What To Do if Your Phone Has Been Hacked (2024)

Navigate to:
  • What To Do
  • Prevention
  • Signs of Hacking
  • How Phones Get Hacked

Earlier this year, researchers at MIT discovered a new phone hack.1 It steals data from the sensors your phone uses to automatically adjust your brightness and sends the video captured by the sensors to the hacker. When we first read the paper MIT published, our skin started crawling. Thankfully, you can regain control of your device if a hack like this happens.

Our team of cybersecurity experts dug into some common phone hacks and then found solutions to each one. In this guide, we’ll go over what you should do if your phone has been hacked. Then, we’ll give you some tips we use to keep our devices safe and secure that you can implement too.

Pro Tip: Hacking requires expertise, but booting a hacker off your phone is easier than you think. Our Kaspersky review shows how antivirus software can help you kick out hackers (you’ll be surprised by how it outsmarts bad actors).

Top Prevention and Solution for a Hacked Phone

Using antivirus software is one of the best ways to not only kick a hacker out of your phone, but also to prevent hacking in the first place. We’ve spent thousands of hours testing dozens of antivirus software, and from detecting trojans and backdoor programs to cleaning up trackers, these are the best options for the job:

Security.org expertise, powered by AI.

Ask your Antivirus questions. We have answers!

What To Do if Your Phone Has Been Hacked (4)

Give market insight

What are some popular VPN brands?

Summarize features

What features are offered in a antivirus?

Find the best price

Which antiviruses are most affordable?

What To Do if Your Phone Has Been Hacked

Antivirus software is a useful prevention tool, as it detects malware that hackers use to access devices remotely, but even if you hadn’t downloaded antivirus software prior to a hacking attempt, you can use antivirus software to kick a hacker out of your device.

There’s one condition, though: the hacker should have used malware to perform the attack. Hackers use a variety of methods to hack into systems, some of which can not be detected by malware. For example, there are customer support scammers that will get you to install a legitimate mirroring app on your device to gain remote access. If that’s the case, then you’ll need more than just antivirus software.

As we said, though, if the hacker who took control of your phone used malware, antivirus software can remove the infection and free your phone. Here’s how:

How To Remove a Hacker From Your Phone

  1. Use antivirus software. When antivirus software detects a piece of malware, it quarantines it to prevent it from affecting the rest of your phone. Once quarantined, you can safely remove the infection and stop it from spreading. For this to work, though, your antivirus software has to be on and running in the background all the time.
  2. Contact businesses. Contact any financial services or e-commerce businesses that have your credit card or bank account information, which is very sensitive information indeed. Find out which transactions you need to dispute with your bank and, in some cases, report for fraud.
  3. Delete apps. If you see any apps on your phone that you didn’t download, delete them.
  4. Factory-reset your phone. If, after doing all those things, you still believe someone else has taken control of your phone, your last resort is to factory-reset your device. Doing so removes all files and apps from your phone, but it ensures that whatever the hacker used to gain entry will also be removed.
    • iPhone:
      1. Go to Settings.
      2. Click “General.”
      3. Click “Reset.”
      4. Click “Erase All Content and Settings.”
      5. Enter your passcode or Apple ID password.2
    • Samsung Android version 5.0 or above:
      1. Click “Apps.”
      2. Click “Settings.”
      3. Click “Backup and Reset.”
      4. Choose “Factory Data Reset.”
      5. Choose “Reset Device.”
      6. Click “Erase Everything.”3
    • Samsung Android version 14.0 (One UI 6.0) or above:
      What To Do if Your Phone Has Been Hacked (5)
      1. Open “Settings”
      2. Click “General management”
      3. Click “Reset”
      4. Choose “Factory Data Reset”
      5. Choose “Reset”
  5. Change your passwords. Finally, change the passwords of any breached accounts — a good practice for whenever your login credentials are involved in a data breach.

How To Prevent Your Phone From Being Hacked

So, how do you prevent the nightmare from happening again? With just a few changes to your settings, you can greatly reduce the likelihood of your phone being hacked. Hallelujah!

