{"id":52652,"date":"2024-11-22T06:11:18","date_gmt":"2024-11-22T11:11:18","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=52652"},"modified":"2024-11-22T06:11:18","modified_gmt":"2024-11-22T11:11:18","slug":"airtag-and-stalkerware-protection-on-android","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/airtag-and-stalkerware-protection-on-android\/52652\/","title":{"rendered":"How to protect yourself from Bluetooth stalking and more"},"content":{"rendered":"<p>These days, it\u2019s not just government agencies or private detectives who can spy on you. Tracking has become so easy and cheap that <a href=\"https:\/\/www.theguardian.com\/technology\/2022\/sep\/05\/i-didnt-want-it-anywhere-near-me-how-the-apple-airtag-became-a-gift-to-stalkers\" target=\"_blank\" rel=\"nofollow noopener\">jealous spouses<\/a>, <a href=\"https:\/\/appleinsider.com\/articles\/24\/03\/29\/car-thieves-in-canada-are-using-airtags-to-track-victims-vehicles\" target=\"_blank\" rel=\"nofollow noopener\">car thieves<\/a>, and even overly suspicious employers are doing it. They don\u2019t have to peek around corners, hide in stores, or even get close to their target at all. A smartphone and a Bluetooth tracking beacon \u2014 like an Apple AirTag, Samsung Smart Tag or Chipolo \u2014 will do the job perfectly. According to one of the lawsuits filed against Apple, this method of spying is used in a variety of crimes \u2014 \u00a0from <a href=\"https:\/\/arstechnica.com\/tech-policy\/2023\/10\/apple-airtags-triggered-explosion-of-stalking-reports-nationwide-lawsuit-says\/\" target=\"_blank\" rel=\"nofollow noopener\">stalking ex-partners to planning murders<\/a>.<\/p>\n<p>Luckily for all of us, there\u2019s protection! As part of Kaspersky\u2019s anti-stalking campaign, we\u2019ll explain how you could be tracked and what you can do about it.<\/p>\n<h2>Online and offline tracking<\/h2>\n<p>Surveillance of a victim is typically carried out in one of two ways.<\/p>\n<p><strong>Method one: purely software-based.<\/strong> A commercial tracking app is installed on the victim\u2019s smartphone \u2014 we call this category of apps <a href=\"https:\/\/www.kaspersky.com\/blog\/stalkerware-spouseware\/26292\/\" target=\"_blank\" rel=\"noopener nofollow\">stalkerware or spouseware<\/a>. Such apps are often marketed as \u201cparental control apps\u201d, but they differ from legitimate parental controls because the app\u2019s activity is kept hidden after installation. Most often, the app is entirely invisible on the device, though sometimes it disguises itself as something innocuous, like a messenger, game or photo-gallery app. Stalker apps can repeatedly transmit the victim\u2019s geolocation to a server, send messages and other confidential data from the device to an attacker, and even activate the microphone to record audio.<\/p>\n<p>The main drawback of stalkerware for the attacker is the difficulty of installation\u00a0\u2014 it requires gaining access to the victim\u2019s unlocked smartphone for some time. That\u2019s why, in many cases, especially when it\u2019s an ex-partner or car thief doing the stalking, they use the other method.<\/p>\n<p><strong>Method two: a wireless beacon.<\/strong> A tracking device is planted on the victim. In a car, it might be hidden in an inconspicuous spot, such as behind the license plate; for a person, the tracker could be slipped into a bag or among other personal items.<\/p>\n<p>Originally, Bluetooth trackers \u2014 small devices about the size of a coin \u2014 were invented to help locate lost belongings such as keys, wallets or luggage. However, if planted on a target, their movements can be tracked in near real-time using a special app. Incidentally, many of today\u2019s Bluetooth headphones also have built-in tracking functionality to make them easier to find \u2014 and these too can be used for stalking. So, if you happen to find a pair of fancy headphones lying around, don\u2019t start thinking it\u2019s your lucky day \u2014 they may have been deliberately planted in order to track your movements, even after you pair them with your own smartphone.<\/p>\n<p>Tracking technology works even if the beacon is well beyond the Bluetooth range of the stalker\u2019s smartphone: other smartphones help locate the \u201clost\u201d item. Many of the latest Android and iOS devices report the location of nearby visible beacons to the central servers of Google or Apple. As a result, these tech giants are able to locate any beacon if there\u2019s any modern Bluetooth-enabled smartphone with internet access nearby.<\/p>\n<p>The most popular beacon is still the Apple AirTag, and Apple has gone to a lot of trouble since the first product launch to protect users from malicious use of the tracker. The latest AirTags start beeping to attract attention if they remain away from their owner\u2019s smartphone for too long. However, attackers can easily bypass this protection by damaging the speaker on the tracker. Such hacked tags with disabled speakers can even by bought \u2014 easily.<\/p>\n<h2>How to protect yourself from surveillance<\/h2>\n<p>To safeguard yourself from both online and offline tracking, we recommend using <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky for Android<\/a>. This tool now includes the \u201cWho\u2019s spying on me\u201d feature, which allows you to quickly detect surveillance.