Can You Tell If Your Phone Has Been Hacked?
Unfamiliar apps, losing access to your accounts, call and messaging features that suddenly stop working, and performance issues — such as apps crashing, a hot or loud device, and reduced battery life — are all common signs that your phone has been hacked.
While Android devices receive significantly more malware threats than iPhones, all mobile devices can be targeted by cybercriminals.
A 2025 cybersecurity report from mobile security provider Zimperium found that 18.1% of all devices had malware installed.
A hacked mobile device is one of the most dangerous cybersecurity threats of 2025. Scammers target smartphones to gain access to calls and texts (including two-factor authentication codes), apps and accounts (which can include your online banking and email accounts), sensitive data, photos, and videos.
Here are the most common warning signs that your phone has been hacked and how to respond effectively, according to the Federal Trade Commission (FTC), Cybersecurity and Infrastructure Security Agency (CISA), and other mobile security authorities.
12 Warning Signs That Your Phone Is Hacked
Hackers can use a number of methods to hack your phone or online accounts — from malicious links in phishing messages and dangerous apps in third-party app stores, to hacking public Wi-Fi networks or taking over your phone number through a SIM swapping scam.
Regardless of how your phone gets hacked, malware and viruses almost always cause performance issues with phones or services. If you notice any of these warning signs, act quickly to remove the hacker from your phone.
💡 Pro tip: There may be other causes for these warning signs. Use this quick checklist to diagnose where your iOS or Android device has (or hasn’t) actually been hacked:
1. Your phone battery is draining more quickly than usual
Faster than usual battery drain on your phone is a sign that you may have fake or malicious apps running in the background.
Check your phone's battery settings to see which apps are using extra battery life. This can also help you determine if you're dealing with malware or a different issue.
2. Higher than expected data usage on your phone bill
Malware and other viruses may send and receive data in the background, leading to unexpectedly high data usage on your phone bill. You can check which apps are using up your cellular data by going into your phone’s settings and searching for cellular.
3. Performance issues, such as a slow or crashing device
Poor performance, unusual activity, and device crashes are all signs of a compromised phone. If you find apps running sluggishly, or your phone takes too long to open apps, malware could be using up your system's resources.
Do this first: Performance issues aren’t always caused by malware or phone hacks. Sometimes corrupted files or apps need to be reset. On Android devices, you can try rebooting your device in Safe Mode, which will run only a few limited apps and processes. If your device works fine in Safe Mode, you’re dealing with a problematic app that needs to be removed.
4. Your device is abnormally hot
Some malware infections use up so much of your phone’s resources that it may overheat or feel warm to the touch. You can check to see if apps are running in the background and using up your resources. On iPhone, you can simply turn off background app refresh to see if that fixes the issue. Android users need to enable developer options and then look into running services.
📚 Related: How To Check For Viruses on iPhones →
5. Unfamiliar apps on your phone’s home screen
Hackers sometimes disguise malicious software as normal-looking apps. Unfamiliar or suspicious apps on your home screen should be checked and deleted. You can look for newly installed apps in your app library on both Apple and Android devices.
This is especially prevalent for anyone using a jailbroken or rooted device, which allows you to download apps outside of the Apple App Store or Google Play Store.
Pro tip: Beware of strange Bluetooth connections. Hackers can use Bluetooth to take control of nearby devices with open-Bluetooth pairing enabled. Bluetooth hackers can also send malicious links and software via Bluetooth through a type of attack called Bluejacking. Though this is a serious threat, users can easily defend against it by disabling open-Bluetooth connections.
6. Constant notifications or pop-ups
Certain malware known as adware can flood your device with pop-ups and notifications, or even launch apps on their own.
If you’re seeing this kind of suspicious activity on your phone, one place to check for adware is in your mobile browser’s extensions. For example, on iOS devices, go to Settings > Safari > Extensions and delete any unknown extensions that could be causing issues.
