Privacy Tools Guide

Stalkerware on iOS is more subtle than Android—Apple’s walled-garden prevents most installation methods. However, sophisticated stalkerware can hide in plain sight through compromised iCloud accounts, MDM (Mobile Device Management) profiles, or jailbroken devices. This guide shows you how to detect and remove stalkerware even if someone with your iCloud password has been using your device.

Why iOS Stalkerware Is Different

iOS stalkerware typically requires one of these:

  1. Compromised iCloud account — Attacker uses your iCloud password to access Location Services, Messages, Photos via iCloud
  2. MDM profile — Device enrolled in a fake “management” profile that monitors activity
  3. Jailbreak + spyware combo — Device is jailbroken and running surveillance software
  4. AirDrop exploits — Less common, but can pair device without your knowledge
  5. Parental Controls abuse — Legitimate feature weaponized to monitor an adult

Most stalkerware does NOT give a visible app icon (because Apple prevents this). Instead, it operates by:

Diagnostic Checklist

Before diving into technical checks, answer these:

If you answered YES to any, follow the detection steps below.

Step 1: Check Your iCloud Account Security

Compromised iCloud credentials are the #1 vector for iOS surveillance.

Check Active Sessions

Settings → [Your Name] → Password & Security → Active Sessions

This shows all devices signed into your iCloud account. Remove any unknown devices.

What to look for:

Action if suspicious:

1. Tap the suspicious session
2. Select "Remove from Account"
3. Change your iCloud password immediately
   (don't just "Sign Out" — actually change the password)
4. Re-sign into iCloud on this device

Force Sign Out of All Sessions (Nuclear Option)

If you suspect account compromise:

1. Visit iCloud.com (from computer, not phone)
2. Sign in to your iCloud account
3. Click Account Settings
4. Click Security
5. Under "Active Sessions" scroll to bottom
6. Click "Sign out of all sessions"
   (This forces logout everywhere, requires re-authentication)

Consequence: You'll need to re-sign into iCloud on this device
and any other devices (15-30 minutes total)

Enable Two-Factor Authentication (2FA)

If not already enabled:

Settings → [Your Name] → Password & Security → Two-Factor Authentication

Toggle ON

2FA prevents attackers from logging into your account remotely, even if they have your password.

Step 2: Check for MDM Profiles

MDM (Mobile Device Management) profiles are how companies manage corporate iPhones. Stalkerware exploits this by creating a fake MDM profile that captures all activity.

Check for MDM profiles:

Settings → General → VPN & Device Management

What to look for:

Common stalkerware MDM names (2026):

Remove suspicious profiles:

1. Tap the suspicious profile
2. Select "Remove" (may require device passcode)
3. Confirm deletion
4. Restart device after removal

Note: If a profile is marked “Not Removable,” this indicates either:

If a profile won’t remove:

1. Go to: Settings → General → Profiles
2. Note the profile's certificate issuer
3. Try to identify who issued it
4. If unknown, consider a full factory reset (see below)

Step 3: Check Location Services Settings

Stalkerware loves exploiting Location Services. Review which apps have access:

Settings → Privacy → Location Services

Enable “Location Services Precision Warnings”:

Settings → Privacy → Location Services →
Scroll to bottom: "Precise Location Warnings"
Toggle ON

This alerts you when an app requests your precise location. Review the list:

Apps that should have Location Services:

Apps that should NOT have Location Services:

Review Calendar and Reminders locations:

Sophisticated stalkerware hides in Calendar/Reminders syncing:

Settings → Calendar → Accounts
Settings → Reminders → Accounts

Check that only your personal iCloud account is listed.
Remove unknown email accounts.

Step 4: Analyze Cellular and Wi-Fi Usage

Stalkerware transmits data to remote servers. Unusual data usage can indicate surveillance:

Settings → Cellular → Cellular Data

Look for "System Services" or unknown app consuming unusual data.
Most apps should be <100 MB per day.
System Services >500 MB per day is suspicious.

Detailed Network Analysis (Advanced):

Jailbroken devices or those with MDM can intercept network traffic. To check:

1. Connect to a known secure Wi-Fi network
2. Use a packet analyzer app (e.g., Wireshark if device is jailbroken)
3. Look for data being sent to unknown IP addresses
4. Stalkerware typically sends to:
   - Chinese IP ranges (many command & control servers)
   - Unknown cloud providers (AWS, DigitalOcean)
   - Domain registrars with privacy protection

Step 5: Check for Jailbreak Indicators

Jailbroken iPhones can run arbitrary surveillance apps. Check if your device is jailbroken:

Visible jailbreak indicators:

Settings → General → About

Check Kernel Version:
- If it shows custom kernel or non-Apple build, device is jailbroken
- Apple devices should show: "Darwin Kernel Version X.X.X"

Filesystem access check (requires computer):

Using a Mac or Linux computer with iPhone plugged in via USB:

