Tech Made Simple

Hot Topics: How to Fix Bluetooth Pairing Problems | Complete Guide to Facebook Privacy | How to Block Spam Calls | REVIEW: RadMission 1 eBike

author photo

How to Tell if Your Phone Has Been Cloned

by on March 30, 2020
in Tips & How-Tos, Phones and Mobile, Privacy :: 76 comments

Techlicious editors independently review products. To help support our mission, we may earn affiliate commissions from links contained on this page.

Our phones are the key to our digital identity, so it’s no wonder that mobiles have become increasingly attractive targets for cybercriminals, who have at their disposal a fair number of ways to hack a smartphone, some of which require more access and technical savvy than others.

Phone cloning – or the copying of the identification credentials a phone uses to connect to cellular networks – is one method that usually requires the perpetrator to have direct access to a device.  That makes it less prevalent than, say, hacking an operating system vulnerability that hasn’t been updated, but the consequences are equal to that of most phone hacks – your personal data is exposed, with potential financial consequences or identity fraud.

What is phone cloning?

It’s worth distinguishing between “cloning” a phone’s data – which spy apps semi-legally offer as a way to spy on the photos, texts and calls of another device – and totally illegal phone cloning, which refers to the copying of a phone’s complete cellular identity and using it in another device.

In cloning a phone’s cellular identity, a criminal would steal the IMEI number (the unique identifier for every mobile device) from the SIM cards, or the ESN or MEID serial numbers. These identifying numbers are then used to reprogram phones or SIM cards with the stolen phone number.          

Then there’s also the emerging threat of SIM hijacking, where hackers who have access to stolen phone numbers call up carriers and impersonate account holders to get a new SIM the hacker controls. This method, which relies on social engineering tactics to find out personal information that carriers use to authenticate customer accounts, differs from the highly technical method for SIM (or phone) cloning, but the end result is the same – to gain control over someone’s phone service.

Once the perpetrator has control of the phone line, they can send messages and make calls that appear to be from that phone number, with the bill footed by the victim. If a cloned phone and the original are near the same broadcast tower, it could even allow the perp to listen in on any calls made by the victim – though that’s probably not the main driver for phone cloning.

The bigger danger is that text messages and calls intended for the rightful owner of the line can also be intercepted – including two-factor authentication codes that allow snoops to get access to critical accounts like email, social media and even banking. (The vulnerability of text messages is one reason why experts recommend other methods of two-factor authentication.)

Phone cloners might also target political figures for surveillance: in February this year, South African state security ministers were reported to have had their cellphones cloned, the crime was detected when several people reported receiving text messages from a minister who hadn’t sent them.

Or, cloned phones might be used to generate revenue, sold to people who aren’t aware they’ve purchased a fraudulent handset with stolen credentials.

How phones get cloned

Most phones have SIM cards whose IMEI numbers are protected by secret codes that prevent over-the-air interception. But if someone is able to remove the SIM card and place it in a SIM reader for a few minutes, they can copy all its identifying credentials to load onto a blank SIM. (This technically includes anyone who might get time alone with your device – but as with phone spying, you’re likely to have an inkling if there’s anyone who might want to do such a thing.)

Researchers have also found a vulnerability in the existing protocol that is used for over-the-air carrier updates. Though rarely used, this flaw could in theory allow hackers to remotely clone a SIM.

Some older phones are more vulnerable to remote attacks. Those running on 2G or 3G CDMA frequencies, which are used only by the Sprint and US Cellular networks (Verizon retired its CDMA network at the end of 2019), broadcast to the operator in a way that would allow special equipment – like a femtocell – to eavesdrop on the connection and intercept handset ESN or MEID serials.

That means older CDMA phones, such as flip phones or 3G-only regular and smartphones, that are locked to either Sprint or US Cellular may be at a slightly elevated risk of remote phone cloning. All that said, however, phone cloning is not as common as it was in the early days of mobile phone use, when the radio frequencies in use were much easier to eavesdrop on.

6 Signs that your phone might have been cloned

If you think your phone might have been cloned, check for these signs which can indicate someone else is using your cellular service, such as:

1. Receiving an unexpected text requesting you to restart your device

This may be the first sign that your phone or SIM has been compromised – restarting your device gives the attacker a window in which your device is off and they can load their phone with your cloned credentials.