📚 Related: How To Remove Adware From Android Devices →
7. You’re locked out of your Apple ID or Google account
If hackers break into your Apple ID or Google account, they can change your passwords and lock you out of your other critical accounts. If you can’t access your Apple or Google account, consider it a major red flag. Immediately follow the account recovery instructions from both Apple and Google.
Pro tip: Use Aura’s free data breach scanner to check if your phone number or passwords were leaked. If your sensitive information is circulating on the Dark Web — such as your name, address, phone number, or Social Security number (SSN) — you could become an easier target for hackers.
8. You can’t log in to your online accounts
Hackers can use malware to spy on you and uncover your account passwords (known as Account Takeover Fraud). If your passwords aren’t working for your email or social media accounts, this could be a sign that your phone was hacked.
Reset your account passwords (with unique and strong passwords), enable two-factor authentication (2FA), and add secure backup accounts.
📚 Related: How To Know If Your Email Has Been Hacked (and What To Do) →
9. You receive 2FA codes you didn’t request
If you receive unrequested two-factor authentication codes, it could be a sign that a hacker is trying to log in to one of your accounts. The good news is that this most likely means that the 2FA security measure is working and your account is safe — for now.
If you receive unusual password reset requests or 2FA codes, perform a security checkup on your Android or iPhone.
10. Your camera or microphone indicator light turns on
Stalkerware and spyware apps can use your phone's camera or microphone to monitor you without your knowledge. If your indicator lights randomly turn on, it could be a sign of a hacked phone.
Look for a green indicator light either in the top middle (iOS) or top right corner (Android) of your screen. This indicates that an app is using your camera and/or microphone. An orange light on iOS indicates that an app is just using your microphone.
Here’s how to check which apps are using your camera or mic to see if they’re malicious:
- On iOS: Pull down from the right corner to reveal your command center. Tap on the app icons in the top middle section to see which ones are using your camera, microphone, or location services.
- On Android: Swipe down from the top of your screen. Tap once on the indicator to see which apps are using your camera or microphone. Tap again to manage permissions.
You should also check your app permissions on your iPhone or Android phone to see if any unfamiliar apps have access to your phone’s camera or microphone.
📚 Related: How Someone Can Track Your Location (and How To Stop Them) →
11. You stop receiving texts or calls
Some scams — such as SIM swapping — allow hackers to take over access to your phone number and reroute text messages and phone calls to their devices. Scammers call your phone provider pretending to be you and request that they transfer your phone number to a device that they own.
- Check your phone and SMS settings. Look for unknown numbers in the forwarded section.
- Look for unfamiliar outgoing calls and texts. This could indicate that someone has remote access to your device.
- Call your mobile phone provider. Ask them to check if anyone has requested a phone number transfer recently.
- Set up a mobile PIN for extra safety. Request that your provider include a PIN or password to protect your account moving forward.
Pro tip: Use USSD codes to check if someone has set up call forwarding. You can dial special codes to check your phone’s settings — these work across both iOS and Android devices.
The most useful USSD codes include: *#21# which checks for unconditional forwarding, and *#62# , which checks where calls are forwarded when unreachable. This will give you a concrete answer as to whether or not your phone has been compromised.
12. Websites look different or distorted
A more subtle sign that your device has been hacked is if websites suddenly look different or appear distorted. This could mean that malware is redirecting your web traffic through a malicious proxy server (also known as an "evil proxy"), which allows hackers to spy on you or intercept data that you submit to websites (including your passwords).
How To Remove a Hacker From Your Phone
If you’ve seen any of these warning signs and have determined that it’s not a device issue, you’ll want to take steps to remove any malicious apps or unwanted access to your phone and accounts.
Note: It’s important to follow these steps in chronological order to ensure they’re effective. For example, if hackers have installed keylogger malware on your device (that tracks everything you type) and you update an account password, they’ll still have access to your account.
