Tech Made Simple

Hot Topics: How to Fix Bluetooth Pairing Problems | Complete Guide to Facebook Privacy | How to Block Spam Calls | REVIEW: RadMission 1 eBike

author photo

How to Figure Out Who Hacked Your Phone

by on June 16, 2020
in Privacy, Phones and Mobile, Cell Phones, Mobile Apps, Android Apps, iPhone/iPad Apps, Tips & How-Tos :: 244 comments

Techlicious editors independently review products. To help support our mission, we may earn affiliate commissions from links contained on this page.

For most of us, our phones are the center of our daily lives, and as a result, they contain a treasure trove of personal information, from banking details to messaging and email accounts. This sensitive data can be pretty enticing to a range of the nefarious, from cybercriminals to someone you may even know.

Phone hacking can involve the unknowing download of spyware that relays information on your activity – such as logging keystrokes to scrape passwords; spy apps downloaded by someone with access to your device; or other malware that exploits your phone, for example by using its internet bandwidth in a botnet, as occurred with malware that infected nearly 20 million Android devices.

“The most common way that smartphones can be hacked is to infect the device with malware,” says Victor Chebyshev, a security researcher at Kaspersky Lab. This malware can arrive on the device buried inside apps downloaded by the user – and the likelihood of a malicious app rises when downloading away from the official app stores, which police their content. 

While iPhones aren’t immune to hacking, Apple’s strict vetting policy means the incidence of bad apps targeting iPhones (at least non-jailbroken ones) is lower than for Android phones. “Android devices are more susceptible to these kinds of attacks because they have the option to install applications from third parties,” says Chebyshev.

9 steps to figuring out who hacked your phone

A sluggish phone or fast-draining battery are common symptoms of a compromised phone – but they can also indicate your device needs a spring clean to spruce up performance or improve its battery life. Another red flag is if your data usage has gone through the roof – this could indicate a dodgy app is sending data back to its mothership.

“Whether a user can determine who is responsible for a compromised phone depends on what kind of threat was on the device,” says Chebyshev.

According to Verizon’s 2020 Data Breach Investigation, 86% of cyberattacks are motivated by monetary gain – for example, through selling someone’s stolen credentials on the dark web, gaining access to financial accounts, or hacking sensitive data and holding the victim to ransom. In these cases, hackers usually rely on malware that remotely exploits vulnerabilities in apps or operating systems to steal information (or in the case of phishing malware, trick people into inputting their critical data).

However, somebody known to you who wants to monitor your movements – whether that’s a disgruntled ex or suspicious parent – and who has physical access to your device might also be able to install a spy app that acts like malicious software, tracking your location, photos, messages and calls.  

To narrow down the field of suspects, you can try to determine exactly how your phone is being compromised.

1. Check your phone bill

Are you being charged for premium-rate texts you never sent – or texts you never signed up for? You’ve probably been infected by malware that forces your phone to send or receive texts that generate revenue for cybercriminals. This common form of mobile malware is believed to be the first type found targeting Android, back in 2010, and today plenty of it is still floating around.

If you’re receiving premium-rate text messages, try texting STOP to the number. If this doesn’t work, you’ll have to contact your cell carrier who should be able to block the number.

If your phone is sending the texts, you may be able to fix it by running a security app such as Bitdefender or McAfee to find and remove malware (on Android only; security apps for iOS don’t have this feature). Also, try deleting any third-party messaging apps and any other apps you installed just before the phone started sending the texts.

2. Go through your apps list

If there are any apps you don’t remember downloading, look them up online to see if any of them have been reviewed negatively for malware or other suspicious activity. In this case, the apps will have been compromised by a hacker who likely isn’t targeting you personally but is distributing malware with the aim of scraping as much data as possible. The BankBot malware, for instance, is a trojan that has infected hundreds of Android apps to display a phishing screen to steal users’ banking credentials.

“If it was a regular trojan [malware coded within another app] the user will not be able to attribute who was responsible for the attack,” says Chebyshev. “If it was commercial spyware, it’s sometimes possible to figure out the responsible person.”