2. Calls or texts on your cellphone bill that you don’t recognize

Any outgoing texts and calls made on the cloned device will seem to be coming from your phone number – and land on your bill. Even if you don’t have an itemized bill, international calls will show up here, so keep an eye on your monthly payments and double-check when you pay more than usual.

3. You stop receiving calls and texts

If someone else has control of your phone number, calls and SMSes may be diverted to their cloned device, or your cellular connection stopped entirely. Check this by having a friend or your partner call you to see if the call rings and if it comes through to your phone.

4. You see your device in a different location on Find My Phone

Logging into Find My iPhone or Google’s Find My Device can be a way to check on the integrity of your SIM. If your phone’s on your desk, but on the map appears to be somewhere else, someone else may be using your cell service. (Chances are, phone hackers would disable this setting, however.)

5. You get a message from your carrier saying your SIM has been updated

If your credentials have been activated on a new device, your network provider will probably send a message confirming your details have been updated – a major red flag if you haven’t done anything. This can also be the point at which you find your device no longer has cellular service. 

6. You’re mysteriously locked out of your accounts

You might even find someone has commandeered your email accounts and social media handles – as in a spat of Instagram hacks based on stolen phone numbers (in these cases, however, the SIMs were hijacked by attackers who had gleaned enough personal information online to fool carriers into switching over the SIM cards). Either way, someone having control over your phone service means they can do things like trigger a forgotten password, receive a two-factor authentication code to the phone number they now have access to, then change the password and access any account they know your login name for.

If the worst has happened and your phone has been cloned, you need to call your cellular provider. They should be able to detect and block the cloned device, because each handset has a unique radio fingerprint independent of that serial number that originally belonged to you.

Can you prevent phone cloning?

You can help protect your phone from this type of cloning by observing the same cybersecurity practices that keeps your online life safe:

  • Check that carrier texts are coming from legitimate numbers – for example, do they show up in the same message thread as previous carrier texts?
  • Train a skeptical eye on any text that requests you do something – are they worded in the way you would expect? What do Google search results have to say about the sender’s number?
  • Finally, treat your phone’s IMEI, ESN or MEID number like any other password - never send it to anyone or give it to any website you don’t trust.

Cloning isn’t the only way your phone can be compromised. If you have concerns about the security of your device, read our story on how to tell if your phone has been hacked.

[Image credit: phone hacking concept via BigStockPhoto]

Natasha Stokes has been a technology writer for more than 7 years covering consumer tech issues, digital privacy and cybersecurity. As the features editor at TOP10VPN, she covered online censorship and surveillance that impact the lives of people around the world. Her work has also appeared on BBC Worldwide, CNN, Time and Travel+Leisure.

Discussion loading


From Kammi Kothmann on April 08, 2020 :: 3:58 am

Im pretty sure my phone is cloned. i receive messages sometimes the day after they were sent. Voicemails i get later than they were made. i think i know who is doing it and im fixing to get a protective order put on them.


Probably not cloning

From Josh Kirschner on April 08, 2020 :: 12:23 pm

Delayed text messages and voicemails are not uncommon, and are usually due to issues on the carrier end. It’s much more likely that that is what’s happening to you versus phone cloning, which is very rare, only can be done with old devices, and wouldn’t necessarily result in delayed messages.



From Marva Jane Theus on November 13, 2020 :: 5:41 am

My phone screen flashes when I go to certain pictures and certain text conversation…. My account is locked up and disable cause of the wrong passwords… It freezes and quite often pics and files are suddenly no longer in my phone


Same problems ! The ex and the new

From Angelica on November 23, 2020 :: 7:05 am

I’m sorry , I feel you . I am experiencing the same things . I have test and am milk her to gain access to my phone . Smh ! I know it’s my husband ... playing willing games . Uses my SIM card ! Cloned my phone ! Getting ready to validate this with an old time FEDeral friend and I’ll go from there . I’ll let you know the results ...