  1. Download antivirus software. Antivirus software works by scanning your phone for viruses and malware, then removing any threats to your device. However, not everyone needs antivirus on their mobile device — only Android users. Learn how to get rid of a virus on Android and what the best Android antivirus options are. iPhones and iPads don’t need antivirus software, though they can be hacked in other ways. Antivirus can stop hackers in many cases. Read our antivirus guide to learn more.
  2. Connect to VPNs on public Wi-Fi networks. Public Wi-Fi networks are as convenient as they are insecure. However, VPNs make connecting to public Wi-Fi networks safe. VPNs hide your browsing history and hide your IP address, changing your IP address to hide your location. VPN apps are available for both iPhones and Androids; we recommend the best iPhone VPNs and the best Android VPNs. In some cases, VPNs can stop DDoS attacks, so they’re a great solution for hopping on public Wi-Fi.
  3. Don’t jailbreak. Jailbreaking your iPhone gives you total control over it, from where you download apps to how you arrange your interface. Although we like control as much as anyone, jailbreaking an iPhone means missing out on Apple’s built-in security features, including malware scans. The same goes for Android users. Rooting an Android device is the equivalent of jailbreaking an iPhone, and unless you’re a security expert, we don’t suggest rooting your Android either.

    Note: For Android users, it’s not necessary to root your device to install apps from third parties. That said, it’s always best to install apps only through the Google Play Store.

  4. Avoid phishing. Does something smell phishy? Maybe you got an email from an address you don’t recognize, or maybe you’re entering your login information on a site that doesn’t look quite right. Most antivirus software has protection against phishing, but if you’re unsure, your best bet is not to click on any unfamiliar links, emails, attachments, websites, or messages.
  5. Use encryption. Whether or not you want to remain anonymous online, encryption is a great way to avoid hacking. Look for websites and apps that use end-to-end encryption, ideally the industry standard of 245-bit AES.
  6. Only use trusted charging stations. One of the best things about living in the 21st century is public charging stations. God forbid we’re in public without a smartphone! However, these charging stations carry risks, like someone “juice jacking” your phone’s data through a USB drive. Hackers can easily access your phone’s data through the drive or even run malware. If possible, use an AC outlet instead of a USB charging port, as AC outlets only transmit power, not data. If only a USB is available, use a charge-only adapter or a data blocker. You’ll thank us later!
  7. >> Related Reading: How to Remove Your Phone Number From the Internet

  8. Set up phone locks and passcodes. Make sure that if you put your phone down for a certain amount of time, you need a passcode to open it back up. Here’s how to set up passcodes:
    • iPhone X or later:
      1. Click “Settings.”
      2. Click “Face ID & Passcode.”
      3. Click “Turn Passcode On.”
      4. Enter a six-digit passcode.
      5. Enter the passcode again to confirm and activate it.
    • Android:
      1. Click “Settings.”
      2. Click “Security.”
      3. Click “Screen Lock.”
      4. Choose “Standard Locks.”
      5. Choose “Password.”
      6. Enter more than four characters.

        Note: On Android, you can set your lockscreen to open from a PIN, pattern, or a password. We always recommend setting a password as it allows you to use letters, numbers, and special characters. This makes it harder for someone to break into your phone.

