Report on most invasive stalkerware apps

In August 2020, Coalition member Corrata published their research findings on the most invasive stalkerware apps currently available. They conducted this research by downloading the apps and installing them onto a number of test phones.

The key findings of the research were:

  • Call recordings, texts, WhatApp messages, photos, camera access and GPS location were visible to the installer through a separate server
  • Out of 80 URL Categorization Sites tested, only 2.5% detected the websites from which the stalkerware was downloaded as being malicious
  • The stalkerware apps required access to Device Admin Privileges and Accessibility permissions and instructed the installer to disable Google Play Protect
  • The apps alerted the installer when the stalkerware was removed from the device

You can read Corrata’s full report here.

Coalition Against Stalkerware Commends FTC’s Actions Against SpyFone

Yesterday, the Federal Traded Commission (FTC) in the United Sta...

Read more

The Coalition Against Stalkerware launches new technical training

Fulfilling one of the Coalition’s founding missions, the C...

Read more

Coalition Announces New Partners, Activities

Since the Coalition Against Stalkerware was launched less than t...

Read more