My phone definitely cloned

From Josie Gomez on August 05, 2021 :: 5:12 am

Aside from them changing my recovery number on Facebook making it impossible for me to verify its my account and it’s going to be deleted tomorrow if I can’t access it, I found 2 logins with the same phone. One has the picture of my phone, but the other was a different style phone but listed as an LG ThinQ like mine. Files have been deleted, modified or created. Then all my files, pictures and apps I found in a folder in my laptop. Then files that have sensitive information from clients with their banking, Passports, etc which I had put them all on a removable disk, where all on my laptop. These are 2015 files and my laptop is from 2019. It’s been going on every single day and I don’t know what to do.

Not true

From Chad Vandine on February 14, 2021 :: 12:44 am

My Aristo 5 was cloned onto an ihpone 11 somehow and was being used with roaming charges in Africa!


Hack Attack

From Dora on June 01, 2021 :: 12:55 pm

Im confused. Why would you say only older phones cam be cloned? I had to send my phone in for repair. I was told by the 1st repair guy it was a cloned imei he believed. Is that not true?


Newer phones can't be remotely cloned

From Josh Kirschner on June 01, 2021 :: 7:47 pm

What we said was only older phones can be “remotely cloned”. It’s possible if someone has physical access to your phone that they may be able to clone the SIM on newer devices. I would be curious to know how the repair guy determined your phone had been closed.

What about if you get

From Kelly on August 05, 2021 :: 8:02 am

What about if you get random messages that your FaceTime is being used on another phone. And that your device has been signed in on another device. How do I stop this!?


Sounds like an Apple ID issue

From Josh Kirschner on August 05, 2021 :: 6:56 pm

If you are getting a message saying your FaceTime is being used on another device, that sounds like your Apple ID may be compromised. Did you recently set up an Apple Watch or Mac with your Apple ID? If not, you should immediately change your Apple ID credentials. And always make sure you have two-factor authentication set up for your Apple ID to protect it.

My husband has everything on my phone

From Nancy on May 20, 2020 :: 2:17 am

I dont understand how he can get into everything it doesn’t matter how many times I change my passwords he can still see everything.  I don’t have anything to hide I just hate him creating things in his mind then attacking me for no reason how do I remove his access?


There's an easy explanation

From Rikki Lyn Fruen on June 23, 2020 :: 7:21 pm

Hi, Nancy. In my previous life, I had a similar situation. My now ex actually knew everything that I ever did on my computer and both verbally and physically abused me for it. It didn’t matter how many times I changed passwords, he always had access even when I was living over two hours away from him. I found later that he had at least a key stroke logger on my computer. He may have had other things going on as well, but that was the biggest problem for me. Got rid of the husband and the computer and I’ve never had another issue from him on that.
Several years later, my sister was going through a similar issue with her husband, only technology had advanced and he was able to log everything, key stroke and all, that went over their home network (think major computer geek). She got out of that, by calling me one day from the coffee shop on the corner and asking me to set up a new email account for her. She never accessed it or did anything referring to it while on the home network. For all I know, she may not have even used devices that touched it. She used that account to start remaking her digital life.
There are plenty of ways for him to know all of that stuff. You may want to consider what his motives are. You may not have anything to hide, but he is suspicious of something for some reason.


Cloned phone

From Paul Reynolds on June 28, 2020 :: 8:46 am

I have an idea who is doing this to my phone he is abroad
I have seen him take full control of my parters up address
How can I stop this I have delayed messages and texts from random people


You just changed my life

From El matto on November 02, 2020 :: 8:41 pm

You just changed my life with that idea. I have a cyber bully from a past job…long story that I just can’t seem to escape, no matter what I do. But having someone else do it for me is an amazing idea.


Don’t blame yourself

From Amy on December 11, 2020 :: 11:46 pm

Hi Nancy
Fascinating information from Rikki and helpful as I too believe my husband is accessing and even intercepting my messages and texts. He’s worked in the communications field for years and I believe that once he figured out how to do this he became addicted to it and can’t stop now. The idea of not being able to know what I’m doing at any given time is unbearable for him. I have never done anything and he has never claimed to have caught me doing anything but he also refuses to admit that he monitors my activity. I would and have gladly shared my emails, texts and social media with him prior to my figuring out what he was doing but now the total invasion of privacy and his constant denials coupled with his accusations of my mental instability has driven a wedge between us and I no longer want to share this information with him. It has eroded our 30+ year marriage and I’m at a loss. Does anyone know how to prove that your computer and or phone are being monitored? His technical expertise far outweighs mine.  Of course all of his stuff is locked down and protected. It’s ridiculous but I’m becoming numb to the situation : ( Good luck, girls. It is comforting to know I’m not alone or crazy!



