How to know if your phone is hacked: 5 warning signs and protection tips
If you suddenly see a surge of pop-up ads, unfamiliar apps on your phone, or a rapidly draining battery, you might be justified in thinking that your phone has been hacked. Learn to recognise the warning signs of phone hacking, and get rock-solid protection with Norton 360 Deluxe.
Sure, smartphones can glitch from time to time, and all devices lose battery power after a while. But is your phone getting unusually hot even when you’re not using it? Do you remember clicking on a suspicious link in a text message and then noticing new apps you didn't download? These are all red flags that your phone’s been hacked.
What is phone hacking?
Phone hacking is any form of unauthorised access to a phone. Hackers may monitor calls, messages, and data usage, or install malicious software to steal personal information like passwords and credit card details.
But the threat doesn’t stop there. Cybercriminals might also spy on your activity or use your phone for their own malicious purposes.
Phone hackers can:
- Monitor calls, messages, and data usage to acquire personal information.
- Trick victims into downloading malware apps onto their phones.
- Send deceptive messages to get personal information and login credentials.
- Exploit unsecured public Wi-Fi networks to steal data.
5 warning signs of phone hacking
If your phone is displaying one of the following unusual behaviours, and especially if it’s displaying more than one, there’s a good chance it may be hacked. Here are some warning signs to know if your phone is hacked:
1. High data usage
If your phone bill is higher than expected, it could be a sign that malware is running on your phone and eating up data.
Tip: Monitor your data usage, even if you have an unlimited phone plan, to spot signs that somebody hacked your phone.
2. Persistent pop-ups
If you experience an abundance of inappropriate or annoying pop-ups, you might unknowingly have become the victim of phone hacking. Flashy adverts or inappropriate content popping up on your phone is a potential indication of a compromised device.
Additionally, receiving two-factor authentication codes that you didn’t request is a major tell-tale sign someone is trying to access your account.
Tip: If you see a pop-up on your phone, carefully close the window without clicking the pop-up.
3. New apps you didn’t download
While some phones come pre-installed with apps you may not recognise (often called bloatware), these are usually from the manufacturer or carrier and are generally harmless. However, if you discover unfamiliar apps on your phone that you didn't download, it could be a red flag for several reasons:
- Hidden functionality: Hackers might install seemingly harmless apps that act as backdoors. These apps may appear as games, photo editors, or utilities, but their real purpose is to steal data, spy on your activity, or download additional malware.
- Distribution of malware: Malicious apps can download and install other malware onto your phone, creating a chain reaction further compromising your device.
- Remote control: In some cases, hackers might install apps that give them remote control over your phone. That could allow them to access your files, microphone, and camera, or even make calls and send texts at your expense.
Here's what to do if you find unknown apps:
- Don't open them: Avoid interacting with unknown apps. Opening them might give them access to more information or functionality on your phone.
- Identify and remove: Search for the app online to identify it. If it seems suspicious, immediately uninstall it from your phone.
- Scan for malware: Run a malware scan on your phone using a reputable antivirus or anti-malware app to help detect and remove hidden malicious software.
Tip: If you see a pop-up on your phone, carefully close the window without clicking the pop-up.
4. Unrecognised outgoing calls
An accidental dial happens occasionally, but if your outgoing call history is full of calls you don’t remember making, that could be a phone hacking red flag.
Unrecognised calls could be a sign of malware making premium-rate calls that drain your credit and compromise your privacy. Hackers might use your phone to exploit international toll services.
Tip: Look beyond the numbers in your call history and consider the duration, times, and cost of unrecognised calls.
5. Battery draining quickly
Phone batteries aren’t meant to last forever, but they are designed efficiently. So if your phone use habits have remained the same but your battery is draining more quickly than normal, hacking may be to blame.
Imagine you typically get a full day's use out of your phone on a single charge. Then suddenly, your phone starts dying within a few hours with minimal usage. That could be a sign that hidden malware is running in the background, trying to transmit stolen data or perform other malicious tasks.
Tip: Other causes of a quickly draining battery include an old battery and too many apps running in the background. Troubleshoot your device to get to the root of the problem.
What to do if somebody hacked my phone
If you're dealing with a compromised phone, there are some steps you can take to address it.
Before you start, let your contacts know that somebody hacked your phone and that they shouldn’t click any suspicious-looking links they may have received from you.
Here’s what to do if your phone’s been hacked:
Run anti-malware software
Anti-malware software can help you identify and remove malware from your phone. You should run it regularly, but if you haven’t done so before, now is a good time to start. Norton 360 Deluxe can help protect you from malware and make browsing on your phone safer.
