Get powerful hacking protection

Download Norton 360 Deluxe to help block hackers, protect your data, and secure your device.

Get it now

Get powerful hacking protection

Install Norton 360 Deluxe to help block hackers, protect your data, and secure your phone.

Get it now

Is my phone hacked? 5 warning signs + protection tips

If you suddenly see a surge of pop-up ads, unfamiliar apps on your phone, or a rapidly draining battery, you might be justified in thinking that your phone has been hacked. Learn to recognize the warning signs of phone hacking, and get rock-solid protection with Norton 360 Deluxe.

A woman thinks her phone may be hacked.

Sure, smartphones can glitch from time to time, and all devices lose battery power after a while. But is your phone getting unusually hot even when you’re not using it? Do you remember clicking on a suspicious link in a text message and then noticing new apps you didn't download? These are all red flags that your phone’s been hacked.

What is phone hacking?

Phone hacking is any form of unauthorized access to a phone. Hackers may monitor calls, messages, and data usage, or install malicious software to steal personal information like passwords and credit card details.

But the threat doesn’t stop there. Cybercriminals might also spy on your activity or use your phone for their own malicious purposes.

Phone hackers can:

  • Monitor calls, messages, and data usage to acquire personal information.
  • Trick victims into downloading malware apps onto their phones.
  • Send deceptive messages to get personal information and login credentials.
  • Exploit unsecured public Wi-Fi networks to steal data.

5 warning signs of phone hacking

If your phone is displaying any of the following unusual behaviors, there’s a chance it may have been hacked.

1. High data usage

If your phone bill is higher than expected, it could be a sign that malware is running on your phone and eating up data.

Tip: Monitor your data usage, even if you have an unlimited phone plan, to spot signs that somebody hacked your phone.

2. Persistent notifications

If you experience an abundance of inappropriate or annoying pop-ups, you might unknowingly have become the victim of phone hacking. Flashy ads or inappropriate content popping up on your phone is a potential indication of a compromised device.

Additionally, receiving two-factor authentication codes that you didn’t request is a major tell-tale sign someone is trying to access your account.

Tip: If you see a pop-up on your phone, carefully close the window without clicking the pop-up.

3. New apps you didn’t download

While some phones come pre-installed with apps you may not recognize (often called bloatware), these are usually from the manufacturer or carrier and are generally harmless. However, if you discover unfamiliar apps on your phone that you didn't download, it could be a red flag for several reasons:

  • Hidden functionality: Hackers might install seemingly harmless apps that act as backdoors. These apps may appear as games, photo editors, or utilities, but their real purpose is to steal data, spy on your activity, or download additional malware.
  • Distribution of malware: Malicious apps can download and install other malware onto your phone, creating a chain reaction further compromising your device.
  • Remote control: In some cases, hackers might install apps that give them remote control over your phone. That could allow them to access your files, microphone, and camera, or even make calls and send texts at your expense.

Here's what to do if you find unknown apps:

  1. Don't open them: Avoid interacting with unknown apps. Opening them might give them access to more information or functionality on your phone.
  2. Identify and remove: Search for the app online to identify it. If it seems suspicious, immediately uninstall it from your phone.
  3. Scan for malware: Run a malware scan on your phone using a reputable antivirus or anti-malware app to help detect and remove hidden malicious software.


Tip: 
When you see new apps you didn’t download, don't open them and uninstall them immediately.

4. Unrecognized outgoing calls

An accidental dial happens occasionally, but if your outgoing call history is full of calls you don’t remember making, that could be a phone hacking red flag.

Unrecognized calls could be a sign of malware making premium-rate calls that drain your credit and compromise your privacy. Hackers might use your phone to exploit international toll services.

Tip: Look beyond the numbers in your call history and consider the duration, times, and cost of unrecognized calls.

5. A rapidly draining battery

Phone batteries aren’t meant to last forever, but they are designed efficiently. So if your phone use habits have remained the same but your battery is draining more quickly than normal, hacking may be to blame.

Imagine you typically get a full day's use out of your phone on a single charge. Then suddenly, your phone starts dying within a few hours with minimal usage. That could be a sign that hidden malware is running in the background, trying to transmit stolen data or perform other malicious tasks.

Tip: Other causes of a quickly draining battery include an old battery and too many apps running in the background. Troubleshoot your device to get to the root of the problem.

Ways you can tell if your phone has been hacked.

What to do if somebody hacked my phone

If you're dealing with a compromised phone, there are some steps you can take to address it.

Before you start, let your contacts know that somebody hacked your phone and that they shouldn’t click any suspicious-looking links they may have received from you.

Here’s what to do if your phone’s been hacked:

Run anti-malware software

Anti-malware software can help you identify and remove malware from your phone. You should run it regularly, but if you haven’t done so before, now is a good time to start. Norton 360 Deluxe can help protect you from malware and make browsing on your phone safer.

Change your passwords

If your phone was hacked, your login credentials may have been compromised. Once you’ve removed the malware, reset your passwords and create unique passwords for each account.