From Kalika on January 30, 2021 :: 2:11 pm

Amy I feel like u just plucked my life experiences straight from my head. So. Annoying. Funny thing is, I will win. Longevity baby:-) yeah I’ve literally seen my partner do it and it’s all the sudden a question of eyesite? I’m. Ok. I hallucinated the entire time?! I’m not one to be quiet about it but yes it does become rather ridiculous n I hate going over worthless things

You're not crazy

From Jim on February 03, 2021 :: 11:59 pm

The longer it goes on the more credible you become. I’m going through that with my youngest brother and his girlfriend. Addicted to hacking me. They almost got me. But I told my story to the cops.  The shear length and scope andnumber of incidents and your honesty could sway a judge to search his phone. If that happens , forget it he’s done . Its extremely traumatic.  Good luck

Me too

From Maligant’s ex on February 10, 2021 :: 4:50 am

To all you lovely women being targeted by malignant mofos who have an inexplicable desire to know everything about you at all times:
The only creatures capable of dedicating that much time to hacking and/or monitoring your devices are those with clinical narcissism. The reason they are capable of this? That part of our minds that is dedicated to love, self-reflection and processing emotions, a large part if you ask me, is defunct in their brains so that energy is spent on this shit, and what a sad, sad existence that its. They have different patterns and methods, but one thing they have in common? An unrelenting drive to mess with you, no matter what you do, until such time that you cut them off completely. My point is, and I trust that most of you already know this, is get educated on narcissism so you can escape this bullshirt and get your real life back.


From Jim on May 13, 2021 :: 9:33 am

I doubt you’ll read this but simply buy a phone that is paid for 100% by yourself. Also keep your phone that has been compromised. Use the compromised phone for all your random internet browsing done at home, such as being on facebook, or whatever. Now the noncompromised phone should be kept secret. Use number forwarding services that use VOIP numbers so he is not aware of the actual phone number(that way he cant even guess what service this phone is, among other benefits of not using your actual number…no more spam calls either! lol) Now, you might consider buying a tote bag for it that is a Faraday cage, theyre often marketed as being RFID proof. You need to never allow the non-compromised phone from accessing your home network as that can be an entry point for over the air type deliveries of spyware packages so leave the phone off, & in the bag while at home, just use the compromised phone but when youre out & about, away from him/home networks then you can take the phone out of the signal blocking bag. It sounds crazy but the whole topic is insane already. You have to be vigilant. If you keep this phone entirely secured from him by remaining vigilant about it then you can decide if you want to bring the compromised phone with you or leave it at home. Either way, If there is no way he can access the “secret” phone then he will understand that you know what is being done, and regardless of his lies that you will not allow yourself to be abused by his lack of respect for privacy. He will look to see where youre at? but all he has access to is the dummy phone that you leave at home or whatever. Its possible then that he might try other ways of tracking you, such as tracking your car instead of your secret phone….But if it gets to that point then you already know that this guy is nuts & you need to leave him(You should already know this by him trying to look at your private device in the first place.)
My advice is not too specific but it is not that difficult, it just requires sticking to a few rules that never allow the opportunity for it to happen. My advice is not legal advice, It is merely a suggestion of a hypothetical alternative.

My situation to a t!

From Rachel on September 11, 2021 :: 5:21 am

My husband a retired communications engineer has complete control of my phone. I have no sim cards. He has accessed my knformation so thorough several of my financial accounts are compromised & I can’t fix them. There’s nothing U can do. I believe my calls are redirected to a bogus customer service desk. It’s so frustrating. I don’t know what to do. I can’t trust anyone it seems.

How to tell if my phone is cloned

From Suzanne Conner on April 25, 2021 :: 7:14 pm

Im a victim of cyberabuse/ stalking etc:  years of suffering.  My sister is a woman freemason, police involved. Whole UK system play a part in there heinous crimes.  Not 1 place to run to, silenced & isolated


I hear you

From Corina on September 24, 2021 :: 5:54 am

This is exactly what is happening to me and I am shocked by the lack of support from the official bodies. Shocked!