  9. Add advanced authentication. Whenever it’s available, turn on biometric authentication, also known as multifactor authentication, or two-factor authentication (passcodes) to online accounts. Learn more in our authentication how-to guide.
  10. Disable voice assistants on lock screen. Having Siri or Google Assistant available before you unlock your phone is convenient, but it’s not the greatest thing for security. Follow these steps to disable these voice assistants:
    • iPhone:
      1. Go to your phone’s Settings.
      2. Click “Face ID & Passcode” or “Touch ID & Passcode.”
      3. Turn off Siri.
    • Android:
      1. Say, “Hey Google, open Assistant settings” to your phone.
      2. Go to Settings.
      3. Click “Personalization.”
      4. Click “Personal Results.”
      5. Turn on “Lock Screen Personal Results.”
  11. Turn on “find my phone.” If you haven’t set up a passcode, a lost phone is a surefire way to get hacked. Fortunately, if you have a passcode and a “find my phone” feature, losing your phone doesn’t mean it’s getting hacked.
    • iPhone:
      1. Go into Settings.
      2. Click your name.
      3. Click “Find My iPhone.”
      4. Turn on “Find My iPhone.”
    • Android:
      1. Go to Settings.
      2. Click “Security.”
      3. Click “Find My Device.”
      4. Turn on “Find My Device.”
  12. Turn off autofill. Another convenient feature in many browsers is autofill, which fills out personal information like your name, address, and phone number. However, if your phone gets into the wrong hands, this personally identifiable information (PII) could make you vulnerable to identity theft, so it’s best to disable it on your mobile browsers. Below, we’ve listed the instructions for Safari, the default browser on iPhones, and Chrome, the default browser on Androids.
    • iPhone:
      1. Click “Settings.”
      2. Click “Safari.”
      3. Turn off “AutoFill Passwords.”
    • Android:
      1. Open the Google app.
      2. Tap “More.”
      3. Tap “Settings.”
      4. Tap “General.”
      5. Turn off “Autocomplete With Trending Searches.”
  13. Limit app permissions. Go into your phone’s settings, click on different apps, and see what permissions they have. Is your Google Maps app tracking your location at all times? Can your dating app see your text messages? For the most privacy, limit permissions as much as you can on various mobile apps.
  14. Disable location tracking. Location tracking is a particularly scary concept that’s all too common in mobile apps these days. With location tracking on, a hacker could potentially follow you around, which means the digital threat could turn into physical danger. Follow these steps to disable it:
    • iPhone:
      1. Click “Settings.”
      2. Click “Privacy.”
      3. Click “Location Services.”
      4. Toggle off “Location Services.”
    • Android:
      1. Swipe down on your Android’s screen.
      2. Touch and hold “Location.”
      3. Click “Advanced.”
      4. Click “Google Location Accuracy.”
      5. Turn off “Improve Location Accuracy.”
    • Samsung Android One UI:
      1. Open “Settings”
      2. Click “Location”
      3. Click the “On” toggle so it says “Off”
  15. Turn off Wi-Fi. We’ve already mentioned the dangers of public Wi-Fi networks, but if your Wi-Fi is enabled by default, your phone may be joining networks without you knowing it. Instead, only use Wi-Fi on an ad hoc basis. Follow these steps to turn it off:
    • iPhone:
      1. Click “Settings.”
      2. Click “Wi-Fi.”
      3. Toggle Wi-Fi off.
    • Android:
      1. Swipe down on your Android’s screen.
      2. Touch and hold “Wi-Fi.”
      3. Turn off “Use Wi-Fi.”
  16. Perform software updates. Software updates contain the latest security patches, so even though they may be annoying, perform them as soon as they’re available.
    • iPhone:
      1. Click “Settings.”
      2. Click “General.”
      3. Click “Software Update.”
      4. Click “Download and Install.”
      5. Click “Install.”
      6. Enter your passcode.
    • Android:
      1. Click “Settings.”
      2. Click “System.”
      3. Click “Advanced.”
      4. Click “System Update.”
  17. Use secure passwords. The easiest way to protect your phone (and all of your other online accounts) is to use strong passwords. Each account should have a totally unique password.

Tip: To remember all of your passwords, store them in a password manager, an encrypted vault.

What Is Phone Hacking?

Simply put, phone hacking is when anyone accesses a phone or communications without the owner’s consent. Phone hacking can occur through security breaches, theft or loss of the device, and brute-force attacks.

Signs Your Phone Has Been Hacked

Just how do you know if your phone has been hacked? You may notice these signs:

  • Your phone loses charge quickly.
  • Your phone is running slower than usual.
  • You notice strange activity on your online accounts, like unfamiliar logins, new account signups, or password reset emails.
  • You see unfamiliar calls or texts.
  • You get more pop-ups than usual; this could be a sign of adware.
  • Your phone has more data usage than normal.
  • You notice unfamiliar apps.4

How Do Phones Get Hacked?

