Get expert advice delivered straight to your inbox.

Skip to Main Content

What to Do if Your Phone Is Hacked

Listen to this article

Think about it. Once your phone is hacked, a complete stranger can go through your private contact list and your bank details, pretend they’re you, and do anything they want with your life. The potential personal and financial setbacks are so scary that it’s almost not worth having a smartphone.

But they’re so darn convenient! You can do almost anything with a smartphone. It’s like having a personal minicomputer in your pocket. We’ve gotten so used to accomplishing daily to-do list items without leaving the couch, the thought of driving to the bank to make a simple deposit seems ridiculous.

But what happens when our precious personal minicomputers are hacked? Is it the beginning of a long nightmare?

It doesn’t have to be. We’ll explain step-by-step exactly what to do if your phone has been hacked.

How to Know if Your Phone Was Hacked

First, what exactly is phone hacking? It’s when someone forces their way (digitally) into your phone. Once a cybercriminal accesses your phone, all the personal details inside your phone are exposed.

Got a gut feeling that your phone has been hacked? Let’s go over some red flags that might prove your hunch.

Loses Its Charge Quickly

If you notice that the little battery indicator at the top of your phone screen drains more quickly than usual, it could be a sign that your phone has been hacked. Malicious apps and malware use a lot of battery power.

Or maybe your phone is just getting old? Could be. But either way, it’s not a good sign.

Runs Abnormally Slowly or Feels Hot

All smartphones run slowly occasionally. Maybe it’s just from a temporary network problem or maybe you have too many open apps and programs? Maybe. Maybe not.

If slow performance is due to hacker activity, it’s because when malware is running, it’s like having a second person using your phone and taking up all your processing power. So, if your phone is abnormally slow, or if it feels hot to the touch, it could mean that your phone is working overtime because it’s been hacked.

Strange Activity on Your Online Accounts

Big red flag here. If you see weird activity in your bank statement or social media accounts, it’s a possible sign that a hacker has hijacked your phone. Once they gain access, they can use your phone (virtually) to transfer data, make purchases, send messages or make phone calls and pretend they’re you. Yikes!

Unfamiliar Apps, Calls or Texts

Sometimes we forget which app we installed. Or even which text we sent to who. It happens. But typically, it doesn’t happen repeatedly.

If you notice frequent unfamiliar app, text or phone call activity, chances are your phone has been hacked. Hackers can potentially impersonate you to steal personal information from your loved ones. Be wary here. This can have widespread consequences.

It’s true that some of these indicators are just typical smartphone glitches. But be on the lookout—if you notice one or more of these red flags appear consistently, it likely means your phone has been hacked and it’s time to take action.

 

start-icon

What's your risk of identity theft?

Take this quiz to assess your risk.


My Phone Was Hacked. How Do I Fix It?

Now that you’ve learned how to identify if someone hacked your phone, it’s time to make things right. Here are some easy steps for removing those cybercriminal activities from your phone and getting it back to normal.

1. To start, install and run security software on your phone.

Doing this will tell you which apps, calls or texts are risky and should be deleted. If you’re an iPhone user, you get a pass here because iPhones have built-in malware protection.

Try 30 days of identity theft protection free from our RamseyTrusted provider.

If you’re an Android user, Google’s Protect app is built into the Android operating system, and it’s free. It’s the least expensive way to find and remove Android phone viruses. Note: A third-party tool might offer a more secure option.

Here’s how to use Google Protect:

  1. Open the Google Play Store.
     
  2. Open the menu button by tapping on the profile icon in the top-right corner of your screen. 
    what to do if your phone is hacked
     
  3. Select Play Protect. 
    what to do if your phone is hacked
     
  4. Tap Scan. Your phone will check for Android malware. 
    what to do if your phone is hacked

     
  5. If harmful app(s) are found, you’ll be prompted to remove them. Select Uninstall.
    what to do if your phone is hacked
     
  6. After you’ve deleted the risks, run the Protect app again to make sure your phone is now risk-free.

Once you successfully remove the malware, take a look at identity theft protection from Zander, a RamseyTrusted provider. They offer proactive monitoring, so your phone never gets hacked again.

2. Next, check your bank accounts and your credit card statements.

Check to see if any unauthorized purchases have been made. If your accounts have been hacked, know that cleaning up an identity fraud situation could take years to handle on your own. We recommend identity theft protection from Zander. They’re RamseyTrusted and can assign a qualified person to clean up the mess for you.