3. Look up your flashlight and battery-saver apps

Got a phone full of apps and can’t remember for sure which you downloaded? Some categories of apps have attracted more than their fair share of malicious actors – several flashlight apps on Google Play were infected with malware that tried to scrape users’ financial info, while one should be wary of battery-saver apps as they have often been used for malware, says Josh Galindo, director of training at phone repair service uBreakiFix

If you have these types of apps, check online for any negative reviews. You can also try deleting them to see if this affects your phone performance. “If you install an app and the device performance decreases, that’s an indicator,” says Galindo. “If you uninstall the app and your device begins working properly again, this means that the app is likely contaminated with malware and you should avoid downloading it in the future.”

4. Double-check your favorite popular games  

Downloaded a new super-popular game recently? Ensure it operates like it’s meant to – and validate that by looking up reviews online – otherwise it may be a scam version, potentially ridden with cryptojacking malware.

Cryptojacking trojans mine cryptocurrency unbeknownst to users, and their prevalence has risen on smartphones that when infected in thousands, can deliver attackers a high overall processing power. The idea is that, if a cryptojacker hacks other devices, they can get paid for mining without having to use their own resources (or pay the electricity bill).

On mobile, cryptojacking malware tends to hide inside innocent-looking apps such as fake versions of popular games. If your phone slows down, heats up and its battery is dying long before the end of the day – and you’ve tried to improve your battery life– it could be a sign that a malicious app like a cryptojacking trojan is hogging all the juice.

They’re mostly prevalent on Android – and if you’ve downloaded from non-official app marketplaces, the risk is higher.

5. Scroll through your call list

Done all of the above and still convinced that someone somewhere has your personal data, siphoned from your smartphone? Apps aren’t the only way a phone can be infected by malware. Have you picked up any random calls lately? “Callers offering a free cruise or claiming that you won a sweepstakes are likely scam efforts to hack your information or record your voice,” says Galindo.

6. Did you click that link?

If you recently clicked on a link on a text message or an unexpected pop-up, you may have inadvertently fallen prey to phishing. Phishing often preys on panic or high emotion – as in the coronavirus-related scam texts claiming that receivers had been exposed to someone with COVID-19 symptoms, and exhorting them to click for more information.  

It’s often impossible to divine who is behind such scams, although you can report any phishing texts to your cell carrier and block these numbers.

7. Consider the last time you used public WiFi

According to Kaspersky Lab, one in four hotspots are unsecured, and even the ones that are password-protected could potentially be set up by someone with malicious intent. On top of that, the protocol (WPA2 or WPA3) that encrypts traffic between devices and routers can itself be vulnerable – as in the serious WPA2 flaw uncovered by researchers in 2017 that would have allowed certain traffic to be intercepted.

If your phone isn’t protected by a VPN and you logged into an unsecured public WiFi hotspot, it’s possible someone could have been spying on the connection – and scraped your sensitive information if you logged into your email or bought something online.

8. Is your iCloud safe?

iPhone user? A cracked iCloud login can allow someone to not only access your photos, but also make use of semi-legal spy software to remotely monitor your device’s calls, messages, contacts and location.

Luckily, enabling two-factor authentication for your Apple ID drastically reduces this risk, because if someone tries to sign into your account from a new device, you’ll receive an approval request and sign-in code on your iPhone (or other iOS/Mac devices linked to your Apple ID).

(To enable two-factor authentication, for iOS 10.3 and newer: Settings > [your name] > Password & Security. For iOS 10.2 or older: Settings > iCloud > Apple ID > Password & Security.) 

However, a weak or reused password without two-factor authentication can put your account – and phone – at risk.

Here’s how it works: Many people use the same email address in their Apple ID as the login for dozens of online accounts. If this email address is revealed in a data breach, then hackers – who may purchase or find these login details at data dump websites – have access to your Apple ID.

Couple that with a weak password and your iCloud account can be breached by attackers who use cracking software to guess hundreds of hacked or common passwords in order to breach accounts.

Unfortunately, the same goes for an email and password combo that can be guessed or found out by someone you know who’d want to spy on you – especially if they can access your iPhone to use the two-factor code.

9. Run a security scan 

Since most malware is designed to evade detection, you may not discover much on your own. Spyware apps – or stalkerware – is one category of particularly insidious apps designed purely to monitor a victim’s activity (rather than for any financial gain).

Security apps, particularly for Android, can help determine if your phone contains such a malicious app, as well as help fend off future cyber attacks by, for example, preventing you from visiting malicious webpages.