- Isolate your device. Most malware requires an internet connection to operate and send data back to hackers. Disconnect your phone from both Wi-Fi and cellular data to sever the connection.
- Secure your accounts from a safe device. Before you remove malware, make sure critical accounts — email, online banking, Apple ID or Google account, social media, etc. — are secure. Use a separate, uncompromised device, such as a laptop or iPad, to regain access to compromised accounts and update your passwords and 2FA settings.
- Scan your phone by using antivirus software. Only Android devices can install and run anti-malware software. iOS devices don’t allow third-party apps to scan for viruses, and any security app that markets itself as “antivirus for iPhones” is being dishonest.
- Manually remove suspicious apps. Uninstall apps you don’t recognize or ones that are using up resources. If you’re unsure about an app's usefulness, research it online or in the Google Play Store or iOS App Store.
- Review app permissions. For remaining apps on your device, check their permissions and revoke any that seem excessive (for example, location data, access to your contacts, camera or microphone access, etc.). iOS users can use Apple’s Safety Check feature.
- Remove unrecognized devices from your accounts. If hackers have logged in to your accounts by using their devices, you’ll be able to see and remove them from the your devices section of your Google account or your Apple ID device list.
- Clear your browsing history, cache, and downloads. Malware can hide in areas of your phone that you don’t normally check. Clear your browsing history and cache, as well as your downloads, to remove hidden malicious software.
- Notify friends, family, and financial institutions. A hacked device can put others at risk. Tell your contacts not to trust strange messages from you (especially if they contain links), and report the fraud to your bank and credit card company. You may also want to consider freezing your credit with all three major credit bureaus (Experian, Equifax, and TransUnion), and file an official identity theft report with the FTC at IdentityTheft.gov.
- The nuclear option: Reset your phone to its factory settings. If you’re dealing with lingering issues, you may need to perform a factory reset on your phone. Note that this step will wipe all files and settings from your phone — so make sure you have a secure (and virus-free) backup.
Unfortunately, it’s almost impossible to know the full extent of the damage caused by a hacked phone.
Once you’ve cleared up any malicious apps and hacked accounts, take steps to protect yourself against identity theft, fraud, and further scams.
How To Protect Your Phone From Hackers and Malware
The best way to protect yourself from hackers is to recognize and avoid their attacks. Make sure you only download apps from official app stores, don’t click on suspicious links, and be on the lookout for warning signs indicating that someone is trying to scam you online.
Then, follow these best practices to keep your devices and accounts secure:
- Keep your operating system and apps updated to block hackers from using known vulnerabilities
- Use ad-blockers to prevent malicious ads from stealing your data or serving you adware
- Set up a SIM lock or SIM PIN to prevent scammers from using your SIM on other devices
- Ask your mobile service provider about port protection (such as T-Mobile's Port Out Protection), which can prevent SIM swap attacks
- Use strong passwords, and store them in a password manager for safe keeping, easy access, and to receive warnings if your credentials are leaked in a data breach — follow CISA’s strong password guidance for best results
- Enable 2FA by using an authenticator app, such as Authy, to prevent hackers from intercepting your 2FA codes sent via text messages
- Use mobile security tools, such as antivirus (on Android devices), a VPN, and Safe Browsing tools that will warn you of phishing links
- Activate biometric security, such as fingerprint ID or Face ID, to make it more difficult for criminals to access your device if it’s stolen
- Lock your phone when you’re not using it (the FTC advises using a six-digit passcode)
- Maintain regular backups to ensure that you have a virus-free version to revert to if you get hacked
- Avoid jailbreaking or rooting your device, as this can make you more vulnerable to hacking and malicious apps
Lastly, consider safeguarding your devices, identity, and finances with an all-in-one solution. Aura’s award-winning identity theft protection service combines device security tools with identity and credit monitoring, 24/7 U.S.-based support, and up to $1 million in identity theft insurance.


