Today, both us and our children use webcams for everything – chatting with friends, gaming, even joining online classes. We’d like to think that once the camera is off, our privacy is safe. Unfortunately, spyware and stalkerware can hijack microphones and cameras to peer into our personal lives. And with cyberattacks growing more sophisticated, knowing how to protect your child from digital spies has never been more important.
Key points of this article:
- Both spyware and stalkerware have similar capabilities – they can secretly hijack devices to steal data, monitor activity, and even activate cameras and microphones without the user’s knowledge. The main difference is their intent and target.
- Both spyware and stalkerware can often be identified through warning signs like fast battery drain, unexplained data use, unfamiliar apps with broad permissions, or system settings that change without your input.
- The difference between parental control apps and stalkerware lies in purpose, transparency, and consent. Parental apps are meant to protect children, not to secretly spy on them.
- Removing such malicious apps requires running a reliable antivirus scan, disconnecting the device from the internet, deleting the spyware, and then resetting all passwords to block continued access. Sometimes even professional IT help is needed.
Stalkerware and spyware explained
Let’s start by looking closely at two categories of software that can be misused to watch what your child is doing on – or even in front of – their computer. The two digital spies are called spyware and stalkerware. While they share some features, their goals and use cases are often very different.
Spyware = silent data thieves
Spyware is a type of malware that secretly infiltrates a device and focuses on stealing sensitive information. This can include login credentials, banking details, browsing history, or private communications, all of which can then be exploited or sold to cybercriminals on underground forums.
Although its primary purpose is data theft, spyware can sometimes go even further. Some advanced strains are capable of activating cameras or microphones, allowing attackers to capture images, videos, or conversations without the user ever realizing it.
Spyware infestations can occur in many ways: by clicking malicious links, opening attachments in phishing emails, or downloading seemingly harmless apps that have hidden spying features. Because these programs often look legitimate, users – including children – might install them themselves without realizing the risk.
Malware hidden in a game
In 2024, ESET researchers uncovered a Telegram channel distributing Ratel spyware disguised as the popular clicker game Hamster Kombat. This malware can hijack SMS messages allowing its operators to pay for subscriptions and services with the victim’s funds without the victim noticing.
Unlike a real game, the fake app has no interface and, upon startup, instead requests access to notifications. Once granted, Ratel can intercept text messages and hide apps notifications likely to prevent the victim from discovering that their money is used to pay for new subscriptions.
Stalkerware = invasive monitoring tools
Stalkerware, on the other hand, is usually deployed with a very specific target in mind. Technically, it resembles spyware. It may hide under the name and icon of another app, run in the background, and monitor online behavior, location, and device activity. However, its intent is often deeply personal. And because stalkerware is so often tied even to domestic abuse, several organizations, including the international Coalition Against Stalkerware, actively campaign against its use.
Unlike spyware, which casts a wide net to harvest profitable information from as many victims as possible, stalkerware is most often used by individuals to track someone they know. It has been linked to cases of domestic abuse, controlling partners, and even jokes among peers. Children can therefore be affected if someone – a friend, classmate, or someone else they know – installs stalkerware on their phone or laptop to gain access to their private data.
The scale of this threat is not just anecdotal. When three stalkerware apps were compromised in early 2025, the breach exposed not only victims’ private data but also revealed a customer base of 3.2 million email addresses (noting that one user could register multiple addresses), underscoring the global scale of the industry.The most frequently detected apps include ones that disguise themselves as “device trackers” or “safety tools,” but actually function as hidden surveillance systems.
Stalkerware apps riddled with security holes
In 2021, ESET researchers analyzed 86 Android stalkerware apps and discovered serious security flaws in 58 of them, totaling 158 security and privacy issues. Such weaknesses not only endanger victims – whose private data can be exposed or manipulated – but also put stalkers themselves at risk of account hijacking or personal data leaks.
The flaws ranged from insecure storage of sensitive information and weak password protections to server leaks and even the possibility of remote code execution on victims’ devices. This research highlighted how stalkerware, often marketed as “safety” tools for children or women, in reality created cascading risks for everyone involved.
Parental control vs. stalkerware. Where’s the line?
This brings us to an important gray area that is parental control apps. On the surface, they share certain functionalities with stalkerware – monitoring activity, tracking usage, blocking harmful content. The difference lies in purpose, transparency, and consent. Parental apps are meant to protect children, not to secretly spy on them.