Android:  Commercial spyware is unfortunately all too easy to find online. Such spy apps have system-level access to extremely detailed information about your device activity such as the messages you write, photos you take and GPS location – and what’s more, these apps are hidden from view.

They also need to be downloaded physically to your device, which means if they’re on your device it was done by someone with access to your device (and your PIN). Chances are, you can figure who in your life would want to monitor your phone. 

To find out if you have such apps on your Android phone, download a security app such as Bitdefender or McAfee, which will flag any malicious programs. You can also head to Settings > Security > Device administration and check if “Unknown sources” for app installations is enabled (and you didn’t do it) – this allows apps from non-official app stores, on which there’s likely to be far more stalkerware.

iPhone: Spy apps on a non-jailbroken iPhone are far less prevalent since such software – which tampers with system-level functions - doesn’t make it onto the App Store. (However, they do exist and work via someone knowing your iCloud login and password.)

If your iPhone is jailbroken, that opens it up to potentially malicious apps that haven’t been vetted by the App Store, including spy apps downloaded without your knowledge.

Security apps such as Lookout and Sophos will alert you if your iPhone has been jailbroken – so if you’re alerted of this but haven’t done it yourself, that can be a red flag.

However, whether security software – for Android or iOS – can find spy apps will depend on how sophisticated or new the spy app is since security software scans for malware that’s already known. (That’s why it’s crucial to download updates to security software as soon as available since updates will incorporate new instances of discovered malware.)

3 steps to take if your phone has been hacked
 

1. Delete any apps or messages that may be malicious

If deleting them fixes any performance issues, great. Even if not, it’s a good idea to clear your device of apps that may have been flagged from that security scan.

You can also try shutting down apps one by one, as soon as your phone starts to slow down or heat up. If shutting down a particular app seems to return things to normal, that app may be malicious – or at the very least, not play too well with your device. 

2. Do a factory reset

If after deleting the suspicious app(s) your phone is still behaving strangely, this nuclear option is a quick way of clearing your device of malicious – or sluggish – software left behind.

Android: Settings > System > (Advanced) > Reset options > Erase all data

iPhone: Settings > General > Reset > Erase All Content and Settings

3. Check if your information is out there

Unfortunately, many hacks and malware present few to no symptoms and often the only time people are aware of a breach is when their digital services are hacked, or, worse, they’re the victims of identity fraud, where hackers have used their stolen information to open accounts or lines of credit. 

There are a few tools you can use to check if any of your information has already been compromised. Have I Been Pwned? is a website run by security developer and Microsoft Regional Director Troy Hunt that checks if email addresses have been exposed in breaches of popular apps and services.  

Security apps including Bitdefender (Android) and Lookout (iOS) can also alert you if apps and services you use have been breached, putting your personal information at risk.

Depending on the scale of the data that has been exposed, you may want to set up a fraud alert at the major credit agencies, which will require any potential creditors to request additional verification of your identity. 

Keeping your smartphone safe

If you find that your logins – particularly passwords – are floating around online, the first thing to do is to change your passwords. The best way to do that is to use a password manager which can automatically generate and save complex, unique passwords for each of your accounts. Check out our top-rated picks here. We like the Dashlane password manager, whose Premium version (from $4.99/month) also scans the Dark Web for instances of your emails or logins being posted for sale.           

And to reduce the risk of future phone hacks, always observe general cybersecurity hygiene:

  • Think twice before clicking links in SMSes, other messages and emails
  • Review app permissions to minimize the risk of a malicious app download.
  • Enable two-factor authentication for every online account possible – and especially primary emails and logins like your Apple ID.
  • Download security updates for your phone when available to patch vulnerabilities that could otherwise be exploited.
  • Protect your device with a PIN or biometric authentication.

Updated on 6/16/2020 with new tips and recommendations

[Image credit: phone hacker concept via BigStockPhoto]

Natasha Stokes has been a technology writer for more than 7 years covering consumer tech issues, digital privacy and cybersecurity. As the features editor at TOP10VPN, she covered online censorship and surveillance that impact the lives of people around the world. Her work has also appeared on BBC Worldwide, CNN, Time and Travel+Leisure.



Discussion loading

Hacked by Texts and Pictures

From Brenda Taylor on November 01, 2019 :: 4:01 pm

I am complaining about the lack of anti-virus software not working. I installed Norton after I know the spyware got into my cell phone.

I know who and why.

