The Federal Trade Commission (FTC) has released an article warning consumers of “stalking apps”—spyware that secretly monitors smartphones. These apps can share information like call history, text messages, photos, GPS locations, and browser history without the user's knowledge. Although this can be a useful tool, stalking apps can also be used maliciously.
Smartphone users who suspect an illegitimate stalking app on their device should consider the following steps:
* Use a rootchecker app to see if the phone is “jailbroken” or modified to allow unrestricted access to the entire file system.
* Get a new device or remove the stalking app by factory resetting the smartphone and reinstalling the manufacturer’s operating system.
* Get help. Law enforcement can determine if spyware is on your phone.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages individuals to review [FTC’s article](<https://www.consumer.ftc.gov/blog/2019/10/stalking-apps-retina-x-settles-charges>) and CISA’s Tip on [Privacy and Mobile Device Apps](<https://www.us-cert.gov/ncas/tips/st19-003>) for more information.
This product is provided subject to this Notification and this [Privacy & Use](<https://www.dhs.gov/privacy-policy>) policy.
**Please share your thoughts.**
We recently updated our anonymous [product survey](<https://www.surveymonkey.com/r/CISA-cyber-survey?product=https://us-cert.cisa.gov/ncas/current-activity/2019/10/23/beware-stalking-apps>); we'd welcome your feedback.
{"id": "CISA:5D97D8EA46BA6324B68083B7C77EB6CB", "type": "cisa", "bulletinFamily": "info", "title": "Beware of Stalking Apps", "description": "The Federal Trade Commission (FTC) has released an article warning consumers of \u201cstalking apps\u201d\u2014spyware that secretly monitors smartphones. These apps can share information like call history, text messages, photos, GPS locations, and browser history without the user's knowledge. Although this can be a useful tool, stalking apps can also be used maliciously.\n\nSmartphone users who suspect an illegitimate stalking app on their device should consider the following steps:\n\n * Use a rootchecker app to see if the phone is \u201cjailbroken\u201d or modified to allow unrestricted access to the entire file system.\n * Get a new device or remove the stalking app by factory resetting the smartphone and reinstalling the manufacturer\u2019s operating system.\n * Get help. Law enforcement can determine if spyware is on your phone.\n\nThe Cybersecurity and Infrastructure Security Agency (CISA) encourages individuals to review [FTC\u2019s article](<https://www.consumer.ftc.gov/blog/2019/10/stalking-apps-retina-x-settles-charges>) and CISA\u2019s Tip on [Privacy and Mobile Device Apps](<https://www.us-cert.gov/ncas/tips/st19-003>) for more information.\n\nThis product is provided subject to this Notification and this [Privacy & Use](<https://www.dhs.gov/privacy-policy>) policy.\n\n**Please share your thoughts.**\n\nWe recently updated our anonymous [product survey](<https://www.surveymonkey.com/r/CISA-cyber-survey?product=https://us-cert.cisa.gov/ncas/current-activity/2019/10/23/beware-stalking-apps>); we'd welcome your feedback.\n", "published": "2019-10-23T00:00:00", "modified": "2019-10-23T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://us-cert.cisa.gov/ncas/current-activity/2019/10/23/beware-stalking-apps", "reporter": "CISA", "references": ["https://www.consumer.ftc.gov/blog/2019/10/stalking-apps-retina-x-settles-charges", "https://www.us-cert.gov/ncas/tips/st19-003"], "cvelist": [], "lastseen": "2021-02-24T18:06:59", "viewCount": 2, "enchantments": {"dependencies": {}, "score": {"value": 1.4, "vector": "NONE"}, "backreferences": {"references": [{"type": "ics", "idList": ["ICSA-20-282-02"]}, {"type": "threatpost", "idList": ["THREATPOST:F7C1C6A7D07F7CFA8DFDD80051147A3B"]}]}, "exploitation": null, "vulnersScore": 1.4}, "wildExploited": false, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"wildexploited": 1647356729, "dependencies": 1647589307, "score": 0}, "_internal": {"wildexploited_cvelist": null}}