logo
Skip to main content

Phone hacked? Here's what to do: step-by-step guide

What to do if your phone has been hacked

Fast fix

  • Go offline: Turn off Wi-Fi and cellular data.
  • Turn off Bluetooth.
  • Change your primary account passwords from another device.

You hear about hacking all the time, but no one ever really expects their devices to get hacked. Unfortunately, it can happen to anyone—including you.

If you suspect your phone has been hacked, the most important thing is to stay calm and take steps to regain control. You also need to confirm whether there’s actually a problem.

Asurion Experts are here to support you. Our experts have helped millions of customers protect their devices and get more out of them, so we know the best steps to take. Follow our guide on what to do if your phone is hacked.

How to tell if your phone is actually hacked

One of the worst things about hackers is that they’re sneaky with their attacks. You probably won’t see an alert that says, “We’ve hacked your phone, it’s ours now!” Malware can run in the background on your device, stealing data and putting you at risk without you ever knowing.

That’s why it’s so important to look out for subtle warning signs that your phone has been hacked, such as:

  • Faster than usual battery drain
  • Unexpected overheating
  • Strange pop-up ads
  • High data usage that you can’t explain
  • New apps appearing on your phone that you didn’t download
  • Unauthorized app charges or financial transactions
  • Sent messages from your account that you did not write or send

If you notice any of these signs, especially together, you should assume your phone has been hacked. Always stay alert so you can spot potential hacking attempts as soon as possible and take action to remove a virus from your iPhone® or Android® device.

Focus on these immediate steps to prevent additional damage from the hacker:

  1. Put your phone in Airplane Mode or simply turn off Wi-Fi, cellular data, and Bluetooth.
  2. On a different device, change the passwords for your important accounts on your phone, like your Apple ID/Google Play account and your bank account.
  3. Let friends and family know to ignore messages from your phone for the time being, as they may be phishing scams.

Don’t waste time scrolling

Life is short. Ask our experts and get answers now.

Remove malicious access and suspicious apps

Your next step should be to identify suspicious apps on your phone. These apps could be stealing your data and sending it back to cybercriminals who will sell or otherwise exploit it.

Start by looking for any apps that have appeared suddenly or that you don’t remember downloading. Uninstall them right away.

You also have to consider that apps that seem legitimate could be fronts for hackers. In Settings, check app permissions. Make sure your apps only have permission to access things like your phone contacts, SMS, or microphone if absolutely necessary.

Try using a security scan app like Norton to help you find malicious files on your phone. These scanners can save you time in identifying and deleting apps or files that hackers are using to gain access to your data.

Also, check whether the hackers have set up call or message forwarding on your phone. You can go into Settings or dial *#21#. If you see a number you don’t recognize on the call forwarding list, dial ##002# to instantly stop all forwarding.

Factory reset your device as a last resort. The reset should wipe all data and settings, including malware from hackers.

Prevent future hacks with better device habits

It often takes time to untangle the web of security concerns when your phone gets hacked. While you can often take back control of your phone and your accounts, it’s better to avoid the problem in the first place.

Reduce your risk of phone hacks and keep the information on your phone safe with these tips:

  • Update software: Install new operating system and app updates as they become available, as updates often patch the vulnerabilities that hackers use to gain access.
  • Enable two-factor authentication (2FA): With 2FA, you need a password and another form of identification (like your mobile device or fingerprint) to access your accounts.
  • Use unique passwords: Use different, strong passwords for each of your online accounts.
  • Only download trusted apps: If an app looks suspicious, don’t download it. Look for apps with lots of positive reviews.

Hackers are often looking for the easy way into your device and accounts, so these protective steps go a long way.

Tried these steps and still need help? We got you. Get your tech problem solved when you call or chat with an expert now.


The Asurion® trademarks and logos are the property of Asurion, LLC. All rights reserved. All other trademarks are the property of their respective owners. Asurion is not affiliated with, sponsored by, or endorsed by any of the respective owners of the other trademarks appearing herein.

  • SHARE THIS ARTICLE