I am writing a book that has Obama in it who knows my cousins.

Chicago people and the police don’t like it.

They come into my apartment EVERY TIME I leave and destroy my things.

Went to police 2 years ago to file a report.  They refused.

My grandson has been shot over this.

Reply

Help

From Denny Teague on November 01, 2019 :: 9:17 pm

I have a crazy ex-girlfriend that help me with setting up my phones and everything no she has my backup password and everything my email address now she is moved on every time I turn around I can’t even get into my Facebook account or she’s changing them soon as I tried to put a new email or Gmail account start over my Facebook it automatically goes to her phone she has the phone numbers programmed so I don’t even get the other new messages it goes to her phone I don’t know what to do can you please give me an answer
Help

Reply

Hacked by Texts and Pictures

From Brenda Taylor on November 02, 2019 :: 9:36 am

Why do yall keep hitting my reply about boyfriend or girlfriend hacking each other?

I don’t care anything about that.

I am talking about anti-virus don’t work.

Unless you have a new solution about anti-virus DO NOT HIT MY REPLY BUTTON.

Reply

Is it possible to retrieve what was on my phone after being hacked?

From Dolcé on December 04, 2019 :: 8:35 am

I had very important info that I was to use in a court of law, but it has been wiped off my phone.

Reply

Same issue

From Ok on March 06, 2020 :: 1:54 am

Hi, if you have found a solution to retrieve the person who did it, please share how?Same issue

Reply

Someone hacked my whatsapp account,

From Noah on December 05, 2019 :: 2:56 pm

Someone hacked my whatsapp account,  when i looged in using my number someone is already using my account using my name, number and even my picture.  I’m afraid he’s doing illegal stuff.  What actions should i take please?!

Reply

Can you clarify why you think you are hacked?

From Josh Kirschner on December 05, 2019 :: 3:58 pm

I don’t understand why you think you were hacked. Were you prevented from logging in? Why do you think that profile of your name, number and picture is someone else and not just your account?

Reply

You said you were doing a study on hacked phones

From Timmy Sanchez on May 03, 2020 :: 7:08 pm

I would like to participate this study there have been searches on Google I didn’t make and also a lot more things are going on with my phone

Reply

Yes mine was hacked through Bluetooth and controlled remotely

From Pamela Henderson on December 21, 2019 :: 8:17 pm

Folks it’s not hard for hackers to get into android. What I see is they use certain programs and then apps. I’m on 4th phone in 2 months and it’s finally a lil better. Trying to get a real GOOGLE HUMAN so I can lock my account that I’ve had w my business over 10 years. Every time I close my google the hackers reopen and take it over. Then they take my back up email then remote lock my phone….. I finally understand what avenue the hacks are coming from so I can stay ahead. It’s exhausting and humiliating!! Please tech professionals stop telling us it’s just not possible. We are not crazy .... we are actually very smart because there is Zero help or understanding and that a lone is very hard it’s real and it’s happening to a lot of folks

Reply

No one understands except they have been hacked for real!!

From Chris on January 06, 2020 :: 4:49 pm

You said,
“Please tech professionals stop telling us it’s just not possible. We are not crazy .... we are actually very smart”

people working for tech pro and commenting have not ever been hacked and so do not understand the problems victims go through and so they think they are paramoid… and only feel they lack knowledge of these things…

If you come across a company who can identify who hacked my phone, please get in touch.

Reply

Thank u an amen! I

From Nicole Nacey on February 07, 2020 :: 2:04 pm

Thank u an amen! I am very smart an I’m not crazy.. they are the crazy. They are ruining my life. I don’t know anything about hacking but someone needs to make an app that hacks the hackers so we can show the proof. Mine is theu cookies I think. But thank u christine for saying we are smart. Look how many ppl are having this problem and were all saying the same things. None of us know each other. Were smart enuf to know were being hacked at least. Why won’t police do something it’s against the law? I feel very violated. I feel raped. That’s ok?? No. So wtf?! They’re ruining my life. Horribly. And my sons. Its ridiculous. They stay one step ahead.

