{"id":26292,"date":"2019-04-03T10:42:06","date_gmt":"2019-04-03T14:42:06","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=26292"},"modified":"2022-10-18T08:04:27","modified_gmt":"2022-10-18T12:04:27","slug":"stalkerware-spouseware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/stalkerware-spouseware\/26292\/","title":{"rendered":"What&#8217;s wrong with &#8220;legal&#8221; commercial spyware"},"content":{"rendered":"<p>It\u2019s safe to say that almost everyone has wanted to spy on someone at least once in their life, whether to make sure your partner is faithful, your kid has not fallen in with the wrong crowd, or your employee is not being courted by competition. The technologies for spying on colleagues and families are in great demand, which is universally known to breed supply.<\/p>\n<p>The supply is represented by quite an impressive range of so-called legal spyware apps (aka stalkerware or spouseware), which can be installed on your employee\u2019s or family member\u2019s device for a relatively modest fee. These apps stay hidden and keep their users informed about device location, browser history, SMS messages, social media chats, and more. Some of them can even make video and voice recordings.<\/p>\n<h2>Stalkerware\u00a0\u2014 unethical but legal (almost)<\/h2>\n<p>From a moral standpoint, it is not good to use stalkerware: Installed without the owner\u2019s knowledge or consent, it operates in the background and has access to very personal information. Yet such applications are not illegal in many countries, even though spying on family members is legally prosecutable. Developers try to squeeze through legal loopholes, for example, by referring to their products as parental control solutions.<\/p>\n<p>It\u2019s no wonder people continue to buy these technically legal apps, unethical though they may be. Over the past year, more than 58,000 users have detected stalkerware on their phones or tablets with the help of our products alone. Of those, 35,000 had no idea about the stalkerware installed on their devices until our protection solution completed its first scan.<\/p>\n<h3>Stalkerware can leak your data<\/h3>\n<p>Despite its legal status, stalkerware is dangerous indeed. These apps put at risk both the subject and the object of spying. How do such apps pass the collected data to the person who installed them? By uploading it to a server where the user can access it and sift through the catch. So if you decide to spy on an employee suspected of dirty play, all of their incoming and outgoing letters with every confidential document and project detail will end up on that server, including the ones written by you. If you\u2019re keen to learn the secrets of your love interest, your wooing messages, too, will be on the record.<\/p>\n<p>But what\u2019s wrong with that, you being the only person who can view this data? The problem is, you are probably not the only one. The app developer is almost certain to have access to it, too.\u00a0That\u2019s for starters. Worse, this sensitive data may end up in the hands of malefactors or even become publicly available.<\/p>\n<p>In August 2018, a researcher known as L.\u00a0M. <a target=\"_blank\" href=\"https:\/\/motherboard.vice.com\/en_us\/article\/mb4y5x\/thetruthspy-spyware-domestic-abusers-hacked-data-breach\" rel=\"noopener noreferrer nofollow\">discovered a vulnerability<\/a> in the Android app TheTruthSpy, which was sending login and password data without encryption. The hacker took advantage of it to get hold of photos, voice recordings, messages, and location data from 10,000 devices controlled using the spyware.<\/p>\n<p>In March 2019, another researcher, Cian Heasley, discovered a whole MobiiSpy server was <a target=\"_blank\" href=\"https:\/\/motherboard.vice.com\/en_us\/article\/j573k3\/spyware-data-leak-pictures-audio-recordings\" rel=\"noopener noreferrer nofollow\">publicly available<\/a>. It held more than 95,000 photos, including intimate ones, and more than 25,000 voice recordings. MobiiSpy\u2019s hosting provider, Codero, responded to the incident by <a target=\"_blank\" href=\"https:\/\/motherboard.vice.com\/en_us\/article\/7xnybe\/hosting-provider-takes-down-spyware-mobiispy\" rel=\"noopener noreferrer nofollow\">blocking the resource<\/a>.<\/p>\n<p>According to Motherboard, a total of 12\u00a0stalkerware developers have <a target=\"_blank\" href=\"https:\/\/motherboard.vice.com\/en_us\/article\/j573k3\/spyware-data-leak-pictures-audio-recordings\" rel=\"noopener noreferrer nofollow\">leaked data<\/a> over the past two years. That means by installing such an app on someone\u2019s device, you are almost certain to compromise both them and yourself.<\/p>\n<h3>Stalkerware\u00a0breaches device protection<\/h3>\n<p>Even the stalkerware installation process is not safe. First, most of these apps fail to comply with the policies of official stores such as Google Play, so you will not find them featured. That means, in the case of an Android device, you have to consent to installing third-party apps \u2014which, in turn, opens the door to hosts of malware.<\/p>\n<p>Second, stalkerware often claims lots of system rights, even down to <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/android-root-faq\/17135\/\" rel=\"noopener noreferrer nofollow\">root access<\/a>, which puts the app in full control of the gadget\u00a0\u2014 in particular, giving it the right to install other apps.