Read this first if you are in immediate danger
If you suspect a current partner or someone with physical access has installed monitoring software on your phone, do not change settings on the device yet. The act of toggling settings can alert the person watching. Move to a safe location with a different device first, then read on.
What stalkerware actually is
Commercial stalkerware is sold openly under marketing terms like "parental control" or "employee monitoring" — Pegasus, FlexiSPY, mSpy, Hoverwatch, Cocospy, Spyzie, Cerberus. The same products are used overwhelmingly in domestic surveillance and intimate-partner violence cases. They install via physical access, iCloud credential theft, or — in the case of Pegasus-tier nation-state tools — zero-click exploits.
Forensic indicators consumer apps will not show you
- Configuration profiles. Settings → General → VPN & Device Management. Any profile you did not install yourself, especially one with vague names like "Apple Business" or "iOS Settings," is suspicious.
- iCloud backup activity from unfamiliar devices. appleid.apple.com → Devices. Anything you do not recognize is a serious indicator.
- Unusual battery drain on idle. Check Settings → Battery for processes you do not recognize. Stalkerware exfiltrates data continuously.
- iCloud password recently changed by someone else. Check the email associated with your Apple ID for a "your password was changed" notice you did not trigger.
- Apple ID logged in on more devices than yours. Many stalkerware tools on iPhone work by mirroring iCloud, not by installing on the device.
- Two-factor authentication codes you did not request. Indicates an attacker has your password and is trying to bypass 2FA.
What an antivirus app will not catch
Apple does not allow consumer antivirus apps full access to other apps' data. The "iPhone scanner" apps in the App Store cannot detect stalkerware that lives in iCloud, in a configuration profile, or in a jailbreak. They will tell you everything is fine. They are wrong.
What a forensic phone scan actually does
A forensic phone scan uses tools that do not exist on the consumer market — Cellebrite, Magnet Axiom, mobile verification toolkits like MVT — to image the device, parse system artifacts, and check for knownindicators of compromise (IOCs) from the major commercial stalkerware vendors. It also checks for jailbreak indicators, unauthorized configuration profiles, and iCloud account anomalies. The output is a written report you can use in a protective-order filing orcustody dispute.
Steps to take right now if you cannot get to a forensic investigator yet
- From a different device (not the suspected phone), change your Apple ID password.
- Sign out of all other devices in iCloud → Devices.
- Re-enroll in two-factor authentication and use a phone number the watcher does not know.
- Do not factory-reset the suspect device — it destroys forensic evidence you may need later.
We work many of these cases under attorney-client privilege when there is a custody, divorce, or protective-order matter pending. See domestic violence digital forensics for the protected workflow.















