatpeople Me
15 Best Places to Visit in the Northeast During Summer
Greatpeople.me Login Schedule
Minterns German Shepherds
SF bay area cars & trucks "chevrolet 50" - craigslist
Pulpo Yonke Houston Tx
San Pedro Sula To Miami Google Flights
The Ultimate Guide To 5 Movierulz. Com: Exploring The World Of Online Movies
Latest Posts
Article information

Author: Twana Towne Ret

Last Updated:

Views: 6712

Rating: 4.3 / 5 (64 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Twana Towne Ret

Birthday: 1994-03-19

Address: Apt. 990 97439 Corwin Motorway, Port Eliseoburgh, NM 99144-2618

Phone: +5958753152963

Job: National Specialist

Hobby: Kayaking, Photography, Skydiving, Embroidery, Leather crafting, Orienteering, Cooking

Introduction: My name is Twana Towne Ret, I am a famous, talented, joyous, perfect, powerful, inquisitive, lovely person who loves writing and wants to share my knowledge and understanding with you.