TechCrunch News 02月21日
Your Android phone could have stalkerware — here’s how to remove it
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

安卓用户正面临着消费者级间谍软件的威胁,这些软件能够秘密且持续地监控用户的私人信息、照片、通话和实时位置。本指南旨在帮助安卓用户识别和移除常见的监控应用程序,例如TheTruthSpy、Cocospy和Spyic等。这些间谍软件通常伪装成儿童监控或家庭追踪软件,但实际上被用于跟踪和监控伴侣或配偶,未经对方同意侵犯隐私。指南提供了检查手机是否被入侵的快速方法,并强调了安全计划和信任支持的重要性。同时提醒用户,移除间谍软件可能会暴露自己,因此需要谨慎行事。此外,还介绍了如何通过检查Google Play Protect、辅助功能、通知访问权限和设备管理员选项来识别可疑应用。

🛡️ **启用Google Play Protect**: 确保Google Play Protect已启用,它可以扫描来自Google应用商店和外部来源的应用,检测潜在的恶意活动,这是防止恶意安卓应用的最佳保障措施之一。

🔔 **检查通知访问权限**: 间谍软件可能会滥用通知访问权限来读取用户的消息和其他提醒。在“特殊应用访问权限”下的“通知访问权限”中,检查哪些应用有权访问您的通知,并关闭任何您不认识的应用的访问权限。

⚙️ **审查设备管理员设置**: 设备管理员选项通常被公司用于远程管理员工的手机,但间谍软件也可能滥用这些权限来监视安卓设备。在“安全”设置下查找设备管理员应用设置,警惕任何您不认识的、名称模糊的应用,如“系统服务”或“设备健康”。

📱 **检查已安装的应用列表**: 在安卓设备的应用程序列表中查找您不认识的应用和图标。这些应用可能具有对日历、通话记录、摄像头、联系人和位置数据的广泛访问权限。间谍软件通常采用通用的名称和图标来伪装自己。

Consumer-grade spyware apps that covertly and continually monitor your private messages, photos, phone calls and real-time location are an ongoing problem for Android users.

This guide can help you identify and remove common surveillance apps from your Android phone, including TheTruthSpy, Cocospy and Spyic, among others.

Consumer-grade spyware apps are frequently sold under the guise of child monitoring or family-tracking software, but are referred to as “stalkerware” and “spouseware” for their ability to also track and monitor partners or spouses without their consent. These spyware apps are downloaded from outside of Google Play’s app store, planted on a phone without a person’s permission and often disappear from the home screen to avoid detection.

Stalkerware apps rely on abusing in-built Android features that are typically used by companies to remotely manage their employees’ work phones or use Android’s accessibility mode to snoop on someone’s device.

You may notice your phone acting unusually, running warmer or slower than usual, or using large amounts of network data, even when you are not actively using it.

Checking to see if your Android device is compromised can be done quickly and easily.

It’s important to have a safety plan in place and trusted support if you need it. Keep in mind that removing the spyware from your phone may alert the person who planted it, which could create an unsafe situation. The Coalition Against Stalkerware offers advice and guidance for victims and survivors of stalkerware.

Note that this guide only helps you to identify and remove spyware apps, it does not delete the data that was already collected and uploaded to its servers. Also, some versions of Android may have slightly different menu options. As is standard with any advice, you follow these steps at your own risk.

Make sure Google Play Protect, a security feature in Android phones, is enabled. Image Credits:TechCrunch / Getty Images

Google Play Protect is one of the best safeguards to protect against malicious Android apps by screening apps downloaded from Google’s app store and outside sources for signs of potentially malicious activity. Those protections stop working when Play Protect is switched off. It’s important to ensure that Play Protect is switched on to ensure that it’s working and scanning for malicious apps.

You can check that Play Protect is enabled through the Play Store app settings. You also can scan for harmful apps, if a scan hasn’t been done already.

Stalkerware relies on deep access to your device to access the data, and is known to abuse Android’s accessibility mode which, by design, requires broader access to the operating system and your data for screen readers and other accessibility features to work.

Android users who do not use accessibility apps or features should not see any apps in this section of Android’s settings.

If you do not recognize a downloaded service in the Accessibility options, you may want to switch it off in the settings and remove the app. Some stalkerware apps are disguised as ordinary looking apps and are often called “Accessibility,” “Device Health,” “System Service” or other innocuous-sounding names.

Android spyware often abuses in-built accessibility features. Image Credits:TechCrunch

Much like the accessibility features, Android also allows third-party apps to access and read your incoming notifications, such as allowing smart speakers to read alerts out loud or your car to display notifications on its dashboard. Granting notification access to a stalkerware app allows for persistent surveillance of your notifications, which includes the contents of messages and other alerts.

You can check which apps have access to your notifications by checking your Android notification access settings under Special app access. Some of these apps you may recognize, like Android Auto. You can switch off notification access for any app that you do not recognize.

Spyware taps into notifications access to read user messages and other alerts. Image Credits:TechCrunch

Other features commonly abused by stalkerware are Android’s device admin options, which have similar but even broader access to Android devices and users’ data.

Device admin options are usually used by companies to remotely manage their employees’ phones, such as wiping the phone in the event of device theft to prevent data loss. But these features also allow stalkerware apps to snoop on the Android display and the device’s data.

An unrecognized item in your device admin app settings is a common indicator of phone compromise.Image Credits:TechCrunch

You can find the device admin app settings in Settings under Security.

Most people won’t have a device admin app on their personal phone, so be aware if you see an app that you don’t recognize, named something similarly obscure and vague like “System Service,” “Device Health” or “Device Admin.”

You may not see a home screen icon for any of these stalkerware apps, but they will still appear in your Android device’s app list.

You can view all of the installed apps in Android’s settings. Look for apps and icons that you don’t recognize. These apps may also show as having broad access to your calendar, call logs, camera, contacts and location data.

Spyware apps are designed to blend in with generic-looking names and icons. Image Credits:TechCrunch

Force stopping and uninstalling a stalkerware app will likely alert the person who planted the stalkerware that the app no longer works.

If stalkerware was planted on your phone, there is a good chance that your phone was unlocked, unprotected or that your screen lock was guessed or learned. A stronger lock screen password can help to protect your phone from intruders. You should also protect email and other online accounts using two-factor authentication wherever possible.

If you or someone you know needs help, the National Domestic Violence Hotline (1-800-799-7233) provides 24/7 free, confidential support to victims of domestic abuse and violence. If you are in an emergency situation, call 911. The Coalition Against Stalkerware has resources if you think your phone has been compromised by spyware.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

安卓 间谍软件 隐私安全 监控软件
相关文章