<\/p>\n<p><strong>Protection against tracking beacons.<\/strong> Fortunately, by their very nature, trackers can never be completely invisible, as they\u2019re constantly signaling their presence via Bluetooth. A smartphone equipped with <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">reliable protection<\/a>\u00a0can alert the user if an unregistered Bluetooth device is frequently detected nearby or in various different locations. If such a device moves around with you or stays close for too long, <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky for Android<\/a>\u00a0will notify you.<\/p>\n<p>Upon discovering a tracker, it\u2019s essential to examine it closely. Sometimes, the situation may be innocent, such as if a family member you spend a lot of time with has a tracker attached to their keys. Occasionally, there may be trackers on rental vehicles or laptops (although rental companies are required to notify users and include this in the contract).<\/p>\n<p><strong>Protection against stalkerware.<\/strong> <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a>\u00a0detects known stalkerware apps. Oh, and by the way \u2014 did you know that Kaspersky products <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/kaspersky-continues-to-provide-best-protection-against-stalkerware\" target=\"_blank\" rel=\"noopener nofollow\">won a stalkerware detection<\/a> test? If such apps \u2014 or even their installation files, whether downloaded by you or someone else \u2014 are found on your device, <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky for Android<\/a>\u00a0will <a href=\"https:\/\/www.cnet.com\/tech\/mobile\/kaspersky-lab-will-warn-you-if-your-phone-is-infected-with-stalkerware\/\" target=\"_blank\" rel=\"nofollow noopener\">alert you immediately<\/a>.<\/p>\n<div id=\"attachment_52657\" style=\"width: 2170px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/11\/22032727\/airtag-and-stalkerware-protection-on-android-01-EN.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-52657\" class=\"size-full wp-image-52657\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/11\/22032727\/airtag-and-stalkerware-protection-on-android-01-EN.png\" alt=\"Kaspersky for Android detects both installed stalkerware apps (on the right) and their installation files (on the left)\" width=\"2160\" height=\"2412\"><\/a><p id=\"caption-attachment-52657\" class=\"wp-caption-text\">Kaspersky for Android detects both installed stalkerware apps (on the right) and their installation files (on the left)<\/p><\/div>\n<p>Even users of the free version of <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky for Android<\/a> can scan for stalkerware. The only difference in this case between <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a>\u00a0and the free version is that in <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a>, scanning is done automatically and continuously. In the free version of <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky for Android<\/a>, users need to manually initiate each scan.<\/p>\n<p>Suspicious beacons that appear frequently in your vicinity will be listed and labeled in the Device Scanner section.<\/p>\n<div id=\"attachment_52656\" style=\"width: 4330px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/11\/22032556\/airtag-and-stalkerware-protection-on-android-02-EN.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-52656\" class=\"size-full wp-image-52656\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/11\/22032556\/airtag-and-stalkerware-protection-on-android-02-EN.png\" alt=\"Kaspersky for Android warns you about spy trackers and provides guidance on what to do\" width=\"4320\" height=\"2412\"><\/a><p id=\"caption-attachment-52656\" class=\"wp-caption-text\">Kaspersky for Android warns you about spy trackers and provides guidance on what to do<\/p><\/div>\n<p>Meanwhile, the permission-control feature regularly checks the access of apps to your camera, microphone, location and Bluetooth, so you can quickly identify suspicious new apps.<\/p>\n<p><strong>Additional precautions <\/strong>Several general security and cyber-hygiene measures can make it harder for anyone to track you, and are recommended for all users:<\/p>\n<ul>\n<li>Never leave personal items unattended. This applies especially to digital devices that are powered on.<\/li>\n<li>Set up <a href=\"https:\/\/www.kaspersky.com\/blog\/types-of-two-factor-authentication\/48446\/#:~:text=Biometrics%3A%20fingerprint%2C%20face%20or%20voice\" target=\"_blank\" rel=\"noopener nofollow\">biometric authentication<\/a> on your smartphone.<\/li>\n<li>Set the auto-lock screen time to 30 seconds or less.<\/li>\n<li>Set up biometrics or a <a href=\"https:\/\/www.kaspersky.com\/blog\/password-can-be-hacked-in-one-hour\/51469\/\" target=\"_blank\" rel=\"noopener nofollow\">strong password<\/a> for logging into your laptop, and always lock the screen if you leave your desk.<\/li>\n<li>Make a password necessary to install apps from the app store (you can do this on both iOS and Android).<\/li>\n<li>Disable the <a href=\"https:\/\/www.kaspersky.com\/blog\/unknown-apps-android\/41656\/\" target=\"_blank\" rel=\"noopener nofollow\">installation of apps from unknown sources<\/a> on Android.