Look in your permissions in settings

From Chad Vandine on February 14, 2021 :: 12:47 am

If that doesnt work then save anything you want to keep to google doc…drive protos….then just wipe everything. Google will store anything you give em smile just get that spyware removed and put in a security measure to require your fingerprint for any app installation. Yes that includes those off the web as well



From Mary Mitchell on February 15, 2021 :: 5:49 pm

If they clone your phone wouldn’t they have access to Google Apps?


If you believe your phone

From jim on May 13, 2021 :: 9:50 am

If you believe your phone has been cloned then you can never trust that phone, phone number, simcard, or any backups ever again. If you use a shared wifi/lan network, log into a “friends” wifi/lan network, or if they have physical access to your phone(this applies to any situation, I myself am a deep sleeper, and my phone has been manipulated simply by using my finger to unlock it.) Which reminds me, turn off the setting that shows PIN/password characters briefly right after being typed, if they arent able to catch a glimpse then a couple times of watching over your shoulder will allow them to see the characters even if theyre just there for a split second, Or imagine if they somehow simply caught you typing the password on video, any playback would allow that password to be easily seen. This might not be obvious to some but to the type that want to snoop? Its the first thing theyll try. I digress, if your phone has ever been on a shared network, or left unattended, there is a possibility it has been compromised. You dont need to buy 50 new phones 50 times a year but you need to stick to some rules about keeping your stuff secure. Make sure you put a SIM pin on so that every time the phone is restarted, you must put the SIM lock pin in as well as the screen lock. OFten the spying apps require rebooting, which the lock on start SIM lock will help prevent. Dont let your kids play on your phones. Dont share accounts/devices if you have split custody, etc. Its really simply stuff but its a hundred different little rules. A RFID faraday cage tote bag might be something to consider(its wise to use those these days if you want to limit your data being spread anyhow, retail stores for example, connect to your device & harvest data that they consider “non-identifiable.”) Just be smart. Or just get rid of smart phones.

Get a hobby

From Urname on May 29, 2020 :: 5:10 am

I have a very good understanding of revenge and I must say that going and teaming up with hackers is cowardly, if getting revenge means that much to you why not get it by letting karma come along, on its own!!! Who to say that person who you want revenge on won’t just snap. Clearly they already did something to you to get you to the point of cloning there phone so who’s to say that person already didn’t or doesn’t have a conscience and won’t hurt someone????



From Migdalia Irving on June 06, 2020 :: 10:01 pm



Hacked, cloned, stolen number, everything

From Noname on June 30, 2020 :: 7:28 pm

I have read several of these articles and for the most part all have been done to every device i own. My problem is the laptop. It was stolen cloned mirrored to the laptop i have in my possession now, I’d stolen along with devices specifically all my personal devices connected and link to the original laptop that has full control on calls, internet access, etc. Along with that all old devices have been stolen and intimate pics of my ex and i exposed in the web world with a major major leak of a medical issues that would cause attempted murder on my life bc it got leaked. Even if i get all new everything i still don’t have the source which is the original laptop to end this 5 months and still continuing hell of cyber take over that has now led above and beyond affecting me in the physical world to where i am trapped bc as a world we depend highly on technology to do simple task. I have called companies of my devices and providers of my phones and they say everything looks good on their end but these people are that great at what they do. To me they are pathetic thieves that feel like they have the power and control over a persons whole life and feel like they can destroy you by 1 single button or code they put in but in reality they are only setting themselves up for failure and getting their own selves ( this is a team of people i am talking about) caught up. If you have any true insight and not just more codes to put in to make me even more venerable or exposed and something that can truly correct the issue at had especially since I don’t have the original laptop i am all ears. I have nothing to hid at all .... its already been exposed. Even down to my i phone 11 has been compromised but no apple store will give me the time of day or are closed and their is only some much they can see on the phone since they are remotely looking at it and don’t physically have the device in their hand. Even if i did get a hold of them my call are limited and I don’t even know if it is apple or any of the companies I call are truly just that… the company i called.


