Close Menu
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
What's Hot

Investors trust Google more than Meta when comes to spending on AI

April 30, 2026

Paragon is not collaborating with Italian authorities probing spyware attacks, report says

April 28, 2026

Microsoft cuts OpenAI revenue share as their AI alliance loosens

April 28, 2026
Facebook X (Twitter) Instagram
Trending
  • Investors trust Google more than Meta when comes to spending on AI
  • Paragon is not collaborating with Italian authorities probing spyware attacks, report says
  • Microsoft cuts OpenAI revenue share as their AI alliance loosens
  • Robotically assembled building blocks could make construction more efficient and sustainable | MIT News
  • AI showdown: Musk and Altman go to trial in fight over OpenAI’s beginnings
  • U.S., Iran seize ships as war evolves into standoff over Strait of Hormuz
  • Google launches training and inference TPUs in latest shot at Nvidia
  • Zoom teams up with World to verify humans in meetings
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech InnovationsRoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Saturday, May 9
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Home » This sneaky Android spyware needs a password to uninstall. Here’s how to remove it without one.

This sneaky Android spyware needs a password to uninstall. Here’s how to remove it without one.

GTBy GTApril 4, 2025 TechCrunch No Comments6 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email


Consumer-grade phone surveillance apps aren’t only intended to stay stealthy; some of these apps are also making it increasingly difficult to remove them. 

TechCrunch has identified a stealthy phone monitoring app for Android that requires a password to uninstall, effectively blocking Android device owners from being able to remove the app.

The spyware app, which we’re not naming so as to not give it any publicity, relies on whoever is planting the app to enable a built-in feature in Android that allows apps to “overlay” content on top of all other apps. Once granted this permission, the spyware app uses this overlay access to forcibly display a password prompt whenever the user tries to uninstall or deactivate the app through Android’s settings.

Worse, the password to uninstall this spyware is set by whoever planted it.

an animated GIF of an Android uninstall screen that forcibly displays a password prompt when attempting to uninstall the app. Entering the wrong password closes the page to the home screen.
Image Credits:TechCrunch

There is a solution. TechCrunch’s own testing found that rebooting an affected Android device into “safe mode” temporarily prevents third-party apps from loading, including the spyware, allowing affected individuals to remove the app without the password prompt appearing.

This consumer-grade spyware app is part of a growing ecosystem of phone monitoring offerings, which promote and sell their apps under the guise of allowing parents to monitor their children’s phone activities or companies to track their employees. But these apps also go by the term “stalkerware” (or “spouseware”), as many also explicitly promote their apps as a way to snoop on their spouse or romantic partner without their consent, which is illegal.

These spyware apps are typically downloaded from outside the official Android app store and planted by a person with physical access to a person’s phone, usually with knowledge of their passcode. 

Once installed, these apps deliberately hide their app icons from the victims’ home screen to stay stealthy, all while continually uploading the person’s phone contents — including their text messages, photos, and real-time location — to a web dashboard that the abuser can access.

Often, the only way to identify the app is by looking through certain Android device settings that are commonly configured for facilitating covert device monitoring, and then identifying the specific app to remove.

But in the case of this particular spyware app, the password pop-up blocks the ability to uninstall unless the correct password is entered.

a screenshot showing a password prompt overlaying the Android uninstall settings, preventing the user from removing the app.
Image Credits:TechCrunch
a screenshot showing a password prompt overlaying the Android uninstall settings, preventing the user from removing the app.
Image Credits:TechCrunch

How to identify and remove Android password-enabled spyware

It’s quick and easy to check to see if your Android device is compromised by consumer-grade spyware. Remember that it’s important to have a safety plan in place before proceeding, as removing spyware will likely alert the person who planted it.

TechCrunch has a general Android spyware removal guide that can help to identify and remove common types of phone spyware and stalkerware, and switch on the correct settings to secure your Android device.

This particular spyware may not appear as a home screen icon, but it will still appear in your list of installed apps as a nondescript app called “System Settings,” featuring a default Android icon, likely in an effort to blend in with Android’s built-in apps.

The spyware app also takes advantage of another built-in Android feature called “device admin,” which allows companies to remotely manage their employees’ phones, but is also frequently abused by spyware apps to allow broad access to a victim’s device and data. If you see a device admin app enabled on your device that you don’t recognize, it may be a spyware app. Attempting to uninstall the app may also present a password prompt.

However, rebooting an Android device into “safe mode” permits only Android core system apps to run by default, allowing for users to troubleshoot or remove buggy or problematic apps. (A thread on Stack Exchange from 2016 confirms this technique.)