Delete suspicious apps

Downloading a suspicious app is one way to accidentally infect your phone with malware. If you think someone hacked your phone, take an inventory of your apps and delete anything from a third-party app store or other source (i.e., any app that isn’t available in Apple’s App Store or Google Play).

You should also check to see what data apps have access to so you can change passwords and update personal information if needed. Confirm that any recently downloaded apps came from reputable developers and have good reviews. If they don’t, delete them from your phone.

Reset your phone

A factory reset of your phone can remove most malware, but it will also wipe any data stored on your device, such as photos, notes, and contacts. That’s why it’s important to back up your data before resetting your device.

When resetting your phone, don’t back up your apps, especially if you suspect your phone has malware. Instead, take note of which apps you’d like to re-download and vet them to ensure they’re legitimate.

Follow the instructions below to reset your iPhone or Android.

How to reset an iPhone

A GIF showing how to reset your iPhone after it was hacked.

 

  1. Back up your key files from your phone.
  2. Open the Settings app.
  3. Select General, then Transfer or Reset iPhone, then Erase All Content and Settings.


For more detailed instructions, visit Apple support.

How to reset an Android phone

A GIF showing how to reset your Android after it was hacked.

 

  • Android reset instructions vary by manufacturer. You should visit your phone manufacturer’s website for specific instructions.
  • For most Android phones, you can access the reset option via your Settings menu. Then navigate to General Management to reset your phone.

For more detailed instructions, visit Android Help.

Tips for how to recover after your phone is hacked.

How to protect your phone from hackers

You should always be careful when connecting to public Wi-Fi networks, and investigate any apps you download on your phone. But what other potential attack surfaces can hackers exploit? Here are some other ways to help you keep your phone safe:

  • Don’t save information on your phone unless you’re using a secure app such as a password manager.
  • Create a unique password for your phone that’s not easy to guess.
  • Lock sensitive apps with secure passwords or passcodes.
  • Turn off Bluetooth when you’re not using it.
  • Monitor your phone for unusual activity, like strange pop-ups or high battery usage.
  • Install security patches by downloading software and operating system updates as soon as they’re released.
  • Use reliable software to strengthen the security of your phone.
Three ways criminals can hack your phone.

Staying safe on your mobile device

While the idea of a hacked phone is scary, you can take steps to prevent it or remove a hacker by being smart about what you click, download, and store on your phone.

For added protection, get Norton 360 Deluxe. Built around an industry-leading antivirus engine, Norton 360 Deluxe will help block hackers and keep malware off your device. Plus, it features a built-in VPN to encrypt your internet connection and help you stay safer on public Wi-Fi.

FAQs about phone hacking

Have questions beyond how to know if your phone is hacked? We have answers.

How do phones get hacked?

Smartphone hackers use a variety of methods to compromise cell phones. These include:

Why do hackers hack your phone?

Hackers compromise smartphones to access personal information or communications, often exploiting or selling what they find. Some might aim to steal your identity and use your information for financial gain or fraud. Others might target sensitive messages or images to use for blackmail.

Can you check to see if your phone is hacked?

Yes, antivirus phone software can help you check your phone for signs that you’ve been hacked. Norton has mobile plans for iPhone and Android that can help detect if your phone has been compromised.

Can you remove a hacker from your phone?

Putting your phone in safe mode helps block hackers from accessing your phone, because it isolates the core system apps and disables recently installed apps. Make sure to review your downloads and uninstall anything suspicious.

You can also change your passwords and run antivirus software to strengthen your security and help prevent hackers who might have stolen your information from being able to access your accounts.

You can also remove hackers from your phone by performing a factory reset, which should stop any malicious software from running and delete all data from your device.

Does turning off your phone stop hackers?

Yes, turning off your phone can stop hackers, as most cyberattacks targeting cell phones require the device to be turned on. However, that won’t permanently stop hackers from hacking your phone, and your device could remain a threat once you turn it back on.

Does resetting your phone get rid of viruses?

Yes, a factory reset can help remove a virus from an infected mobile device.

What can a hacker do with your phone number?

Hackers can use compromised phone numbers in order to:

Can someone hack your phone and turn on your camera?

Yes, a cybercriminal can hack a phone to gain access to its camera.

Can hackers hear you?

Yes, hackers may be able to hear you if they’ve gained access to your phone’s camera and microphone.

Does airplane mode block hackers?

Turning on airplane mode can temporarily block hackers while the device is not connected to Wi-Fi or a cellular network.

Clare Stouffer
  • Clare Stouffer
  • Gen employee
Clare Stouffer, a Gen employee, is a writer and editor for the company’s blogs. She covers various topics in cybersecurity.

Editorial note: Our articles provide educational information for you. Our offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about Cyber Safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses. The Norton and LifeLock brands are part of Gen Digital Inc. 

Contents

    Want more?

    Follow us for all the latest news, tips and updates.