facebook-pixel

How to Know if Your Phone Is Hacked: 10 Warning Signs

L
Lunyb Security Team
··9 min read

Smartphones store our most sensitive data: banking apps, private messages, photos, location history, and saved passwords. When a phone gets hacked, attackers can steal money, impersonate you, spy on your conversations, or hold your data for ransom. The good news is that hacked phones almost always show symptoms before serious damage occurs.

This guide explains how to know if your phone is hacked, walks through the 10 most common warning signs on both iPhone and Android, and shows you exactly what to do if you suspect a compromise.

What Does It Mean When a Phone Is "Hacked"?

A hacked phone is a device that has been accessed, controlled, or monitored by an unauthorized third party. This usually happens through malware, spyware (stalkerware), phishing links, malicious apps, SIM-swap attacks, or stolen account credentials. Unlike a virus on a desktop, mobile hacks are often quiet by design — the attacker wants to stay hidden so they can keep collecting data.

Hacks generally fall into four categories:

  • Malware/spyware infections — apps secretly recording activity.
  • Account takeovers — your Apple ID, Google account, or iCloud is compromised.
  • Network-based attacks — rogue Wi-Fi or man-in-the-middle interception.
  • SIM swapping — attackers port your number to their device to bypass 2FA.

10 Warning Signs Your Phone Is Hacked

Below are the most reliable red flags. One sign alone isn't proof, but two or more occurring together strongly suggests a compromise.

1. Battery Drains Much Faster Than Usual

Spyware runs in the background continuously — recording audio, tracking GPS, or uploading data — which burns battery quickly. If your phone went from a full day of usage to dying by lunchtime without any new heavy apps, that's a classic indicator. Check Settings > Battery on iPhone or Settings > Battery > Battery usage on Android to see which apps are consuming power. Anything unfamiliar near the top of the list deserves investigation.

2. The Phone Feels Hot Even When Idle

A device that's warm while just sitting on the table — not charging, not gaming, not streaming — is doing work in the background. Hidden processes uploading data or mining cryptocurrency are common culprits. Occasional warmth is normal; persistent heat is not.

3. Mobile Data Usage Has Spiked

Spyware sends recordings, screenshots, and logs to a remote server, which consumes data. Open your data usage breakdown and look for unfamiliar apps or system processes using hundreds of megabytes. A sudden, unexplained jump in monthly mobile data is one of the most reliable hacking indicators.

4. Unfamiliar Apps You Don't Remember Installing

Scroll through your full app list — including the App Library on iPhone or the app drawer on Android. Look for:

  • Apps with generic names like "System Service," "Device Health," or blank icons.
  • Duplicates of legitimate apps.
  • Apps with broad permissions (microphone, camera, accessibility) you didn't grant.

On Android, also check Settings > Apps > Special access > Device admin apps. Stalkerware often hides here.

5. Pop-ups, Redirects, and Strange Browser Behavior

If your browser constantly redirects to ad pages, opens new tabs on its own, or your homepage changed without your input, adware or a malicious profile may be installed. On iPhone, check Settings > General > VPN & Device Management for unknown configuration profiles — these are a major red flag.

6. Sent Texts or Calls You Didn't Make

Look in your message history and call logs for outgoing communications you don't recognize, especially to premium-rate numbers or international destinations. Friends asking about a weird link you supposedly sent is a strong sign your accounts (or device) are being used to spread malware. Always verify shortened links before clicking — trusted shorteners like Lunyb include click analytics and security checks so suspicious activity is easier to spot.

7. Performance Has Dropped Off a Cliff

Sluggishness, frequent crashes, frozen screens, and apps that take forever to open can all point to malicious processes consuming resources. Restart the phone first to rule out simple memory issues. If problems persist after a reboot and an OS update, treat it as suspicious.

8. Your Accounts Show Logins From Unknown Locations

Check the security pages of your major accounts:

  • Google: myaccount.google.com → Security → Your devices
  • Apple: appleid.apple.com → Devices
  • Facebook/Instagram: Security > Where you're logged in

Sign-ins from cities you've never visited mean your credentials are compromised, even if the phone itself is clean.

9. You Stop Receiving Calls or Texts (Possible SIM Swap)

If your phone suddenly shows "No Service" in an area where it normally works, and a restart doesn't fix it, an attacker may have transferred your number to their SIM. Within minutes they can intercept SMS-based 2FA codes and break into your bank, email, and crypto accounts. Contact your carrier immediately from another phone.

10. The Phone Won't Shut Down Properly or Behaves Erratically

Lights turning on by themselves, the screen waking up randomly, the device taking unusually long to power off, or strange background noises during calls can all indicate remote control or active surveillance. While some of these have innocent explanations, combined with other signs they point toward compromise.

iPhone vs. Android: Which Is More Likely to Be Hacked?

Both platforms can be hacked, but the attack surface differs.

Factor iPhone (iOS) Android
Sideloaded apps Rare (App Store only by default) Common, higher malware risk
Spyware/stalkerware Usually requires iCloud credentials or jailbreak Can be installed directly with physical access
OS update consistency Fast, uniform across devices Varies by manufacturer
Phishing & account takeover Equally vulnerable Equally vulnerable
SIM-swap risk Identical — depends on carrier, not OS Identical — depends on carrier, not OS

iPhones are harder to infect with traditional malware, but iCloud account compromise is just as devastating. Android offers more flexibility, which also means more ways to make a mistake.

