What is Spyware? (2024)

What is spyware?

Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.

Any software can be classified as spyware if it is downloaded without the user's authorization. Spyware is controversial because, even when it is installed for relatively innocuous reasons, it can violate the end user's privacy and has the potential to be abused.

Spyware is one of the most common threats to internet users. Once installed, it monitors internet activity, tracks login credentials and spies on sensitive information. The primary goal of spyware is usually to obtain credit card numbers, banking information and passwords.

But spyware can also be used to track a person's location, as is the case with stalkerware. Often installed secretly on mobile phones by jealous spouses, ex-partners and even concerned parents, this type of spyware can track the physical location of the victim, intercept their emails and texts, eavesdrop on their phone calls and record conversations, and access personal data, such as photos and videos.

Spyware can be difficult to detect; often, the first indication a user has that a computing device has been infected with spyware is a noticeable reduction in processor or network connection speeds and -- in the case of mobile devices -- data usage and battery life. Antispyware tools can be used to prevent or remove spyware. They can either provide real-time protection by scanning network data and blocking malicious data, or they can execute scans to detect and remove spyware already on a system.

How does spyware work?

Spyware can make its way onto a device without the end user's knowledge via an app install package, file attachment or malicious website. In its least damaging form, spyware exists as an application that starts up as soon as the device is turned on and continues to run in the background. Its presence will steal random access memory and processor power and could generate infinite pop-up ads, effectively slowing down the web browser until it becomes unusable.

Spyware may also reset the browser's homepage to open to an ad every time or redirect web searches and control the provided results, making the search engine useless. Additionally, spyware can change the computer's dynamic link libraries, which are used to connect to the internet, resulting in connectivity failures that can be hard to diagnose.

At its most damaging, spyware will track web browsing history, passwords and other private information, such as email addresses, credit card numbers, personal identification numbers or banking records. All of this information can be gathered and used for identity theft or sold to third parties. Information can be collected using keyloggers and screen captures.

Spyware can also secretly make changes to a device's firewall settings, reconfiguring the security settings to allow in even more malware. Some forms of spyware can even identify when the device is trying to remove it from the Windows registry and will intercept all attempts to do so.

How do spyware infections occur?

Spyware infections can affect any personal computer, Mac, iOS or Android device. Some of the most common ways for computers to become infected include the following:

  • pirating media such as games, videos and music by downloading and distributing copyrighted digital content without permission;
  • downloading materials from unknown sources;
  • accepting pop-up advertisem*nts; and
  • opening email attachments from unknown senders.

Spyware is most commonly distributed by getting potential victims to click on a link. The link can be in an email, pop-up window or ad. Malicious code can also be embedded on legitimate websites as an advertisem*nt. Other ways for spyware to infect a machine include via drive-by download -- where spyware is downloaded just by visiting a website or viewing a HyperText Markup Language email message -- phishing links or physical devices.

Types of spyware

Spyware is not just one type of program. It is an entire category of malware that includes adware, keyboard loggers, Trojans and mobile information-stealing programs.

Adware. Malicious adware is often bundled with free software, shareware programs and utilities downloaded from the internet or surreptitiously installed onto a user's device when the user visits an infected website. Many internet users were first introduced to spyware in 1999 when a popular freeware game called Elf Bowling came bundled with tracking software. Adware is often flagged by antimalware programs as to whether the program in question is malicious or not.

Cookies that track and record users' personally identifiable information (PII) and internet browsing habits are one of the most common types of adware. An advertiser might use tracking cookies to track what webpages a user visits in order to target advertising in a contextual marketing campaign. For example, an advertiser could track a user's browser history and downloads with the intent to display pop-up or banner advertisem*nts to lure the user into making a purchase. Because data collected by spyware is often sold to third parties, regulations such as the General Data Protection Regulation have been enacted to protect the PII of website visitors.

Keyboard loggers. Keyloggers are a type of system monitor that cybercriminals often use to steal PII, login credentials and sensitive enterprise data. Employers may also use keyloggers to observe employees' computer activities; parents to supervise their children's internet usage; device owners to track possible unauthorized activity on their devices; or law enforcement agencies to analyze incidents involving computer use.