Change your passwords
If your phone was hacked, your login credentials may have been compromised. Once you’ve removed the malware, reset your passwords and create unique passwords for each account.
Tip: Use Norton’s password generator to strengthen your passwords.
Delete suspicious apps
Downloading a suspicious app is one way to accidentally infect your phone with malware. If you think someone hacked your phone, take an inventory of your apps and delete anything from a third-party app store or other source (i.e., any app that isn’t available in Apple’s App Store or Google Play).
You should also check to see what data apps have access to so you can change passwords and update personal information if needed. Confirm that any recently downloaded apps came from reputable developers and have good reviews. If they don’t, delete them from your phone.
Reset your phone
A factory reset of your phone can remove most malware, but it will also wipe any data stored on your device, such as photos, notes, and contacts. That’s why it’s important to back up your data before resetting your device.
When resetting your phone, don’t back up your apps, especially if you suspect your phone has malware. Instead, take note of which apps you’d like to re-download and vet them to ensure they’re legitimate.
Follow the instructions below to reset your iPhone or Android.
How to reset an iPhone
- Back up your key files from your phone.
- Open the Settings app.
- Select General, then Transfer or Reset iPhone, then Erase All Content and Settings.
For more detailed instructions, visit Apple support.
How to reset an Android phone
- Android reset instructions vary by manufacturer. You should visit your phone manufacturer’s website for specific instructions.
- For most Android phones, you can access the reset option via your Settings menu. Then navigate to General Management to reset your phone.
For more detailed instructions, visit Android Help.
How to protect your phone from hackers
You should always be careful when connecting to public Wi-Fi networks, and investigate any apps you download on your phone. But what other potential attack surfaces can hackers exploit? Here are some other ways to help you keep your phone safe:
- Don’t save information on your phone unless you’re using a secure app such as a password manager.
- Create a unique password for your phone that’s not easy to guess.
- Lock sensitive apps with secure passwords or passcodes.
- Turn off Bluetooth when you’re not using it.
- Monitor your phone for unusual activity, like strange pop-ups or high battery usage.
- Install security patches by downloading software and operating system updates as soon as they’re released.
- Use reliable software to strengthen the security of your phone.
Staying safe on your mobile device
While the idea of a hacked phone is scary, you can take steps to prevent it or remove a hacker by being smart about what you click, download, and store on your phone.
For added protection, get Norton 360 Deluxe. Built around an industry-leading antivirus engine, Norton 360 Deluxe will help block hackers and keep malware off your device. Plus, it features a built-in VPN to encrypt your internet connection and help you stay safer on public Wi-Fi.
FAQ about if your phone is hacked
Have questions beyond how to know if your phone is hacked? We have answers.
How do phones get hacked?
Smartphone hackers use a variety of methods to compromise cell phones. These include:
Why do hackers hack your phone?
Hackers compromise smartphones to access personal information or communications, often exploiting or selling what they find. Some might aim to steal your identity and use your information for financial gain or fraud. Others might target sensitive messages or images to use for blackmail.
Can you check to see if your phone is hacked?
Yes, antivirus phone software is often able to check your phone for signs you’ve been hacked. Norton has mobile plans for iPhone and Android that can help detect if your phone has been compromised.
Can you remove a hacker from your phone?
Putting your phone in safe mode helps block hackers from accessing your phone, because it isolates the core system apps and disables recently installed apps. Make sure to review your downloads and uninstall anything suspicious.
You can also change your passwords and run antivirus software to strengthen your security and help prevent hackers who might have stolen your information from being able to access your accounts.
You can also remove hackers from your phone by performing a factory reset, which should stop any malicious software from running and delete all data from your device.
Does turning off your phone stop hackers?
Yes, turning off your phone can stop hackers, as most cyberattacks targeting cell phones require the device to be turned on. However, that won’t permanently stop hackers from hacking your phone, and your device could remain a threat once you turn it back on.
Does resetting your phone get rid of viruses?
Yes, a factory reset can help remove a virus from an infected mobile device.
What can a hacker do with your phone number?
Hackers often compromise phone numbers in order to:
- Verify two-factor authorisation requests
- Send malicious links
- Complete vishing attacks
Can someone hack your phone and turn on your camera?
Yes, cybercriminals can hack a phone to gain access to its cameras.
Can hackers hear you?
Yes, hackers may be able to hear you if they’ve gained access to your phone’s camera and microphone.
Does airplane mode block hackers?
Turning on airplane mode can temporarily block hackers while the device is not connected to Wi-Fi or a cellular network.
Editorial note: Our articles provide educational information for you. Our offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about Cyber Safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses. The Norton and LifeLock brands are part of Gen Digital Inc.
Want more?
Follow us for all the latest news, tips and updates.