The group

From Frank on July 23, 2020 :: 5:59 am

This group is very large, they target people on ssdi or ssi or ones that are mentally challanged, they clone phones and run ur credit to make large purchases, bank accounts, fake checks, debit card skimming, get ur info from garbage can and make new accounts, there everywhere, my problem is I just stumbled across group, lots of herion users, in in Washington state and it’s happening to about 5 people that I know of and there making freinds with them, rob them, steal, get them hooked on drugs, get them kicked out, the landlord here is involved and I got physical proof, I am sueing them cuz trying to kick me out during covid, now I got attourny general involved and getting lots of threats, flat tires, keyed car, I’m very interested in hearing more, I found them on offer up and facebook


I am going through same thing

From No name on July 24, 2020 :: 4:43 am

I am going through the same thing.feel free to comment curious how u found them maybe it could help my situation


I need help

From Jay on October 14, 2020 :: 1:08 pm

I’m having the same problem. Someone seems to know my conversation in my whatsapp and who im speaking to. Also its the same as Snapchat and they seem to message my contact as as well. I do have the person number as my friend screen shot them when they message them and to top it off used a display pic of myself and partner. I have a feeling I k ow who it is but no proof I just want it to stop as its causing problems.

Yep me too

From Misty on October 08, 2020 :: 7:09 pm

Without sounding nuts me to. It’s scary… I’ve actually fought my hacker on my phone he screen records etc.. He is in everything Google based they work through Google firebased they are developers


me to

From 8up on January 21, 2021 :: 11:23 pm

im on ssi and have been desleing with this (group) for awile now made me snap how can i prove they cloned mhy sim and just prove who this group is


Evicted during COVID while hacked

From Targeted 2 on March 06, 2021 :: 8:01 pm

I never got notice for a FAKE HEARING where apparently the judge didn’t hear the was a WORLD WIDE PANDEMIC! & A NO EVICTION MORATORIUM! Everything I owned was hacked.. & later discovered NOT ONE PHONE CALL I MADE.. WAS ACTUALLY GOING WHERE I THOIGHT IT WAS! Its actually referred to as “THIS ORGANIZATION” & these demonic people have telemarketing companies that pretend to be who you THINK you’re calling, but they’re NOT. EVEN THE TELEMARKETERS DONT KNOW THEYRE WORKING FOR THESE DEMONIC QUACKS!! If you think you are being targeted.. Its because THIS IS BEING DONE TO EVERYONE!! You.. are just awake. While the others are still asleep! Awake Awake Everyone! LETS ROLL!


So I'm not crazy???

From .... on April 14, 2021 :: 11:56 pm

Scrolling down these comments has been beyond eye opening! Wow

Found them oh Offer Up

From Not crazy. Too SMART on May 05, 2021 :: 2:14 am

Can i ask HOW you foind them on Offer Up etc? What do you mean? How was it listed? Please elaborate. Thanx!


Not sure?

From Glenn Hardin on July 05, 2020 :: 6:12 pm

When I send texts, or unlock my device, or change a password, or read things on the screen, sometimes I think I hear my me neighbor reading the screen text or messages aloud. Any thoughts how to address it? It’s almost like they see what I’m sending and receiving sometimes sharing the on screen text with whoever is in the room with them?


Good luck buddy.. If they

From Open on October 13, 2020 :: 1:35 am

Good luck buddy.. If they have an interest or purpose for u there’s nothing u can do but write things down and depend on our electronics less. Change all credit card info bank accounts etc I know it’s a lot but it’s the only way. Do not activate any rando cards in the mail… Also get in touch with Google support.. Anything fishing such as texts or emails flag as spam. Best advice I have for everyone going through this.


Someone is reading my texts

From Peter on January 26, 2021 :: 9:35 am

I got same problem my naighbour is getting in my phone reading everything I text and read it out loud to other people in a room they comment on the things I say the way i say them . Its annoying and it invasion of privacy.they post this on line my privet conversations and changes to my Google settings get on all my accounts and they stealing money of any prepaid cards.


Is there a law against

From Cissy from Texas on March 09, 2021 :: 12:42 am

Is there a law against this ? Or are we just suppose to sit back and let some sick sob rob us of our lives



From Mike on January 28, 2021 :: 3:54 pm

Maybe your schizophrenic cause that’s what is happening to me.  They are accessing everything that I do and see on my phone I change my password and they know it instantly.