Hardware keyloggers resemble a Universal Serial Bus flash drive and serve as a physical connector between the computer keyboard and the computer, while software keylogging programs do not require physical access to the user's computer for installation. Software keyloggers can be downloaded on purpose by someone who wants to monitor activity on a particular computer, or they can be downloaded unwittingly and executed as part of a rootkit or remote access Trojan.

Trojans. Trojans are typically malware programs that are disguised as legitimate software. A victim of a Trojan could unknowingly install a file posing as an official program, enabling the Trojan to access the computer. The Trojan can then delete files, encrypt files for ransom or enable other malicious actors to have access to the user's information.

Mobile spyware. Mobile spyware is dangerous because it can be transferred through Short Message Service or Multimedia Messaging Service text messages and typically does not require user interaction to execute commands. When a smartphone or tablet gets infected with mobile spyware that is sideloaded with a third-party app, the phone's camera and microphone can be used to spy on nearby activity, record phone calls, and log browsing activity and keystrokes. The device owner's location can also be monitored through the Global Positioning System (GPS) or the mobile computing device's Accelerometer.

What is Spyware? (1)

How do you prevent spyware?

Maintaining strict cybersecurity practices is the best way to prevent spyware. Some best practices include the following:

  • only downloading software from trusted sources;
  • reading all disclosures when installing software;
  • avoiding interactions with pop-up ads;
  • staying current with updates and patches for browser, operating system (OS) and application software;
  • not opening email attachments or clicking on links from unknown senders;
  • using only trusted antivirus software and reputable spyware tools; and
  • enabling two-factor authentication (2FA) whenever possible.

To further reduce the probability of infection, network administrators should practice the principle of least privilege and require remote workers to access network resources over a virtual private network that runs a security scan before granting access privileges.

Using a pop-up blocker or ad blocker also helps avoid spyware. Mozilla Firefox and Google Chrome have built-in pop-up blockers, and ad blockers can be added as a browser extension.

Mobile users should avoid downloading applications from outside their respective app stores and avoid jailbreaking their phones, if possible. Since both make it easier for spyware to infect mobile devices.

IPhone users can enable 2FA at no charge to protect all the data on their smartphones and prevent mobile spyware attacks. 2FA can also be used in a variety of other common services, including PayPal, Google, Dropbox and Microsoft 365, as well as in social networking sites, such as Instagram, Snapchat, Facebook and Twitter. Most major banks have also started implementing 2FA in their websites and mobile apps. Some services have even increased their authentication process to three-factor and four-factor authentication.

How do you remove spyware?

In order to remove spyware, device owners must first identify that the spyware exists in their system. There are several symptoms to look for that can signify the presence of an attack. Indicators include the following:

  • The device runs slower than normal.
  • The device consistently crashes.
  • Pop-up ads appear whether the user is online or offline.
  • The device starts running out of hard drive (HD) space.

If users determine that spyware has infected the system, they should perform the following steps:

  1. Disconnect the internet connection.
  2. Check the device's programs list to see if the unwanted software is listed. If it is, choose to remove it from the device. After uninstalling the program, reboot the entire system.
  3. If the above step does not work, run a scan of the system using a reputable antivirus software. The scan should find suspicious programs and ask the user to either clean, quarantine or delete the software.
  4. The user can also download a virus removal tool or antispyware tool and allow it to run through the system.

If none of the above steps work, then the user will have to access the device's HD in safe mode. However, this requires a tool that enables the user to access the spyware folders and manually delete them. While this sounds complicated, the process should only take a few minutes.

Spyware on mobile devices can also be scanned for using security programs. Mobile device owners can also back their data up and then reset the device to its factory settings.

Antispyware tools

Some antispyware tools only perform when the scan is manually started, while others are continuously running and monitoring computer activity to ensure spyware cannot record the user's information. Users should be cautious when downloading antispyware tools and only download tools from reputable sites. Product reviews can also help users determine which tools are safest.