<\/p>\n<p>Moreover, some spying apps insist that protection solutions be deactivated \u2014 or they simply get rid of them, if authorized to do so.<\/p>\n<p>That is where stalkerware is different from legal parental control apps, which do not try to hide themselves on the device, or deactivate the antivirus, and they can be found in official marketplaces. That\u2019s why parental control apps, unlike stalkerware, do not pose a threat to their users.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n<h3>Protecting yourself from legal stalkerware<\/h3>\n<p>As you can see, it\u2019s best to think twice before installing stalkerware on someone else\u2019s gadgets. We also advise following these tips to make certain that nobody can plant a \u201cgift\u201d like that on your own device:<\/p>\n<ul>\n<li>Protect your gadgets with a reliable password and never disclose it to anyone, even family members.<\/li>\n<li>Block installation of third-party apps. This will protect you against both stalkerware and real malware.<\/li>\n<li>Check applications installed on your telephone at regular intervals and <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/secret-life-of-apps\/14237\/\" rel=\"noopener noreferrer nofollow\">delete those you don\u2019t need<\/a>. That will also free up memory space and reduce paid traffic.<\/li>\n<li>Use reliable protection. Even though stalkerware is considered legal in some countries and is not identified as malware per se, many antivirus products detect it and alert users about it \u2014 they refer to it as <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/not-a-virus\/18015\/\" rel=\"noopener noreferrer nofollow\">not-a-virus<\/a>, a class of threats you should not ignore.<\/li>\n<\/ul>\n<p>If you use , you no longer have to sort out threat classes and names. We don\u2019t think it\u2019s right to refer to stalkerware as not-a-virus without explanation, because that may not give the users a good sense of how dangerous it is. That\u2019s why we developed our all-new Privacy Alert function, which notifies users about such issues and explains the potential dangers. Once your update is installed, here\u2019s what you\u2019ll see:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/04\/03103957\/stalkerware-kisa-privacy-alert-screenshot.jpg\"><img decoding=\"async\" width=\"1080\" height=\"2220\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/04\/03103957\/stalkerware-kisa-privacy-alert-screenshot.jpg\" alt=\"\" style=\"width:360px\" class=\"aligncenter size-full wp-image-26293\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Commercial spying apps\u00a0\u2014 stalkerware\u00a0\u2014 are not malware in the proper sense of the term, but it\u2019s better to avoid using them anyway.<\/p>\n","protected":false},"author":2484,"featured_media":26294,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788],"tags":[43,3182,3183,715,714,3181],"class_list":{"0":"post-26292","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"tag-privacy","9":"tag-spouseware","10":"tag-spy-software","11":"tag-spying","12":"tag-spyware","13":"tag-stalkerware"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/stalkerware-spouseware\/26292\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/stalkerware-spouseware\/15556\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/stalkerware-spouseware\/13100\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/stalkerware-spouseware\/17477\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/stalkerware-spouseware\/15625\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/stalkerware-spouseware\/14306\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/stalkerware-spouseware\/18179\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/stalkerware-spouseware\/17130\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/stalkerware-spouseware\/22548\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/stalkerware-spouseware\/5843\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/stalkerware-spouseware\/11586\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/stalkerware-spouseware\/11636\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/stalkerware-spouseware\/10579\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/stalkerware-spouseware\/18949\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/stalkerware-spouseware\/22985\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/stalkerware-spouseware\/18211\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/stalkerware-spouseware\/22408\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/stalkerware-spouseware\/22344\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/privacy\/","name":"privacy"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/26292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=26292"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/26292\/revisions"}],"predecessor-version":[{"id":45859,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/26292\/revisions\/45859"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/26294"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=26292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=26292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=26292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}