# Check if /var/mobile/Library is accessible (sign of jailbreak)
ifuse mount-point
ls -la mount-point/var/mobile/Library

# Jailbroken devices will allow this; normal iOS devices deny access

If device is jailbroken:

Jailbreaking voids Apple support, but more importantly, it means:

Remove jailbreak:

1. Plug into computer
2. Use Finder (Mac) or iTunes (Windows)
3. Select device → General → Restore
4. This performs a factory reset, removes jailbreak
5. Restore from backup ONLY if you trust the backup source

Step 6: Check iCloud Backup Contents

Your iCloud backup might contain stalkerware data or be accessed by an attacker. Review what’s being backed up:

Settings → [Your Name] → iCloud

Review which apps are syncing:
- Messages should sync (check for suspicious contacts)
- Photos should sync (check for suspicious activity)
- Health data — review unusual entries
- Reminders — check for suspicious calendar entries

Delete and recreate iCloud backup (nuclear option):

1. Settings → [Your Name] → iCloud → Backup
2. Note the last backup date
3. Tap "Delete This Backup"
4. Create new backup immediately:
   Settings → [Your Name] → iCloud → Backup → "Back Up Now"

This removes any stalkerware data that was backed up.
New backup contains only current device state.

Step 7: Verify No Hidden Accessibility Features

Stalkerware sometimes enables Accessibility features without your knowledge:

Settings → Accessibility

Check these sections:
- Automation (should be empty unless you set automations)
- Voice Control (should be OFF)
- Switch Control (should be OFF)
- Guided Access (should be OFF unless using deliberately)
- Spoken Content (review which apps)

Disable any accessibility features you don’t actively use:

Toggle OFF:
- Voice Control
- Switch Control
- Guided Access (unless using for specific purpose)

Step 8: Factory Reset (Nuclear Option)

If you suspect sophisticated stalkerware, factory reset is the most reliable removal method:

Backup your data first (if you trust it):

Settings → [Your Name] → iCloud → iCloud Backup → Back Up Now

Factory Reset Process:

1. Settings → General → Reset → Erase All Content and Settings
2. Choose to keep your Apple ID or not
   (Keep it if you want to restore from backup later)
3. Device will wipe completely
4. Set up as new device without restoring backup
   (This removes any malware from backup)

Restore data safely after reset:

Option 1: Restore from backup selectively
- Set up device as new
- Manually re-download apps from App Store
- Restore data from backup one category at a time
- Review each restoration for suspicious changes

Option 2: Start completely fresh
- Don't restore from backup
- Manually download essential apps
- Recreate accounts in apps
- This takes longer but is most secure

Step 9: Secure Your Passwords After Suspected Compromise

If someone had access to your iCloud account, they may have accessed passwords:

Change critical passwords:

1. Change iCloud password (done in Step 1)
2. Change email password (on computer, not iPhone)
3. Change banking passwords
4. Change social media passwords
5. If you use 1Password or Bitwarden:
   - Change master password
   - Review all stored credentials for suspicious entries

Enable alerts for suspicious activity:

Banking apps: Enable transaction alerts
Email: Monitor login activity at mail provider
Social media: Check login locations

Prevention: Stop Future Stalkerware

1. Use a Strong, Unique iCloud Password

iCloud password requirements:
- 12+ characters
- Mix of uppercase, lowercase, numbers, symbols
- Not used anywhere else
- Not based on personal information

2. Don’t Reuse Passwords Across Sites

Attackers gain access through breached websites, then try the same password on iCloud. Use a password manager:

3. Review Connected Apps Regularly

Settings → [Your Name] → Password & Security → Apps using your Apple ID

Quarterly review: Remove apps you no longer use

4. Disable App-Specific Passwords (If You’re Not Using Them)

Settings → [Your Name] → Password & Security → App-Specific Passwords

Remove any app-specific passwords you don't recognize

5. Enable Sign-In Recovery

Settings → [Your Name] → Password & Security → Account Recovery

Add a recovery phone number and email
This helps you recover account if compromised

Trusted Contacts for Remote Assistance

If you suspect someone is using your device:

1. Contact Apple Support (1-800-MY-APPLE)
2. Explain the situation
3. Apple can force password reset and MDM profile removal

Or use Apple's official "Find My" app to:
- Locate device remotely
- Lock device remotely
- Wipe device remotely

When to Involve Law Enforcement

Stalkerware installation may be illegal:

Countries with stalkerware laws:
- United States (Cyberstalking laws, varies by state)
- Canada (Criminal Code harassment sections)
- UK (Computer Misuse Act)
- Australia (Stalking and harassment laws)
- EU (GDPR violations, cyberstalking directives)

If experiencing stalking or domestic abuse:
- Document evidence (screenshots of suspicious iCloud sessions)
- Contact local police department
- Reach out to domestic abuse hotline
  - US: 1-800-799-7233 (National Domestic Violence Hotline)
  - Canada: 1-800-363-9010 (Assaulted Women's Helpline)

Built by theluckystrike — More at zovo.one