Some antispyware tools include the following:

  • Malwarebytes is an antimalware and spyware tool that can remove spyware from Windows, macOS, Chrome OS, Android and iOS. Malwarebytes can scan through registry files, running programs, HDs and individual files. Once a spyware program is detected, a user can quarantine and delete it. However, users cannot set up automatic scanning schedules.
  • Trend Micro HouseCall is another antispyware tool that does not require user installation, so it uses minimal processor and memory resources and disk space. However, like Malwarebytes, users cannot set automatic scans.
  • Windows Defender is a Microsoft antimalware product that is included in the Windows 10 OS under Windows Defender Security Center. The software is a lightweight antimalware tool that protects against threats such as spyware, adware and viruses. Windows Defender includes features such as protection against phishing sites, real-time threat detection and parental controls. Windows Defender users can set automatic quick and full scans, as well as set alerts for low, medium, high and severe priority items.

What are common examples of spyware?

Well-known examples of spyware include the following:

  • CoolWebSearch uses security vulnerabilities found in Internet Explorer to take control, change settings and send browsing information to spyware authors.
  • DarkHotel is a targeted spear phishing spyware that selectively attacks business hotel visitors through the hotel's Wi-Fi network.
  • Emotet was one of the most prevalent threats in the 2010s. It acted as a Trojan that stole banking credentials from its victims.
  • Gator is commonly found in file sharing software. It monitors a victim's web browsing habits to present the user with better-targeted ads.
  • TIBS Dialer disconnects the user's computer from local phone lines and connects it to a toll number designed for accessing p*rnographic websites.
  • Zlob downloads itself onto a computer to record keystrokes and search a user's browsing history.

In addition, smartphone spy apps enable different people to track the phone user's activity. While most of these tools were created with the intent of letting parents monitor their child's phone use, their abilities have been grossly abused. These apps act as mobile spyware and enable external users to access the phone's microphone and camera to view their surroundings, listen in on phone calls and access the phone's GPS location, passwords and mobile apps. Some well-known spy apps include Spyera, FlexiSPY and TheOneSpy.

Learn more on how to prevent spyware through best practices, including using a layered defense or content filtering.

This was last updated in July 2021

Continue Reading About spyware

Related Terms

What is cloud detection and response (CDR)?
Cloud computing requires a security approach that is different than traditional protections. Where does cloud detection and ...Seecompletedefinition
What is cybercrime and how can you prevent it?
Cybercrime is any criminal activity that involves a computer, network or networked device.Seecompletedefinition
What is threat detection and response (TDR)? Complete guide
Threat detection and response (TDR) is the process of recognizing potential cyberthreats and reacting to them before harm can be ...Seecompletedefinition

Dig Deeper on Threats and vulnerabilities

What is Spyware? (2024)

FAQs

How do I know if I have spyware? ›

How to detect spyware
  • Increasing sluggishness and slow response.
  • Unexpected advertising messages or pop-ups (spyware is often packaged with adware).
  • New toolbars, search engines and internet home pages that you don't remember installing.
  • Batteries becoming depleted more quickly than usual.

What is an example of spyware? ›

Some of the most common examples of spyware include adware, infostealers, keyloggers, rootkits, Red Shell, system monitors, tracking cookies, and Trojans.

What is spyware in computer? ›

Spyware is loosely defined as malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent. Spyware can also refer to legitimate software that monitors your data for commercial purposes like advertising.

How do I remove spyware? ›

Run a legitimate product specifically designed to remove spyware - Many vendors offer products that will scan your computer for spyware and remove any spyware software. Popular products include Lavasoft's Ad-Aware, Microsoft's Window Defender, Webroot's SpySweeper, and Spybot Search and Destroy.

Can I tell if my phone is being monitored? ›

Call *#21# or *#62#

They may not work for every type of spyware, but you can learn a lot by dialing *#21# or *#62#. These numbers can reveal to you whether or not your calls or messages are being redirected elsewhere, which is a major sign that your device is tapped.

Can someone install spyware on my phone without me knowing? ›

Cybercriminals can put spyware on your phone, whether you have an Android or an iPhone. This can let them spy on you without you knowing.

Can spyware see you? ›

How can spyware control your phone's camera? Mobile spyware is malware that allows hackers to steal information and watch anything within view of your phone camera. It can also enable them to access your microphone, location, calendar, and contacts.