Still, not all parental apps are created equal. A 2025 Cornell University study compared 20 sideloaded parental control apps (downloaded outside official app stores) with 20 apps from trusted stores. The researchers found that sideloaded apps often demanded excessive permissions, lacked encryption, and in some cases even attempted to hide their presence on the device – behaviors disturbingly close to stalkerware.
This is why experts recommend that if parents choose to use such tools, they should do so openly and collaboratively. Children should know the app is there, understand why it’s being used, and perhaps have the presence of this app included in the family digital agreement. Transparency fosters trust and makes it clear that the goal is protection, not control.
How to spot the spy
If you believe your child’s device might have been compromised with either of the above mentioned software, here are some symptoms you can look out for:
- Is the device behaving differently? Malicious programs often run quietly in the background, which can drain the battery much faster, make the phone feel hot even when idle, or cause data usage to spike for no clear reason. If your child’s device suddenly needs constant charging or your data plan is being eaten up unusually quickly, it could be a sign of infection.
- Do you see apps you don’t recognize?
Surveillance tools are notorious for hiding under bland names like “System Service” or “Device Manager.” They may also request wide-ranging permissions such as access to the camera, microphone, or location, even if it doesn’t make sense for the app’s purpose. If you’ve found a strange app you don’t recognize, run a scan with reliable security software, delete the app, or get an expert to examine the device. - Are system settings shifting on their own?
If GPS location keeps re-enabling itself, or privacy settings seem to change without you or your child doing anything, that’s a red flag. Some spyware can alter permissions or turn on features in order to collect more information. Manually reviewing which apps are allowed to access sensitive functions can uncover this behavior. On computers, parents have also reported unexplained mouse movements or apps that suddenly malfunction, which is another hint of unwanted software in the background. - Does the camera light come on at odd times?
While many stalkerware apps try to disable the indicator light, not all succeed. If the webcam’s control light flashes or turns on when the camera isn’t in use, treat it as a warning sign. - Have unexpected files appeared?
Some spying tools take screenshots or snap photos and briefly store them before transmitting them to attackers. Even if these files vanish quickly, security programs may still detect traces of them.
If several of these symptoms sound familiar, the safest course of action is to ask an IT professional for help. If you want to try and remove the malware yourself, here are some steps you can take.
- Install a reliable antivirus program.
- Allow the antivirus to update its database.
- Disconnect the device from the internet.
- Run an antivirus scan to find the offending program and remove it.
- Change all passwords, including the ones used on your admin and user accounts, to revoke any existing access that the attackers might still have.
Smart defenses against cyber-spies
Protecting your child’s privacy starts with simple safeguards. The simplest and in fact one of the most effective ones is a physical webcam cover or a built-in shutter on newer laptops. That ensures that no one can secretly activate the camera. And don’t worry, you don’t need to get a fancy cover. Even a simple tape will do.
Good digital habits are just as important. Teach your children to lock their devices when unattended, use strong passwords, and enable multi-factor authentication. Regularly review app permissions on their devices and turn off access to the camera, microphone, and location services unless they are truly necessary. Keeping devices updated with the latest software and firmware patches also helps close security gaps.
If you are looking for a reliable antivirus, consider ESET Home Security solutions which offer you the highest level of protection across all your family devices.
Finally, invest in reliable security software. Modern endpoint protection tools go beyond basic antivirus by monitoring unusual behavior, blocking suspicious apps, and offering dedicated webcam protection to stop the lens from being activated without consent.
With these habits and tools, you can give your child the confidence to explore the digital world without the fear of unwanted eyes and ears watching.
Frequently asked questions
What is the difference between spyware and stalkerware?
Spyware is designed to silently steal sensitive information, often for financial gain, while stalkerware is usually installed by someone known to the victim to monitor personal activity, location, and communications.
How can spyware or stalkerware get onto my child’s device?
These apps can be installed through phishing emails, malicious links, or by downloading apps that appear legitimate but hide spying features; stalkerware is often side-loaded by someone with physical access to the device.
What warning signs suggest a device might be infected?
Red flags include rapid battery drain, unexplained spikes in data use, strange new apps with excessive permissions, system settings that change on their own, or webcams and microphones activating unexpectedly.
How can parents safely remove spyware or stalkerware?
Parents should install a trusted antivirus program, update its database, disconnect the device from the internet, run a full scan to remove the malicious app, and then change all user and admin account passwords.
What’s the safest way for parents to use monitoring apps without crossing into stalkerware?
Experts recommend using only trusted parental control apps from official stores and doing so transparently. Children should know the app is there, understand its purpose, and have it included in a family digital agreement to build trust and avoid misuse.