Reply

feels like a safe place

From Dani on March 19, 2020 :: 11:07 pm

I have been reading all these posts and i feel like i am among people that know that iphone CAN infact be hacked and that even though it ,makes complete sense i am not important enough to hack,...that i infact AM important enough to somebody. I have been reading trying to find anything to help me locate even a shred of identity of this hacker i call the boogie man, (i am terribly afraid of the dark,) the boogie man operates in the darkness of my device. I have done everything in my realm of knowledge to prevent or to call attention to whatever this person has intended for my harm. If anyone has any advice or little tips and tricks to share on where in my device i can discover his bread crumbs and have the proper people handle this.

Thank you for sharing your stories
It helps knowing you arent alone.

App that hacks the hackers

From Jonathan on November 26, 2020 :: 12:21 pm

This is such a great idea. An app that hacks the hackers

I got hackers too but I'm making it hard for them

From Spyg on June 27, 2021 :: 4:53 pm

Wipe all devices first. Put a VPN/Antivirus on all devices in the home. Disable location, cookies, activity, and privacy settings in all devices. Encrypt them all with a sd card or bitlocker if you have a windows computers. You are probably gonna need to buy a 32 g microsd card for your phones and encrypt it. Put a VPN and antivirus on your phone. If they have hacked your wifi then buy a new router and put a firewall on it. Use web pages like Tor or Startpage for added privacy. Delete all unsecure email accounts i.e. Yahoo, Gmail, AOL etc etc. Get a encrypted email account ONLY. Encrypt your cellphone and put a antivirus and vpn on it. Use privacy web browsers. Stay away from google. Create dummy accounts for samsung and don’t put your real name in the email accounts. DO NOT click on unknown links that come into your device or you get online. It will infect it with a bug that can bypass a VPN. Then you will have to master reset it again to get it out. I hope this helps all of you. Be blessed.

Hacked too

From Sheila on January 10, 2020 :: 2:30 pm

You are exactly RIGHT.Been dealing with the same issues over 2 years now and 6phones later and 20+ phone numbers..
Instant apps take over the phone the minute its activated.
Told hackers use our emails to solicite money while scamming others lost 2 jobs now over it!
SOMEONE has to take responsibility and HELP US!

Reply

Okay I am going to

From Lilred70 on April 07, 2020 :: 11:44 pm

Okay I am going to put out a HUGE
I AM SO SORRY!! For everyone going through this He’ll. With so MANY of us I’m surprised we haven’t met in person…
Hang on..
I lost my home, vehicle, career, kids, Dad’s respect, self confidence and then myself. Being an empathetic introvert, it had taken me YEARS to finally Love myself. Then I was introduced to my own personal wet dream. He of course was EVERYTHING I’d dreampt,my fantasy man I flesh and blood!!. Hahahahaha! Uh-huh! 4yrs later..here I sit still trying to figure out, not only how to reassemble my life, but do I even want to. Is it worth it? Anyways, he lied, he cheated, and as of 2 days ago…he loves me. And He Knows My 1st Ex..who spent the last 17yrs making my life Hell. I’ve decided it’s up to me to allow or not whomever to have ANY control over me EVER again. I suggest putting your pH down and start doing your activities without it. Remove THEM from where they’ve never been invited. It’s hard, really hard. But the more you get used to NOT having your phone all the time, you’ll start becoming annoyed at notifications. They become interruptions. Remember, when someone calls or texts you, it’s a REQUEST for your time. Nobody control that but you and God. For the techs… my oldest son’s best friend has been building PC’s since the 5th grade, he’s 21 now. It IS possible to create an app that can basically attache itself to the hackers, and he’s working on one now. I told him he should name it Tit4Tat or BkAtcha. I found mine. A narcissist can not possible believe that ANYONE is better than them. I knew he’d mess up eventually. But please don’t treat these ppl as though mentally unstable, because they weren’t when it all started. Gangstalking is real and in KY they ain’t all to worried about hiding what they’re doing but they’ll leave ya alone for a bit if you ask them nicely with properly placed and sharp equipment. Oh and mine is selling my stuff of the buy/sell sites.
PS..the free government phones are made in China and come preloaded with malware in the Homescreen App.. the umx was the one I had ...Ultimate Mobile Experience!! Right!! Peace out fellow crazies!! Remember
IT IS WHAT IT IS TILL IT AIN’T NO MORE