The reason we take so many precautions surrounding our phones is because hacks can happen in a lot of different ways. Here are a few examples:

  • Phishing: Phishing messages lead to social engineering — i.e., asking people for their login credentials directly to gain access to computer systems. Phishing can happen not only through emails and text messages, but also through scam phone calls. If you get a strange text or email from someone you don’t know, don’t click on it; the same goes for messages on social media. Your mobile security will thank you!
  • Brute-force attacks: Brute-force attacks are perhaps the most primitive hacking method, as hackers just guess at passwords until they log in correctly.
  • Man-in-the-middle attacks: With this method, hackers intercept data packets as they travel between a sender and a receiver, “listening” for login credentials.5
  • Physical access: Whether it’s a lost or stolen phone, if it doesn’t have a passcode, hacking is much easier.
  • Programming-based hacking: Programming-based hacking requires the most technical knowledge; hackers find vulnerabilities in systems and give themselves full administrative privileges.

Can My Phone Get Hacked?

All of this sounds concerning, but you may be wondering, “Can my Android or iPhone get hacked?” The answer is, unfortunately, yes, both Androids and iPhones are susceptible to hacking.7 Sorry!

Who Hacks Phones?

You might be wondering, “What exactly do hackers accomplish by accessing other people’s phones?” A lot, actually. For one, hackers can use data stored on people’s phones to commit fraud and identity theft. Our phones contain intimate information about us, such as personal information, company and workplace files, account passwords, and even credit card information.

Recap

Anyone with a smartphone needs to be concerned about hacking. But with the right settings and best practices, you can guard yourself against most hacking attacks.

If you take one thing away from this article, it should be to set up a passcode on your phone. It only takes a few seconds, and it prevents most people from entering. Sometimes, the simplest solutions are also the most effective.

Frequently Asked Questions

Naturally, we get tons of questions about preventing phone hackings, and we’re here to answer every last one.

  • How can I remove a hacker from my phone number?

    Follow these steps to remove a hacker from your phone number:

    1. Download antivirus software.
    2. Run a virus scan to quarantine and delete any malware.
    3. Back up your data.
    4. Perform a factory reset on your phone.
  • How do I fix my hacked Android phone?

    Here’s how to fix your hacked Android phone:

    1. Click “Apps.”
    2. Select “Settings.”
    3. Select “Backup and Reset.”
    4. Select “Factory Data Reset.”
    5. Select “Reset Device.”
    6. Select “Erase Everything.”
  • How do I remove a hacker from my iPhone?

    Follow these steps to remove a hacker from your iPhone:

    1. Click “Settings.”
    2. Click “General.”
    3. Select “Reset.”
    4. Select “Erase All Content and Settings.”
    5. Enter your passcode or your Apple ID password.
  • How can I tell if my Android is hacked?

    To tell if your Android is hacked, look for these signs:

    1. Your Android loses battery quickly.
    2. You get emails about unfamiliar password resets, account signups, etc.
    3. You see calls or text messages that you don’t recognize.
    4. Your Android is using more data than usual.
    5. You are seeing more pop-ups than usual.
    6. You see unfamiliar apps on your phone.
    7. Your Android is slower than normal.
  • What can a hacker do with my phone?

    There’s a whole lot someone can do with your phone if they hack into it. Most often, phone hacks revolve around stealing your data like your credit card numbers or bank account information. Some hacks also target your cameras to spy on you.

What To Do if Your Phone Has Been Hacked (2024)

FAQs

Can you remove a hacker from your phone? ›

Many hackers use malware to control their victim's device or access sensitive files, photos, and videos. Using a reputable antivirus scanner can help you detect and remove malware — but only on Android devices (Apple doesn't allow third-party apps to scan for viruses).

What is the solution if your phone is hacked? ›

You can fix a hacked Android phone by deleting any suspicious apps, files, or widgets you don't recognize as well as revoking admin access in your settings and regularly clearing your cache. If this doesn't work, you may need to perform a full factory reboot.

