Report on most invasive stalkerware apps

In August 2020, Coalition member Corrata published their research findings on the most invasive stalkerware apps currently available. They conducted this research by downloading the apps and installing them onto a number of test phones.

The key findings of the research were:

  • Call recordings, texts, WhatApp messages, photos, camera access and GPS location were visible to the installer through a separate server
  • Out of 80 URL Categorization Sites tested, only 2.5% detected the websites from which the stalkerware was downloaded as being malicious
  • The stalkerware apps required access to Device Admin Privileges and Accessibility permissions and instructed the installer to disable Google Play Protect
  • The apps alerted the installer when the stalkerware was removed from the device

You can read Corrata’s full report here.

Visit TinyCheck’s brand new page – a free, open-source tool for detecting stalkerware on your mobile device

In 2019, as a response to the growing threat of stalkerware, res...

Read more

Annual Kaspersky report on stalkerware highlights the link between online and offline violence

In the third edition of “The State of Stalkerware Report 2021...

Read more

The Coalition Against Stalkerware welcomes the inclusion of cyberstalking and cyber-harassment in the new European Commission’s proposal on combating violence against women and domestic violence

On International Women’s Day (8 March 2022) the European Commi...

Read more