Reply

Thank you

From Erica Nixon on April 02, 2020 :: 7:00 pm

That’s what has been happening to me I know it’s not my device because it’s been happening for 7 years only I gave back then and then 6 months ago I started to try fix it when your javascript is disabled from sprint. Then all my data is being stolen and its followed me on every device I have a surface and like 20 computers before at the top there are names of all the computers I just started to click .. I found a file in excel for Microsoft it had every email password and all of this happens over bluetooth I’m being logged theres key phrases I can tap on the search box hit the x and it will show me everything that my phone just did I go back into source codes I mean I’m not smart but I am now but how do I find out who I have screenshots of stuff but I dont know this part and I think it’s the hackers how did you figure it out or when I get into a car my info goes on the radio from bluetooth it’s crazy but real yesss

Reply

Facebook sim card hack

From Blazing Saddle on December 30, 2019 :: 3:49 am

Bear with me, this has to do with sim-card hacking.
I’ve hated Facebook ads since they started.
Over a period of more than 12 months, I began reporting Facebook ads in their ‘spam’ option.
During the four times that I did this deleting spree, each time, my chat communication on Messenger & Skype failed to connect for a few weeks.  I would allow the ads and Messenger & Skype would resume as normal.
The last time I was on this deleting spree, I was reporting a huge number of ads, 20 ads in less than half an hour online.
Within days, my Messenger & Skype again failed to connect.  This time was more sinister.
Facebook has made a DOS attack on my wife’s sim card. (she lives overseas, hence our chat)
Her sim card has been locked out of Messenger & Skype.  She bought a new sim card and within a day, the new sim card was also locked out of Messenger & Skype.
We chatted on her mum-in-law’s phone, meaning the mum-in-law’s phone is associated with my Messenger account, within 2 days her Messenger was also failing to connect to my Messenger.
Who else has this kind of specific access to my account except Facebook?

Reply

That simply isn't a possibility

From Josh Kirschner on December 30, 2019 :: 11:04 am

I don’t know what specific issues you’re having with Messenger and Skype, but there is absolutely no way that they are due to Facebook “hacking” your SIM cards or performing a DOS attack. If Facebook was really concerned about you reporting ads as spam (which they probably aren’t), they could send you an account warning or suspend your account. A multi-billion dollar company isn’t going to commit felony hacking against individual users to address this. Also, note that Skype is owned by Microsoft, not Facebook.

Reply

Me too! For over 4 years.

From Ian Karoz on January 01, 2020 :: 7:18 am

Pamela, the hacking attacks you write about are absolutely right on and mirror all that has and continues happen in what’s left of the life I once enjoyed. Josh, you are either one of the responsible or one who needs to take a seat and listen. That’s what are biggest problems are. The ones who don’t believe us and call us crazy. We need to find out if we have a common enemy or have been attached to some similar organization at some point I’ve narrowed it down to a federal agency but not the FBI or others like them. They might be the ones doing the surveillance but they’re taking orders from another extremely powerful group ask this, what is the largest union in the United States? And if you think about who the members are and what type of technology and control they might possess it becomes clear they’re the only ones who could pull it off. This union has employees in everything from aviation and most other transportation departments to food services, healthcare, etc and think just for a minute that alot of these members have spouses or significant others who could aid them by whatever means necessary. . Rumors and lies are there s.o.p. and they go about this in a third grade manner. Just like bullying. That ugly word. How about this one REVENGE. Bleak? These individuals are part of the largest hate group in North America. I was once told to find out who hacked you, you needed to think back a few years to a time you might have really stepped on someone’s toes
and when you got that pinpointed, think back a few more years. I’m now back to 2010 and as I write this I’m considering going back a few more years but I feel that what I’ve found out about 2010 seem to fit exactly what has been happening. The big problem now is evidence. Bitten line, I got slim to none. They are very good at what they do and who they use, hurt, destroy. But I got a feeling my next move will be either my last or a huge step in bringing them to what they hate most. Being exposed. They know what they do is wrong. And they are afraid of being unmasked. Happy New year.

Reply

Hacked too

From Sheila on January 11, 2020 :: 11:43 am

You are Right on point!!!

Someone used my number to

From Angel Tomasson on February 04, 2020 :: 12:37 am

Someone used my number to fake a message to say something I didn’t say. How can I track that or get proof that I did not send it??

Reply

It's not hard to spoof texts

From Josh Kirschner on February 04, 2020 :: 11:10 am

There are lots of services out there that will let you send spoofed texts to someone using any number you choose (just google “spoof text”). You should be able to pull up a list of all your texts in your carrier account with details on who you sent texts to and when. Also, the recipient of the spoofed text may be able to contact their cell carrier to get additional details about the true sender from the message header information.

