- 416
- 18
Android: Step-by-Step Guide to Finding Spyware
The architecture of Android, which contains a mix of open-source and closed-source software, makes this platform somewhat more vulnerable to spyware but also provides users with more tools for diagnostics and control.Step 1: Review Installed Applications
Start by analyzing all installed programs. Path: "Settings" → "Apps" → "All Apps". What to look for:
- Applications without icons or with generic Android icons
- Programs with suspicious names: Service, Update, Antivirus, Framework, System
- Applications that you definitely did not install
- System applications with unusual names
- Programs with vague descriptions or none at all
Step 2: Analyze
Critical Permissions Pay special attention to applications with extended permissions. Check the "Settings" → "Special Access" section:
- Accessibility - allows reading all screen content and intercepting touches
- Notification access - enables reading all incoming notifications, including OTP codes
- Overlay permission - can hide or replace the interface of other applications
- Device administrators - provides system rights to manage the device
- Usage data access - allows monitoring user activity
Step 3: Monitor Resource Consumption
Analyze system resource usage statistics; this can help indirectly identify anomalies:
Battery Usage:
- "Settings" → "Battery" → "Battery Usage"
- Look for applications with abnormally high consumption
- Pay attention to background activity
- "Settings" → "Network & Internet" → "Data Usage"
- Analyze the volume of data transmitted by applications
- Pay special attention to unknown processes with high traffic
- Enable developer mode
- "For Developers" → "Process Statistics"
- Look for processes with high activity and unknown names.
iOS: Diagnostics
Despite its reputation as the most secure mobile OS, iPhones can also fall victim to spyware - most notably highlighted by the Pegasus scandal in 2021, which somewhat undermined trust in iOS's cybersecurity. The methods of infection and diagnosis here differ significantly from Android. iOS has a closed architecture and strict control over the software downloaded from the App Store, so traditional methods of distributing malware don't work here. Attackers use more sophisticated approaches. The most common method of attack on iOS is the exploitation of zero-day vulnerabilities. Attackers exploit unpatched system vulnerabilities through Wi-Fi or web content to launch malware. Such attacks are not accessible to script kiddies and require support from command-and-control (C&C) servers. One common scenario for spying on iPhones is phishing through iMessage, SMS, email or other messengers, where the user may receive links to a malicious site offering to install a Mobile Device Management (MDM) profile.iPhone: Step-by-Step Guide to Finding Spyware
Check Configuration Profiles:The most common loophole for cybercriminals is the installation of malicious MDM profiles. Path: "Settings" → "General" → "VPN & Device Management". What to look for:
- Any unknown configuration profiles
- Profiles with suspicious names or from unknown organizations
- Certificates that you didn't intentionally install
"Settings" → "General" → "About" → "Trusted Certificates". Remove any suspicious certificates, especially from unknown certificate authorities.
Monitor Screen Time and Activity Path:
"Settings" → "Screen Time" → "See All Activity". Pay attention to unknown applications in the statistics; look for abnormal background activity and applications running in the background without your knowledge.
Check Analytics Data Path:
"Settings" → "Privacy & Security" → "Analytics & Improvements" → "Analytics Data". Look for records of crashes from unknown processes or applications with suspicious names. The presence of an MDM profile may manifest as restrictions on actions, changes in settings, sudden appearances of new policies or messages about a "managed device".
Review Installation History Path:
"App Store" → "Profile" → "Purchased". Check all previously installed applications. Remove any unknown programs from the history. For non-jailbroken devices, it's recommended to check the "VPN" and "Profiles & Device Management" sections - it's crucial to promptly remove any unknown profiles or trusted certificates from unofficial sources.
What to Do If You Discover Suspicious Activity on Your Smartphone
If you notice suspicious activity, act quickly but thoughtfully. An incorrect response can lead to the loss of evidence or further data leaks, exacerbating the problem. In the first few minutes after discovering the issue, enable airplane mode, which disables Wi-Fi, Bluetooth and mobile data transmission. Experts don't recommend turning off or rebooting the device. The next step is to document the evidence. Take screenshots of suspicious applications and their permissions, as well as resource consumption statistics. It’s also wise to note the names of suspicious processes and, if the system allows, save logs. Finally, consider securing your accounts. Change the passwords for all critical services (banking, email, social media) from another device and enable two-factor authentication if it's not already active. Check and terminate any suspicious active sessions in applications. Lastly, revoke access for suspicious applications in your account settings.Checking Legal Applications with Monitoring Features
Another threat comes from entirely legal applications whose functionality can be used for covert surveillance. This includes parental control programs, anti-theft software, corporate monitoring systems and remote management tools. If you suspect that an application is being used against you on your smartphone, it's worth checking it.- Check battery and traffic usage statistics.
- Determine what data the application collects.
- Ensure that you installed the application yourself.
- Review the data collection configuration within the application.
- Deactivate the application and see if the suspicious symptoms disappear.
- Camera and microphone
- Geolocation and location data
- Contacts and phone book
- SMS and call logs
- Files and photos
- Calendar and notes