TechCrunch tested and checked this process on several virtual Android devices, which we planted with the spyware. The virtual devices allow us to run the apps in a protected sandbox without having to give any real-world data, such as our location.

Before you proceed: Note that entering safe mode, and the following steps to identify and remove spyware apps, may vary by Android device model and software version.

Generally, you can hold down the Android device’s power button until a set of options appear on your screen, then touch and hold the “power off” button, which will then display a prompt asking if you want to “reboot to safe mode.” Select OK, then wait until your device restarts.

an Android screenshot showing the power options, with a red arrow over the "power off" button
Image Credits:TechCrunch
An Android screenshot with a dialog box that reads, "reboot to safe mode," followed by the text: "Do you want to reboot into safe mode? This will disable all third party applications you have installed. They will be restored when you reboot again." there is a red arrow over the "OK" button.
Image Credits:TechCrunch

Your Android device will display “safe mode” in the corner of your screen when your device successfully boots into safe mode.

From here, you can find the offending spyware app by looking in your Android settings for any installed “device admin” apps. If you have a device admin app that you don’t recognize, you can toggle the switch off, and then select “deactivate & uninstall” from the device admin app settings. 

an Android phone screenshot showing the "device admin apps" settings, with an arrow pointing towards toggling off the app with device admin access.
Image Credits:TechCrunch
An Android screenshot showing a spyware called 'System Settings' as an installed device admin app, with a red arrow pointing to the "deactivate and uninstall" button.
Image Credits:TechCrunch

Once the spyware app is removed as a device admin, you can then uninstall the app completely from your device. You can do this by opening your Android settings and then “Apps.”

From here, you will be able to identify the named spyware app from the list of installed apps on your device. While looking at the app info screen in safe mode, you should be able to select “uninstall,” then hit “OK” once you are prompted to remove the app. 

(As an aside, Android will not let you uninstall from this screen any system app that is critical to your device’s functioning.)

A screenshot of Android in safe mode showing an spyware app called 'System Settings' with a red arrow over the uninstall button.
Image Credits:TechCrunch
A screenshot of Android in safe mode with an app uninstall dialog box, with a red arrow over the "OK" button
Image Credits:TechCrunch

At this point, the spyware is now removed. Forcibly stopping and removing a spyware app will likely alert the person who planted the app that it no longer works. 

To exit Android safe mode and return your device to its normal state, you can restart your device by holding down the power button and selecting “restart.”

You should also make immediate steps to secure your device, such as by setting a longer, unique passcode, or an alphanumeric password, to prevent physical access in the future. You may also want to secure any web accounts that you have on your device, including your Google account, to prevent any further misuse.

—

If you or someone you know needs help, the National Domestic Violence Hotline (1-800-799-7233) provides 24/7 free, confidential support to victims of domestic abuse and violence. If you are in an emergency situation, call 911. The Coalition Against Stalkerware has resources if you think your phone has been compromised by spyware.



Source link

GT
  • Website

Keep Reading

Paragon is not collaborating with Italian authorities probing spyware attacks, report says

Zoom teams up with World to verify humans in meetings

Hackers are abusing unpatched Windows security flaws to hack into organizations

‘Tokenmaxxing’ is making developers less productive than they think

Sources: Cursor in talks to raise $2B+ at $50B valuation as enterprise growth surges

Kevin Weil and Bill Peebles exit OpenAI as company continues to shed ‘side quests’

Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Investors trust Google more than Meta when comes to spending on AI

April 30, 2026

Google launches training and inference TPUs in latest shot at Nvidia

April 27, 2026

Meta tracks employee usage on Google, LinkedIn AI training project

April 25, 2026

Meta will cut 10% of workforce as company pushes deeper into AI

April 24, 2026
Latest Posts

Malicious Chrome Extension Steal ChatGPT and DeepSeek Conversations from 900K Users

April 1, 2026

Top 10 Best Server Monitoring Tools

April 1, 2026

10 Best Cybersecurity Risk Management Tools

March 31, 2026

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Welcome to RoboNewsWire, your trusted source for cutting-edge news and insights in the world of technology. We are dedicated to providing timely and accurate information on the most important trends shaping the future across multiple sectors. Our mission is to keep you informed and ahead of the curve with deep dives, expert analysis, and the latest updates in key industries that are transforming the world.

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2026 Robonewswire. Designed by robonewswire.

Type above and press Enter to search. Press Esc to cancel.