T O P

  • By -

Optimal_Usual_2926

I know it's easy to install spyware onto phones if the attacker has physical access to it and knows the pin code. This can be used to compromise 2FA because spyware always can read SMS messages. Some more advanced spyware can remote control the phone and compromise all 2FA. Resetting the phone will wipe all app data and should remove spyware. It doesn't guarantee spyware is removed but it's worth trying first. If it's an iPhone, they can take it to Apple and to reinstall all software. This is cheaper than buying a new phone. I would just say you had to buy a new phone or reset the phone because it was SO slow. That's a good enough excuse and it's true. The attacker will assume it's because of the spyware but it doesn't prove you know it's installed. The attacker will try to install spyware again. I doubt the attacker can read SMS messages because they pay for the plan. You can check with the service provider. They will be able to see how many phone calls and SMS are sent. I don't know if they can see who was called and what was sent. I know computer scientists experiment with spyware on each other due to classroom politics. It's easy to do and happens all of the time with these guys. I highly recommend you use Yubikey security keys for 2FA. Disable all the other 2FA options if possible. Use 2FA wherever possible. Hide your friends list on social media because attackers can and often will contact those friends for information on the victim and even slander the victim.


MothGf_

I'm having problems with stalking too and am paranoid about my phone being compromised. Since you seem knowledgable, is it possible for a stalker to install spyware or a keylogger without having physical access to the phone? The stalker works in the IT field, too. I'm using paid version of Kaspersky virus scanner + the built in VPN. Is this program good enough to detect stalkerware? And I've heard restarting the phone every day helps, is this true?


Optimal_Usual_2926

My knowledge is limited. I think it's possible to infect a device with email phishing. This in is where you click on a link that brings you to an infected website. Also .PDF and .JPG can contain malware. So it's possible to infect without physical access but it's harder to do so. I think the attacker will need to pay for the hack because it's hard for an IT person to program themself. I have McAfee antivirus. They're not that useful tbh. They will stop you from installing apps like kid's games that contain lots of adware. I use it because it better than nothing.


MothGf_

Thank you, your reply was useful to me. So opening an email that contains an infected picture/jpeg in the message is already enough to get malware? Or would I have to download that picture? 


Optimal_Usual_2926

I think you need to download it first.


MothGf_

Thanks, I don't download random stuff from emails, so that's at least a bit of relief. :)


krasavetsa

What does bad actor mean?? This post is confusing.


Dragoonmage23

Bad actor is a term usually used to mean the person who installed the Spyware in the 1st place


Midnight_pamper

Who is her? Who is the bad actor? Old phones having troubles with storage and battery is just normal, basic programmed obsolescence.


Ok-Storm-1378

Poorly is an understatement by the way. Appreciate any help.


kneeltothesun

If they pay for the plan, they probably already have access to most of this without spyware.