What are the 4 types of spyware? ›

What is Spyware?
  • Adware. Adware tracks a user's web surfing history and activity to optimize advertising efforts. ...
  • Trojan. A trojan is a digital attack that disguises itself as desirable code or software. ...
  • Keylogger. A keylogger is a type of spyware that monitors user activity. ...
  • RootKits.
Sep 15, 2022

How to protect yourself from spyware? ›

Keep your device secure
  1. Keep up-to-date. Update your system, browser, and important apps regularly, taking advantage of automatic updating when it's available. ...
  2. Antivirus software. ...
  3. Antispyware software. ...
  4. Firewalls. ...
  5. Choose strong passwords. ...
  6. Use stronger authentication. ...
  7. Be careful what you click. ...
  8. Shop safely.

How to scan for spyware? ›

Here are three of the most common ways to detect PC spyware:
  1. Look for spyware using Task Manager. Open Task Manager and navigate to the Processes tab to see all of the apps and processes running on your machine. ...
  2. Search for bloatware programs you didn't download. ...
  3. Download and use security software to scan your PC.
Jan 2, 2024

Can spyware steal passwords? ›

Spyware is another type of malware that can steal your passwords. Spyware is designed to monitor your computer activity and collect information about you, including your passwords. Spyware can be installed on your computer without your knowledge or consent, making it difficult to detect.

How does spyware get on your device? ›

Some common ways your device might become infected with spyware include: Accepting a prompt or pop-up without reading it first. Downloading software from an unreliable source. Opening email attachments from unknown senders.

Is spyware difficult to remove? ›

Removing a computer virus or spyware can be difficult without the help of malicious software removal tools. Some computer viruses and other unwanted software reinstall themselves after the viruses and spyware are detected and removed.

Can you block spyware? ›

Programs are available to remove or block spyware. Some anti-virus programs also protect against spyware. If you have an anti-virus program installed, check to see if it also checks your computer for spyware. You can also install programs that will remove and/or block installation of spyware.

Can someone put spyware on your phone? ›

Both Android and iOS phones can be subject to malicious software capable of tracking your location, reading your texts, and listening in on phone calls.

Can I test my phone for spyware? ›

The easiest way to check for spyware on your phone is to use a spyware removal tool. A spyware removal tool helps automatically root out and removes traces of hidden spies.

How do I run a spyware check? ›

Here are three of the most common ways to detect PC spyware:
  1. Look for spyware using Task Manager. Open Task Manager and navigate to the Processes tab to see all of the apps and processes running on your machine. ...
  2. Search for bloatware programs you didn't download. ...
  3. Download and use security software to scan your PC.
Jan 2, 2024

How do I know if I have hidden apps or spyware? ›

How to Find Hidden Spy Apps on Android
  • Signs of spyware on Android.
  • Random reboots and shutdowns.
  • Battery drains unusually fast.
  • Strange phone behavior.
  • Increasing data usage.
  • Suspicious text messages or files.
  • Unusual sounds on a telephone call.
  • Abnormal sounds when your phone is not in use.
Mar 14, 2024

Can spyware be detected on iPhone? ›

Numerous security apps available on the App Store can assist you in finding spyware on your iPhone. Some popular options include Avast, Lookout, and Norton. Download and run any of these apps to scan your device for potential threats.

Top Articles
Ethereum Price Predictions: Where Will the ETH Crypto Go After Retaking $3,000?
Can You Have 2 Checking Accounts with the Same Bank?
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Dr. Pierre Goyette

Last Updated:

Views: 5971

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Dr. Pierre Goyette

Birthday: 1998-01-29

Address: Apt. 611 3357 Yong Plain, West Audra, IL 70053

Phone: +5819954278378

Job: Construction Director

Hobby: Embroidery, Creative writing, Shopping, Driving, Stand-up comedy, Coffee roasting, Scrapbooking

Introduction: My name is Dr. Pierre Goyette, I am a enchanting, powerful, jolly, rich, graceful, colorful, zany person who loves writing and wants to share my knowledge and understanding with you.