Dear not sure

From hyperplasmic surprises on February 18, 2021 :: 5:30 pm

I believe that your neighbors have hacked into your router.Thats how they are seeing everything.Look up online how to make your router safer.I am having trouble with an ex who is doing the same or similar thing.Very frustrating.Take care, and get your phone checked for a keylogger.


Phone has malware/Spyware

From Ashish Goyal on July 13, 2020 :: 8:53 am

Tried to remove malware and spyware but my phone is cloned, I get it back on my phone.  Credit card, personal info theft. Username, password theft. Watching me thru spyware. Listening to my conversation. Receiving fake calls. Fake chatting on text app, WhatsApp. Secrutinizing email. Deleting emails. Any solutions


Cloned or Hacked

From Christopher on August 07, 2020 :: 9:00 pm

Have any of you people called you phone service provider and asked for a new SIM card? I believe Verizon only charges $20 for a new SIM card.
As for your email accounts unfortunately the best choice is to dump them and open new accounts with a different computer.
You can also backup any information you want to save on a separate hard drive and then do a fresh restart on your computer and all other devices.


Theres NOTHING you can DO!

From Lost on September 01, 2020 :: 6:26 am

Regarding the “Group” mentioned above… They ARE real and theyre literally EVERYWHERE!  They target people who are naieve, trusting, and caring, isolate them, smear and slander them, steal thier identity, stalk them 24/7, and if they try to get help theyll launch an all-out attack so chaotic and insane that even if someone believes you theyll be too afraid or confused or aggitated to even bother!  If you REALLY persist they will set you up to look like an addict, alcoholic, and/or criminal!  From the outside it looks like drugs and domestic violence and co-dependency…but if you keep fighting, resist the temptation of substances for escape from hooelessness, having perfect intuition thats NEVER wrong and stick to your values and morals, they will double-down on the abuse and isolation, lock you up and attack, coerse, and terrify you non-stop until you are so sick & weak you can no longer fight or even try anymore, then theyll take away food, water, bathing, toilet paper, clean clothes, etc… Expose you to toxic chemicals, smoke, heat, refuse you your meds even inhalers or aspirin, then mess with phones, bluetooth speakers, people outside your windowd (that your abuser boarded up & wont let you near), they flash lights on you, call you names, never let you have any privacy, not allowed to have a door shut or lights or tv off, but your nit allowed to speak to any of them (just be stared at and talked about while they come in and out day and night for no reason!  Theres much more!  My advice.. Move to an off-grid homestead NOW!


More about what yu was saying

From Dave on September 10, 2020 :: 8:20 pm

Tell me more if yu can , might be big help


Yep me too

From Misty on October 08, 2020 :: 7:15 pm

Seems this is what the tern gang stocking is referring to. My attacker tell me he loves me.. He actually. Contact’s me through email anything Google based


Did you experience this??

From Lj on October 11, 2020 :: 4:06 am

I’m going through this right now. Did this happen to you??



From Lisa Collins on August 04, 2021 :: 12:49 am

A new Sim card will not do any good they already know all your phone personal numbers they can still get on it even with just the phone number. Once you have one email they can always connect to a new is a federal offense to hack a phone married or not.My local law enforcement will not help me because they don’t know what to look for. I have craigslist ads in my name and I’m guessing my soon to be ex is collecting the money in my name.I haven’t received phone call or text in a long time muchless a email.He here recently has cloned my phone. I just hoping one day someone will have since enough to figure it out and help me before it’s to late. He is also using one of my old emails so I can’t do a factory reset on it. Good luck to you all!! Don’t try to email because I won’t never get it. And I can’t call for help because all my calls are rerouted



From UBC STUDENT on August 15, 2020 :: 5:02 pm

I bought my cellphone from a Chinese man (sale craigslist) I met up with him and bought the phone.

Earlier today I was texting and sent a text, - you know on the left upper hand where you suppose t see your phone carrier (rogers, Telus) it was “Phone” when I pressed home it was back to my carrier.

I want to know how to sue this asshole

Please help. I am a UBC Med Student.


Read More Comments: 1 2

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships
Accessibility Statement
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.