What to do if…
an app suddenly gains camera, microphone, or location permissions you do not remember approving
Short answer
Revoke the app’s Camera, Microphone, and Location permissions immediately, then stop using the app until you’ve checked recent access indicators/logs and run the device’s built-in security checks.
Do not do these things
- Don’t grant additional permissions to “see if it’s real.”
- Don’t keep the app open in the background while you investigate.
- Don’t click “security alert” links inside the app or in texts/emails about the app — use phone settings instead.
- Don’t factory reset in a panic unless you’ve first secured your accounts (resetting without securing accounts can leave you locked out while the problem continues).
What to do now
-
Make a quick record of what you noticed.
Screenshot the permissions page and note the time you saw the change. -
Revoke Camera, Microphone, and Location permissions now.
- iPhone (iOS): Settings → Privacy & Security → Camera / Microphone / Location Services → switch the app off (or set Location to “Never”).
- Android: Settings → Security & Privacy (or Privacy) → Permission manager → Camera / Microphone / Location → set the app to “Don’t allow” (or “Ask every time”).
-
Force-close the app, and uninstall if it’s not essential.
- Android: App info → Force stop.
- If you don’t trust the app, uninstall it. (You can always reinstall later if you verify it’s legitimate.)
-
Check whether the app accessed the camera/mic/location recently.
- iPhone (immediate check): Look for the mic/camera indicator dot and check Control Center for “recently used” microphone/camera.
- iPhone (logging going forward): Turn on App Privacy Report (Settings → Privacy & Security → App Privacy Report). It helps you review sensor use and network activity from that point onward.
- Android: Open Privacy dashboard (if available) or recent permissions access and look for camera/mic/location use by that app (and any other app you don’t recognize).
-
Run built-in protection and update your device.
- Android: Google Play → Play Protect → scan, and confirm Play Protect is enabled.
- iPhone/Android: Install pending operating system updates (they often include security fixes).
-
Check for “high-control” settings that can hide monitoring.
If the permission change feels impossible or keeps happening:- iPhone: Settings → General → VPN & Device Management → screenshot and review anything you don’t recognize. If it’s a work/school-managed device, contact your admin before removing management.
- Android: Check Device admin apps and Accessibility for unfamiliar services; screenshot anything suspicious before changing it.
-
Secure your most important accounts (from a different device if possible).
- Change your primary email password first (email controls resets for everything else).
- Turn on 2-factor authentication.
- Change passwords for accounts linked to that app (especially messaging, social media, cloud storage, and financial services).
-
If you suspect stalkerware/spyware or someone had physical access, choose safety over speed.
If this involves an abusive partner, harassment, or a shared device, changes can sometimes escalate risk. If you suspect monitoring, use a different device/account to reach support or research help. -
If you lost money, identity info, or believe you were targeted, report it.
- Report cyber-enabled crime to the FBI’s IC3.
- Report scams/fraud to the FTC (ReportFraud).
If a crime is happening right now or you are in immediate danger, call 911.
What can wait
- You don’t need to decide right now whether to replace your phone.
- You don’t need to prove exactly how the permission changed before locking down access.
- You don’t need to contact the app developer immediately — stabilize first, then decide.
Important reassurance
Seeing sensitive permissions turned on unexpectedly is unsettling, but there are benign explanations (app updates, OS prompts, mistaken taps). Revoking permissions and pausing is a solid first move, and it gives you control while you check what actually happened.
Scope note
This covers first actions to reduce harm and buy time. If you find repeated unauthorized access, unknown device management, or evidence of spyware, you may need specialist technical support to fully clean and secure devices and accounts.
Important note
This guide is general information, not legal or technical advice. If you feel unsafe or threatened, prioritize personal safety and contact emergency services if needed.
Additional Resources
- https://support.apple.com/guide/iphone/control-access-to-hardware-features-iph168c4bbd5/ios
- https://support.apple.com/en-gb/102188
- https://support.google.com/android/answer/9431959
- https://support.google.com/android/answer/13530434
- https://support.google.com/googleplay/answer/2812853
- https://www.cisa.gov/news-events/news/privacy-and-mobile-device-apps
- https://consumer.ftc.gov/articles/stalkerware-what-know
- https://www.ic3.gov/