Will resetting a phone remove hackers? ›

Can I remove a hacker by resetting my phone? Yes, you should be able to remove a hacker by doing a factory reset on your phone. Keep in mind that this solution will remove all of your data, including contacts, third-party apps, photos, and other files. You will need to set up your phone entirely from scratch.

Should I change my phone number if I have been hacked? ›

If you've recently been the victim of identity theft, then changing your phone number is one of the optimum ways to protect yourself from repeated identity theft.

What is the first thing you do when you get hacked? ›

Immediately change all your passwords on any accounts you think might have been affected. If you use the same password across several accounts, make sure they're unique from now on. Regularly changing your passwords is also a good habit to get into.

Does shutting down your phone remove hackers? ›

Does turning off your phone stop hackers? Yes, turning off your phone can stop hackers, as most cyberattacks targeting cell phones require the device to be turned on. However, that won't permanently stop hackers from hacking your phone, and your device could remain a threat once you turn it back on.

Can you check to see if your phone is hacked? ›

There are other signs of a hacked phone, such as reduced screenshot quality, unusually high data usage, and apps crashing randomly. If you notice any of these signs, you can take immediate steps to protect your device by downloading a security tool that can scan your device for risks and remediate threats.

What is the code to check if my phone is hacked? ›

To check if your phone is hacked, dial *#61#, *#62#, or *#21#. These will tell you if someone else is intercepting your calls or diverting them to a different number. Apart from this, you can open settings to search for malicious apps that you didn't install. Using a spy app removal tool can also prove effective.

What is the code to check if your phone is being monitored? ›

##4636## or ##197328640## ➡️ To Check Unknown Connections (Android) If you're concerned someone has installed malware or spyware on your Android phone, these codes open up a screen that lists all running processes and services.

Can hackers see your screen? ›

If attackers obtain physical access to your phone or computer, they can install malicious software and monitor the device's screen activity.

What does someone do if they hack your phone? ›

When a hacker gets into your phone, they will try to steal access to your valuable accounts. Check your social media and email for password reset prompts, unusual login locations or new account signup verifications. You notice unfamiliar calls or texts in your logs. Hackers may be tapping your phone with an SMS trojan.

Can you tell if someone has access to your phone? ›

Unusual phone activity when not in use

If your phone is making noises, the screen is lighting up when you're not using it, or you're receiving calls and notifications while in silent mode, it can signal that somebody has hacked your phone.

Can hackers do anything if they know your phone number? ›

Scammers and hackers can use your phone number in numerous ways to compromise your data. If you think a phone number is only a means of communication, think again. Some criminals use cell phone numbers to impersonate others, steal private information, and access financial benefits.

Do I go to police if my phone is hacked? ›

If you think you have been a victim of subscriber fraud: Contact local law enforcement and file a police report. You can also file an identity theft report with the FTC.

What happens when a hacker takes over your phone? ›

When a hacker gets into your phone, they will try to steal access to your valuable accounts. Check your social media and email for password reset prompts, unusual login locations or new account signup verifications. You notice unfamiliar calls or texts in your logs. Hackers may be tapping your phone with an SMS trojan.

Can hackers get into your phone if it is turned off? ›

While it is technically possible for a phone to be hacked when turned off, the risks are relatively low, and the likelihood of an attack occurring is even lower. However, it is essential to remember that phones can still be vulnerable to hacking when turned on, especially if they are not adequately secured.

Top Articles
Latest Posts
Article information

Author: Corie Satterfield

Last Updated:

Views: 6031

Rating: 4.1 / 5 (62 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Corie Satterfield

Birthday: 1992-08-19

Address: 850 Benjamin Bridge, Dickinsonchester, CO 68572-0542

Phone: +26813599986666

Job: Sales Manager

Hobby: Table tennis, Soapmaking, Flower arranging, amateur radio, Rock climbing, scrapbook, Horseback riding

Introduction: My name is Corie Satterfield, I am a fancy, perfect, spotless, quaint, fantastic, funny, lucky person who loves writing and wants to share my knowledge and understanding with you.