3. If you still have issues, wiping and then restoring your phone is an option.

This step should be a last resort. But before you do this, make sure you have a recent backup of your photos, contacts and all other vital information, because you’re about to permanently remove them from your phone. A quick online search will lead you to instructions for wiping and restoring your phone.

Interested in learning more about identity theft?

Sign up to receive helpful guidance and tools.

By submitting this form you are agreeing to the Ramsey Solutions Terms of Use and Privacy Policy.

How to Protect Your Phone From Getting Hacked Again

Phew! The hard part is over. Let’s make sure your phone never gets hacked again. We put together a list of easy tips to keep your phone safe.

Don’t Download Sketchy Software (Including Apps)

There are two simple ways to tell if you’re about to download sketchy software. The first way is to look at the domain name of the website you’re on (the domain name is in your browser’s address field toward the top of your screen). If you don’t see a recognizable domain name like microsoft.com or ibm.com, investigate further.

Next read the reviews. Internet reviewers are typically very up-front about their experiences online. If the review warnings sound legit, don’t download the software.

Always Keep Your Phone with You

This one’s easy. Physical access to your phone is the fastest way for hackers to do their thing. Once they have your phone, it only takes a day for them to break into it and hijack your contacts list, passwords, bank account details and anything else they consider valuable. Don’t make it easy for them—keep your phone with you at all times.

Always Use a Passcode Lock

Yes, it’s super annoying to enter a passcode every time you want to use your phone. But passcodes add a critical layer to preventing cybercriminal activity. And remember not to use any easy passcodes like your birthday or your street address—instead, think of a number that only you know about.

Avoid Public Charging Stations

Charging your phone at a public station might seem convenient at the time, but beware, hackers are lying in wait to pounce. They install malware into the charging station—just waiting for you to come along and innocently connect your phone.

Seems like a weird thing to do, right? Yes. But remember that lots of hackers make their living stealing people’s identities off of their phones and using stolen passwords to hack into bank accounts and steal money.

Always Enable Two-Factor Authorization

Okay. We admit it. Two-factor authorization (2FA) used to be a pain. The first step required you to remember your username and password and type it correctly. Then you had to retrieve a code from your phone, and again, remember it, and type it into the screen prompt correctly. Grrr.

But hold on, 2FA has gotten much easier. Biometrics like fingerprints and face ID have made it much simpler. What could be easier than shoving your face in front of your phone to prove it’s really you?

No more excuses. 2FA is well worth the effort and is now a simple way to add an extra layer of protection to your phone.

Protect Yourself From Cybercriminals

Don’t be an easy mark for criminal activity. There’s a smart way to proactively safeguard yourself and your loved ones from the nightmare of phone hacking and stolen identity.

Check out identity theft protection from RamseyTrusted provider Zander. They’ll monitor all your devices and notify you when/if they’re at risk and provide complete recovery services if needed.

Get IDT for your entire family for 12 dollars and 90 cents per month or 145 dollars per year.Get IDT for your entire family for 6 dollars and 75 cents per month or 75 dollars per year.

Did you find this article helpful? Share it!

Ramsey Solutions

About the author

Ramsey

Ramsey Solutions has been committed to helping people regain control of their money, build wealth, grow their leadership skills, and enhance their lives through personal development since 1992. Millions of people have used our financial advice through 22 books (including 12 national bestsellers) published by Ramsey Press, as well as two syndicated radio shows and 10 podcasts, which have over 17 million weekly listeners. Learn More.

Related Articles

A man is taking a photo of a check to deposit it in his online bank account.
Banking

Are Online Banks Safe?

Just like brick and mortar banks, online banks can get robbed. But when you do your homework, you can choose one you can trust. We’ll show you how to keep your money safe.

Ramsey Ramsey
How to Avoid Debit Card Fraud
Banking

How to Avoid Debit Card Fraud

Debit card fraud is real, and it happens every day. Luckily, there are steps you can take to make sure you and your family are protected.

Ramsey Ramsey
types of fraud
Insurance

9 Common Types of Fraud

Don't just assume you're not at risk—you are. Keep you and your family safe by looking out for these scams.

George Kamel George Kamel