Abstract
Stalkerware is malicious software found in mobile devices that monitors and tracks a victim’s online and offline activity. This harmful technology has become a growing concern, jeopardizing the security and privacy of millions of victims and fostering stalking and Intimate Partner Violence (IPV). In response to this threat, various solutions have emerged, including anti-stalkerware apps that aim to prevent and detect the use of monitoring apps on a user’s device. Organizations dedicated to assisting IPV victims have also enhanced their online presence, offering improved support and easy access to resources and materials. Considering how these tools and support websites handle sensitive personal information of users, it is crucial to assess the privacy risks associated with them. In this paper, we conduct a privacy analysis on 25 anti-stalkerware apps and 323 websites to identify issues such as PII leaks, authentication problems and 3rd-party tracking. Our tests reveal that 14/25 apps and 210/323 websites share user information with 3rd-party services through trackers, cookies or session replay. We also identified 44 domains to which sensitive data is sent, along with 3 services collecting information submitted in forms through session replay.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Almansoor, M., Gallardo, A., Poveda, J., Ahmed, A., Chatterjee, R.: A global survey of android dual-use applications used in intimate partner surveillance apps. In: Proceedings on Privacy Enhancing Technologies Symposium, Lausanne, Switzerland (2022)
Armstrong, A., Jaffray, B.: Homicide in Canada. Canadian Centre for Justice Statistics, Juristat (2020)
Bracewell, K., Hargreaves, P., Stanley, N.: The consequences of the covid-19 lockdown on stalking victimisation. J. Family Viol. 1–7 (2020)
Ceccio, R., Stephenson, S., Chadha, V., Huang, D.Y., Chatterjee, R.: Sneaky spy devices and defective detectors: the ecosystem of intimate partner surveillance with covert devices. In: USENIX Security Symposium, Anaheim, CA, USA (2023)
Chatterjee, R., et al.: The spyware used in intimate partner violence. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 441–458. IEEE (2018)
Conti, M., Rigoni, G., Toffalini, F.: Asaint: a spy app identification system based on network traffic. In: Proceedings of ARES 2020, pp. 1–8 (2020)
EasyList. EasyList 2023 (2023). https://easylist.to
Echap. Stalkerware indicators of compromise (2022). https://github.com/AssoEchap/stalkerware-indicators
Eterovic-Soric, B., Choo, K.-K.R., Ashman, H., Mubarak, S.: Stalking the stalkers-detecting and deterring stalking behaviours using technology: a review. Comput. Secur. 70, 278–289 (2017)
Fassl, M., Anell, S., Houy, S., Lindorfer, M., Krombholz, K.: Comparing user perceptions of anti-stalkerware apps with the technical reality. In: SOUPS 2022, pp. 135–154 (2022)
Han, Y., Roundy, K.A., Tamersoy, A.: Towards stalkerware detection with precise warnings. In: Annual Computer Security Applications Conference, pp. 957–969 (2021)
Ischen, C., Araujo, T., Voorveld, H., van Noort, G., Smit, E.: Privacy concerns in chatbot interactions. In: Følstad, A., et al. (eds.) CONVERSATIONS 2019. LNCS, vol. 11970, pp. 34–48. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-39540-7_3
Kaspersky. New kaspersky stalkerware report confirms the link between online and offline violence (2022). https://www.kaspersky.com/about/press-releases/2022_new-kaspersky-stalkerware-report-confirms-the-link-between-online-and-offline-violence
KasperskyLab. Tinycheck (2021). https://github.com/KasperskyLab/TinyCheck
Kaur, P., Sharma, S.: Spyware detection in android using hybridization of description analysis, permission mapping and interface analysis. Procedia Comput. Sci. 46, 794–803 (2015)
Kirda, E., Kruegel, C., Banks, G., Vigna, G., Kemmerer, R.: Behavior-based spyware detection. In: Usenix Security Symposium, p. 694 (2006)
Liu, E., et al.: No privacy among spies: assessing the functionality and insecurity of consumer android spyware apps. Proc. Priv. Enhanc. Technol. 1, 1–18 (2023)
Microsoft Clarity. Microsoft clarity (2023). https://clarity.microsoft.com
B. of Justice Statistics. Stalking victimization (2019). https://bjs.ojp.gov/library/publications/stalking-victimization-2019
OpenWPM. OpenWPM (2023). https://github.com/openwpm/OpenWPM
Pourali, S., Samarasinghe, N., Mannan, M.: Hidden in plain sight: exploring encrypted channels in android apps. In: Proceedings of the 2022 ACM SIGSAC CCS, pp. 2445–2458 (2022)
Qabalin, M.K., Naser, M., Alkasassbeh, M.: Android spyware detection using machine learning: a novel dataset. Sensors 22(15), 5765 (2022)
Samarasinghe, N., Adhikari, A., Mannan, M., Youssef, A.: Et tu, brute? privacy analysis of government websites and mobile apps. In: Proceedings of the ACM Web Conference 2022, pp. 564–575 (2022)
Senol, A., Acar, G., Humbert, M., Borgesius, F.Z.: Leaky forms: a study of email and password exfiltration before form submission. In: USENIX Security Symposium, pp. 1813–1830 (2022)
Stefanko, L.: Android stalkerware vulnerabilities (2021). https://www.welivesecurity.com/wp-content/uploads/2021/05/eset_android_stalkerware.pdf
Stephenson, S., Almansoori, M., Emami-Naeini, P., Chatterjee, R.: “it’s the equivalent of feeling like you’re in jail”: lessons from firsthand and secondhand accounts of iot-enabled intimate partner abuse. In: USENIX Security Symposium, Anaheim, CA, USA (2023)
Stephenson, S., Almansoori, M., Emami-Naeini, P., Huang, D.Y., Chatterjee, R.: Abuse vectors: a framework for conceptualizing IoT-enabled interpersonal abuse. In: USENIX Security Symposium, Anaheim, CA, USA (2023)
Yandex. Yandex (2023). https://metrica.yandex.com/about
Yu, X., Samarasinghe, N., Mannan, M., Youssef, A.: Got sick and tracked: privacy analysis of hospital websites. In: 2022 IEEE EuroS &PW, pp. 278–286. IEEE (2022)
Acknowledgements
This research was funded by the Office of the Privacy Commissioner of Canada (OPC), we thank them for their trust and support.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Mangeard, P., Yu, X., Mannan, M., Youssef, A. (2024). No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites. In: Fritsch, L., Hassan, I., Paintsil, E. (eds) Secure IT Systems. NordSec 2023. Lecture Notes in Computer Science, vol 14324. Springer, Cham. https://doi.org/10.1007/978-3-031-47748-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-47748-5_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-47747-8
Online ISBN: 978-3-031-47748-5
eBook Packages: Computer ScienceComputer Science (R0)