Active Incident? 24/7 Response →
Witness

For Individuals & Families

How to Tell If Someone Installed Stalkerware on Your iPhone

If you suspect someone is reading your messages, the apps in the App Store will not tell you. Here is what does.

All articles·7 min read·April 27, 2026

Read this first if you are in immediate danger

If you suspect a current partner or someone with physical access has installed monitoring software on your phone, do not change settings on the device yet. The act of toggling settings can alert the person watching. Move to a safe location with a different device first, then read on.

What stalkerware actually is

Commercial stalkerware is sold openly under marketing terms like "parental control" or "employee monitoring" — Pegasus, FlexiSPY, mSpy, Hoverwatch, Cocospy, Spyzie, Cerberus. The same products are used overwhelmingly in domestic surveillance and intimate-partner violence cases. They install via physical access, iCloud credential theft, or — in the case of Pegasus-tier nation-state tools — zero-click exploits.

Forensic indicators consumer apps will not show you

What an antivirus app will not catch

Apple does not allow consumer antivirus apps full access to other apps' data. The "iPhone scanner" apps in the App Store cannot detect stalkerware that lives in iCloud, in a configuration profile, or in a jailbreak. They will tell you everything is fine. They are wrong.

What a forensic phone scan actually does

A forensic phone scan uses tools that do not exist on the consumer market — Cellebrite, Magnet Axiom, mobile verification toolkits like MVT — to image the device, parse system artifacts, and check for knownindicators of compromise (IOCs) from the major commercial stalkerware vendors. It also checks for jailbreak indicators, unauthorized configuration profiles, and iCloud account anomalies. The output is a written report you can use in a protective-order filing orcustody dispute.

Steps to take right now if you cannot get to a forensic investigator yet

  1. From a different device (not the suspected phone), change your Apple ID password.
  2. Sign out of all other devices in iCloud → Devices.
  3. Re-enroll in two-factor authentication and use a phone number the watcher does not know.
  4. Do not factory-reset the suspect device — it destroys forensic evidence you may need later.

We work many of these cases under attorney-client privilege when there is a custody, divorce, or protective-order matter pending. See domestic violence digital forensics for the protected workflow.


Related services

Meet Your Practitioner

Quinnlan Varcoe

Founder & CEO

With operational experience across Fortune 50 security programs and the defense industrial base, Quinnlan founded Witness in 2022 to provide clients with the caliber of expertise typically reserved for the largest enterprises. Her work in threat intelligence and digital forensics has earned the trust of 26,000+ cybersecurity professionals who follow her analysis.

“26,000 professionals follow my work because I say what others won't — and I can back it up technically.”

Fortune 50 BackgroundDefense IndustryThreat IntelligenceDigital PrivacyIncident Response
Quinnlan Varcoe, Founder & CEO

iPhone stalkerware: frequent questions

Certified Expertise

GIAC · AWS · Splunk · CompTIA

Trusted by partners across the practice

DAS Health
Exhibit A Cyber
Ally Security
KIRO Group
Black Mirage
Kalles Group
Gridware
CQR
Archstone Security
Cyvergence
Sentinel Cyber
Cloud Underground
Seron Security
Hexen
Koru Risk Management
DAS Health
Exhibit A Cyber
Ally Security
KIRO Group
Black Mirage
Kalles Group
Gridware
CQR
Archstone Security
Cyvergence
Sentinel Cyber
Cloud Underground
Seron Security
Hexen
Koru Risk Management