How to Confirm Your Phone Is Hacked

Before doing a factory reset, run through this checklist to confirm:

  1. Update your OS. Many "hacks" are old vulnerabilities that an update patches.
  2. Run a reputable mobile security scan. Bitdefender, Malwarebytes, Norton, or Kaspersky offer mobile apps that detect known spyware.
  3. Review installed profiles (iPhone). Settings > General > VPN & Device Management. Remove anything you don't recognize.
  4. Audit app permissions. Revoke microphone, camera, location, and accessibility access for anything that doesn't truly need it.
  5. Check active sessions on Google/Apple ID. Sign out anything unfamiliar.
  6. Look at battery and data usage by app for unexplained heavy users.

What to Do if Your Phone Is Hacked

If you've confirmed (or strongly suspect) a compromise, act quickly. Order matters here.

Step 1: Disconnect From the Internet

Turn on Airplane Mode. This stops data exfiltration immediately and prevents the attacker from receiving more information while you clean up.

Step 2: Remove Suspicious Apps and Profiles

Uninstall any unfamiliar apps. On iPhone, delete unknown configuration profiles. On Android, revoke device admin access before uninstalling — stalkerware often blocks removal otherwise.

Step 3: Change Your Critical Passwords (From a Different Device)

Use a clean computer or another phone to change passwords for:

  • Apple ID / Google account
  • Primary email
  • Banking and payment apps
  • Social media

Enable app-based two-factor authentication (Authy, Google Authenticator) instead of SMS where possible.

Step 4: Contact Your Mobile Carrier

Add a SIM-swap PIN or port-out lock to your account. Most major carriers offer this for free but don't enable it by default.

Step 5: Factory Reset If Symptoms Persist

If suspicious behavior continues after the steps above, perform a factory reset. Do not restore from a recent backup — set up the phone fresh and reinstall apps individually. Restoring a compromised backup can reintroduce the malware.

Step 6: Monitor Bank and Credit Activity

Watch for unauthorized charges for at least 60 days. Place a fraud alert with credit bureaus if financial accounts may have been accessed.

How to Prevent Your Phone From Being Hacked

Prevention is far easier than recovery. The following habits eliminate the vast majority of mobile threats:

  • Install OS and app updates within a week of release.
  • Only install apps from the official App Store or Google Play.
  • Use a unique, strong password for your Apple ID / Google account, plus 2FA.
  • Be skeptical of unsolicited links in SMS, email, WhatsApp, or social DMs. When sharing or receiving links, prefer reputable URL shorteners with built-in safety scanning — see our comparison of the best URL shorteners in 2026 for trustworthy options.
  • Avoid public Wi-Fi for sensitive tasks, or use a reputable VPN.
  • Lock your SIM with a port-out PIN at your carrier.
  • Review app permissions every few months and remove anything you no longer use.
  • Don't jailbreak or root your daily device — it disables core security protections.

When to Call a Professional

If you're a journalist, executive, activist, or anyone who could be targeted by sophisticated spyware (like Pegasus), a factory reset may not be enough. Organizations such as Access Now's Digital Security Helpline and Amnesty International's Security Lab offer free forensic assistance. For business devices, your IT/security team should image the phone before wiping it so evidence is preserved.

Frequently Asked Questions

Can someone hack my phone just by knowing my number?

In nearly all cases, no — knowing your number alone isn't enough to install malware. However, your number can be used for SIM-swap attacks, phishing texts, or social engineering against your carrier. Keep your number off public profiles where possible and add a carrier port-out PIN.

Will a factory reset remove a hacker from my phone?

Yes, in almost every consumer-level case. A factory reset wipes installed apps, spyware, and malicious profiles. The exceptions are extremely rare nation-state implants and cases where you restore from an infected backup or sign back into a compromised cloud account without changing the password first.

Can my phone be hacked just by clicking a link?

It's uncommon but possible. Most malicious links lead to phishing pages that try to steal credentials — clicking alone usually doesn't install malware. However, "zero-click" and "one-click" exploits do exist on unpatched devices, which is why keeping your OS updated is so important.

Does *#21# or *#62# tell me if my phone is hacked?

No. These codes show call-forwarding settings, not hacking status. They've gone viral on social media but provide no meaningful security information. Rely on the warning signs and verification steps in this guide instead.

How can I tell if someone is reading my texts?

Check for unfamiliar devices signed into your iMessage or Google Messages account, look for unknown configuration profiles (iPhone) or device admin apps (Android), and review whether SMS forwarding is enabled. If your messages are showing as "read" before you open them, that's a strong indicator another device is logged in.

Final Thoughts

Knowing how to recognize a hacked phone is a core digital-safety skill in 2026. The 10 warning signs above — battery drain, overheating, data spikes, unknown apps, redirects, unauthorized messages, sluggishness, suspicious account logins, sudden loss of service, and erratic behavior — cover virtually every common attack pattern. Combine vigilance with good habits (updates, strong passwords, app-based 2FA, careful link handling), and your phone becomes a very hard target.

If you found this guide useful, you may also like our deep-dive on whether Lunyb is a legitimate URL shortener, since safe link handling is one of the most overlooked parts of mobile security.

Protect your links with Lunyb

Create secure, trackable short links and QR codes in seconds.

Get Started Free

Related Articles