<\/li>\n<li>Update all your apps at least once a month and delete any that you no longer use.<\/li>\n<li>Never share your passwords with anyone. If you\u2019ve ever shared them with anyone, or you suspect they may have been intercepted, seen or guessed \u2014 change them immediately.<\/li>\n<li>Avoid logging into personal accounts on shared devices at home or at work, and certainly don\u2019t do this in libraries, hotels or cafes. If you absolutely have to log in, make sure to log out afterwards.<\/li>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">password manager<\/a>, create a unique password for each account, and enable <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-two-factor-authentication\/48289\/\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication<\/a>.<\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/doxing-methods\/39651\/\" target=\"_blank\" rel=\"noopener nofollow\">Be careful with what you share on social media and in messengers<\/a> \u2014 avoid disclosing details that reveal your location, daily routine, or social circle.<\/li>\n<\/ul>\n<p>For individuals at higher risk of stalking (say, from an unwanted admirer, disaffected spouse or business partner), here is a <a href=\"https:\/\/kas.pr\/q1a8\" target=\"_blank\" rel=\"noopener\"><strong>more comprehensive list of precautions<\/strong><\/a>, including physical safety and legal protection measures.<\/p>\n<h2>What to do if you detect surveillance<\/h2>\n<p>If you\u2019ve discovered a beacon or tracking app and ruled out any innocent explanations, consider the possible reasons for why you might be under surveillance.<\/p>\n<p>For those involved in domestic violence or serious conflicts, physical safety is the priority. Therefore, in such cases, it\u2019s important not to reveal that you\u2019ve detected the surveillance, but instead contact the police or dedicated support organizations. Likewise, it\u2019s essential that the smartphone or beacon doesn\u2019t end up in a location that would indicate the discovery (for example, a police station). You can either leave the smartphone at home while you go to the police, or arrange to meet a support group in a safe place. For more detailed advice on such tricky cases, consult our <a href=\"https:\/\/kas.pr\/q1a8\" target=\"_blank\" rel=\"noopener\">anti-stalking awareness guide<\/a>.<\/p>\n<p>If the risk of violence is low, you should still contact the police. Hand over the spy tracker, and let law enforcement create a digital copy of your smartphone to gather evidence of infection (if present). After that, you can remove the stalkerware from your smartphone.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-3\">\n","protected":false},"excerpt":{"rendered":"<p>A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.<\/p>\n","protected":false},"author":2706,"featured_media":52653,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[4298,105,14,4656,2534,22,4452,43,3181,4299,422,812],"class_list":{"0":"post-52652","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-airtag","9":"tag-android","10":"tag-apple","11":"tag-find-my","12":"tag-geolocation","13":"tag-google","14":"tag-location","15":"tag-privacy","16":"tag-stalkerware","17":"tag-stalking","18":"tag-threats","19":"tag-tracking"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/airtag-and-stalkerware-protection-on-android\/52652\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/airtag-and-stalkerware-protection-on-android\/28323\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/airtag-and-stalkerware-protection-on-android\/23574\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/airtag-and-stalkerware-protection-on-android\/28453\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/airtag-and-stalkerware-protection-on-android\/27831\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/airtag-and-stalkerware-protection-on-android\/30589\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/airtag-and-stalkerware-protection-on-android\/29343\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/airtag-and-stalkerware-protection-on-android\/38632\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/airtag-and-stalkerware-protection-on-android\/13007\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/airtag-and-stalkerware-protection-on-android\/22411\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/airtag-and-stalkerware-protection-on-android\/23161\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/airtag-and-stalkerware-protection-on-android\/28573\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/airtag-and-stalkerware-protection-on-android\/34408\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/airtag-and-stalkerware-protection-on-android\/34032\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/52652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=52652"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/52652\/revisions"}],"predecessor-version":[{"id":52658,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/52652\/revisions\/52658"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/52653"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=52652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=52652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=52652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}