Security

Detecting spyware on your phone: Android and iPhone

## Who this guide is for

Detecting spyware on your phone: Android and iPhone

Detecting spyware on your phone

Who this guide is for

This guide is for people who suspect their phone may be monitored and want a structured first check before taking irreversible action.

It fits especially:

  • readers noticing unusual phone behavior and wanting to investigate before resetting
  • stalking, coercion, or relationship-surveillance situations where evidence may matter
  • anyone who wants to separate warning signs from proof before acting

What you gain, and what it costs

If you work through the checks here, you usually gain:

  • a better sense of whether there are real indicators of monitoring
  • a safer sequence for checking a device before erasing it
  • a better chance of preserving useful evidence if the situation escalates

What it costs:

  • time and emotional energy
  • the possibility that you find ambiguity rather than certainty
  • the discipline not to jump straight to a factory reset if preserving evidence matters

When this is overkill

If you just want a clean device and there is no legal, safety, or evidence concern, a full reset may still be the simplest answer. Not every case needs a quasi-forensic process.

If you are in a high-risk stalking or domestic-abuse situation, this guide is not enough by itself. Then the order of operations matters as much as the technical checks.

You suspect your phone is being monitored. What do you do?

The most aggressive option — a factory reset — effectively removes spyware, but also destroys forensic evidence that may be important later. And it’s irreversible. Before taking that step, there are concrete checks to see what’s actually on your device.

Important for stalking and domestic violence situations: If your safety is at risk, consult a domestic violence helpline or the police before taking action. A factory reset can destroy forensic evidence needed for a police report.


Signs that suggest monitoring

These are indicators — not proof on their own, but together they’re reason to investigate further:

  • Battery draining faster than usual without a clear reason
  • Phone getting warm while you’re not actively using it
  • Data usage higher than expected (check per app)
  • Phone has become slower without an update or new apps
  • Screen lighting up, or you hear clicks, while the phone is idle
  • Apps installed that you don’t recognise
  • Someone knows things you only had on your phone

Android: how to check your phone

Step 1 — View data usage per app

Go to Settings → Network → Data usage (exact path varies by manufacturer).

Look for apps consuming unusually large amounts of data while you’re not using them. A background app sending hundreds of megabytes per week is a red flag.

Step 2 — Privacy Dashboard

Android 12 and higher has a Privacy Dashboard:

Settings → Privacy → Privacy Dashboard

This shows a 24-hour timeline: which app accessed your camera, microphone, location, and contacts, and when. Go through the list:

  • Do you see an app that used your microphone or camera while you didn’t have it open?
  • Do you see an app that requested location in the middle of the night?

Tap the app for details.

Step 3 — Check permissions per app

Settings → Apps → [app name] → Permissions

Or view it in reverse: Settings → Privacy → Permission manager — shows per category (microphone, location, camera) which apps have access.

Revoke permissions from apps that have no legitimate reason to have them.

Step 4 — Apps with device administrator rights

Some spyware installs itself as a device administrator — this gives it extended permissions and makes it harder to remove.

Settings → Security → Device admin apps (or Device administrator)

Don’t recognise an app listed here? That’s a problem. Revoke the rights and uninstall the app.

Step 5 — Unknown apps

Settings → Apps → Show all apps

Scroll through the full list. Do you recognise everything? Apps with generic names (“System Service”, “Phone Helper”) that you didn’t install yourself are suspicious.

Step 6 — Install from unknown sources

Settings → Apps → Special app access → Install unknown apps

If a browser or file manager has permission to install apps that you didn’t grant, software could have been installed via that route.


iPhone (iOS): how to check your phone

Commercial spyware on iPhone (such as Pegasus) typically requires a zero-click exploit — not something anyone can just install. Stalkerware on iPhone is less common but does exist, especially if someone has had physical access to your phone.

Step 1 — App Privacy Report

Settings → Privacy & Security → App Privacy Report → Turn On App Privacy Report

After building up for a few hours, this shows a 7-day log: which app used your location, microphone, camera, or contacts, and when. Look for access that falls outside normal usage times.

Step 2 — Check location access

Settings → Privacy & Security → Location Services

Check which apps have “Always” access. Apps that can continuously read your location are a potential leak — even without active spyware.

Step 3 — Configuration profiles

This is the most direct way to install stalkerware on iPhone. If someone had your phone and installed a configuration profile, they can push apps and certificates.

Settings → General → VPN & Device Management

Do you see a profile here that you don’t recognise or didn’t install yourself? Tap it → remove the profile.

Step 4 — Check iCloud access

If someone knows your Apple ID password, they can see your location, messages (if iCloud sync is on), and photos via iCloud — without any software on the phone.

Settings → [your name] → Find My → Share My Location

Also check: Settings → [your name] → Devices — do you recognise all devices linked to your Apple ID?

Change your Apple ID password and two-factor authentication from a clean device if you’re unsure.

Step 5 — Enable Lockdown Mode (for high-risk situations)

If you suspect you’re a target of advanced spyware (Pegasus-level):

Settings → Privacy & Security → Lockdown Mode → Turn On Lockdown Mode

This significantly reduces the attack surface. See iPhone privacy settings for what Lockdown Mode does.


After the check: what are your options?

If you find nothing suspicious: The signals may have another explanation such as battery wear or a poorly optimized app. Consider strengthening your baseline settings. If you started this check because of stalking or domestic violence, go back to the stalking safety profile for the next steps.

If you find something suspicious:

  • Document what you found (screenshot, note on paper)
  • Remove suspicious apps and revoke permissions
  • Change passwords from a clean device (a device the suspected person has never touched)
  • If the situation involves stalking or domestic violence: consult a helpline before doing a factory reset — a reset destroys forensic evidence

If you want to be certain: A factory reset removes everything including spyware. But prepare first:

  1. Back up your contacts and photos from a safe environment
  2. Consult a helpline or police if making a report is an option
  3. Then reset

Commercial stalkerware vs advanced spyware

Stalkerware (FlexiSpy, mSpy, Hoverwatch): requires physical access to the phone and manual installation. Detectable via the steps above — it’s actually installed as an app, needs permissions.

Advanced spyware (Pegasus, Predator): zero-click exploits, no visible installation, self-deletes. Detection requires forensic analysis with tools like MVT (Mobile Verification Toolkit) from Amnesty Tech. If you suspect you’re a target of state-level surveillance, contact the Access Now Digital Security Helpline — free help for threatened journalists and activists.


Next step

Profiles

Go further