Skip to content

Unmasking A Cyber Stalker: First Instinct

Sarliya Jayakody

In the midst of the COVID-19 lockdown in 2019, I launched an Instagram account called Social Media Ninja (@socialmedianinja.uk). Through this platform, I connected with martial artists from across the globe to seek their permission to feature their incredible footage. By crafting unique, short videos from their material, I not only showcased their skills but also fostered a sense of community. Most martial artists were enthusiastic about collaborating, allowing me to put a fresh spin on their original work. This initiative not only enriched my content but also engaged a diverse audience passionate about martial arts.

Sarli Jayakody

In the summer of 2020, I started to suspect that my digital environment was under attack, particularly my phone, which I feared might be compromised by spyware or malware. After reporting a potential privacy intrusion to Hertfordshire Police constabulary.

I had limited technical knowledge to do with such things. So I immersed myself in a plethora of online articles to validate my concerns and gain a deeper understanding of the risks involved. It became crucial for me to optimize my digital security and protect my personal information.

During my research, I came across monitoring software like MSpy, specifically designed for parents. This tracker software offers an array of features that empower parents to:

  • View social media interactions
  • Keep an eye on their children’s online activities
  • Track GPS locations in real-time
  • Monitor text messages and calls

ALL WITHOUT BEING DETECTED

This is a commercially available piece of software, one of many you can choose to monitor your children’s activity. In that respect it’s a great app to have. According to this MSpy website, iCloud credentials and back up are required for monitoring iOS devices without a jailbreak. Physical access is required if i Cloud backup isn`t activated on monitored device or 2-factor/2-step verification is enabled.

My thoughts at the time was ok, it seems possible at the time to actually track me but surely I am protected as no one should be aware of my credentials. How wrong I was, in my article about Antti Pelttari I mention about Pegasus Spyware. A fairly sophisticated piece of spyware ‘named after Pegasus, the winged horse of Greek mythology. It is a Trojan horse computer virus that can be sent “flying through the air” to infect cell phones’

Taking in to consideration that Pegasus Spyware is a military grade spyware and there are commercially available options to monitor which pretty much have the same abilities exist in a military. It only leaves you to wonder, what other options of similar type of software’s are available on the Dark Net.

The wider cyber crime landscape is supported by online marketplaces selling compromised data and tools that enable cyber crime. Cyber tools, including ransomware, are increasingly available to a wide range of cyber criminals, alongside service providers who can provide access to online systems. This marketplace also enables criminals from other threat areas, and enables cyber criminals with only basic capabilities to cause serious harm

National Crime Agency

More often now as we approach 2025 there are more and more channels on social media similar to mr_lumos warning us off the dangers of spyware, malware and hacking. Also dispelling the beliefs and echoing the same message as the National Crime Agency that you have to be a genius to intrude on someone’s privacy.

Social Engineering

Social engineering tactics leverage the psychology of human motivation to exploit emotions and instincts, often leading individuals to make decisions that compromise their best interests.


First Instinct about my Cyber Stalker

During my time running the Instagram Social Media UK, I became aware of my cyber stalker, who initially identified themselves by their real name ‘Petri Hooli’ before switching to a more generic alias. Soon after their presence emerged, I started experiencing a troubling series of unusual incidents.

Every time I opened my Instagram, it seemed like the first thing I encountered was a photo from my cyber stalker. This troubling pattern occurred consistently, leading me to notice that his posts often appeared just minutes after I logged in. What started as a coincidence quickly evolved into a recognizable trend. Even when I began logging into my account at random times, I found that my cyber stalker would still be posting within minutes of my arrival.

Slowly I realized that the posts my cyber stalker was posting where actually reflective of situations going on in my life for example

These kind of examples continued every day till eventually I decided to approach my cyber stalker and find out who they were


Leave a Reply

Your email address will not be published. Required fields are marked *