Reply

Spoof texts? Help

From TT on September 29, 2021 :: 11:53 am

How can I get this info from my carrier? I’ve never been able to get a text message list from my cell company before, only phone numbers years ago. A stalker texts me pretending to be contacts in my phone. I also believe she’s text others pretending to be me. The same was done with my social media before I had to shut it down.

Reply

Hacked

From Nicole Nacey on February 07, 2020 :: 1:55 pm

Same with me on everything you guys are saying. I got my son taken even. This is horrible an not right. The police dss everyone says I’m crazy but I’m not. They have been stealing from me for a year and know everything I’m doing from my phone and they can stay one step ahead of me. They r ruining my life. I know who it is. I just don’t know how to prove it. It’s the old chief of police son and his gf. He steals all the time he’s a junkie an no one will do anything cause of his father. Its complete bs. He is ruining not only my life but my sons as well. I got some money after my mom passed an they stole erything. No one believes that I have stuff going but no one will ever come sit with me or help. I’m about to the point of just ending it. Its driving me crazy an nothing I can do. I’m over it. I can’t do anything an font know how to stop this. Someone needs to make an app that can track and hack the hacker so I can show police or whoever it’s TRUE an I’m not crazy. I miss my son an this is beyond messed up.

Reply

Android device hacked total control haker usurped

From Mani Jayakumar on February 25, 2020 :: 10:33 am

Simple this is a lesson my device is hacked ..the hacking is such the device is controlled without sim.. If not moved legally ..little hesitant this is a advanced hack.. Pending severe legal action

Reply

Ditto

From mixen on March 02, 2020 :: 3:05 pm

Amen. To Josh-ditto my question to all   who question in abelittling and/or degrading manner. I, too, have picked up by law enforcement, so I claim: Josh, either you are ignorant, incompetent or you are part of it. Your questions insult our intelligence.  I have wondered may times, why? Why would the police department do so may things that question their integrity. THAT, is the question. I. believe there is something, or someone, way beyond the public, because I have dealt with organizations that are putting integrity on h line, and more than once, so that really answers my question on if there is help out there. I do not believe there is aymore, so the next question is how far down do I want to go before I say it’s no longer worth it. I’ve lost everything s well, and my family has been deeply affected. So, I’ve done enough reading and need a clear answer or someone to jump in and say this is not ok. A ton. Until then, I see no change and I am homeless broke. Thank you very much, I blame our govt either way. For being either directly involved, or directly uninvolved.

Reply

I'm sorry you're struggling with those issues

From Josh Kirschner on March 03, 2020 :: 5:43 pm

Privacy and privacy protection are very important to us. We have covered the topic extensively on our site and I, personally, have written a number of times about what you can do to protect your privacy across your devices and more broadly.

But not every issue is caused by hacking. And I try to help people understand when issues with tech are possibly hacking related and when they are not. Often that requires asking questions to gather more information, and often it means giving my opinion that the issue they’re facing isn’t related to hacking or spying. Unfortunately, not everyone wants to hear that answer.

Reply

Me too..3+ years hacked!! (TI here..)

From Phoenix on March 02, 2020 :: 11:26 pm

I have been thru countless phones and numbers. With different credentials. Trust me I’ve tried it all. I’m being gang stalked for sure. People appear in real life as well and GIVE me free working phones when I remove the battery and throw the phone in the trash. This is crazy! Damn… Just realized someone gave me a phone TODAY for free… Under the guise of helping me with my problem.. but is it a sincere and innocent gesture? Who knows?! He’s also helping me with a place to stay (hotel) when he has a house down the street…. Is it sincere?!!? IDK anymore… I’ve been thru this before when they were implants… Making me paranoid.. just what they want.. someone plz help!

Reply

Disposable everything

From Spyg on June 27, 2021 :: 4:57 pm

Encrypted and/or disposable cellphones are the way to go. Encrypted emails ONLY for all accounts. Stay away from APPLE and do not sync GOOGLE into your devices!

Reply

My disposable phones were hacked

From TT on September 29, 2021 :: 12:01 pm

I got prepaid phones from Walmart, tracfone, cricket too. They were all hacked. Stalker somehow disconnected then from the network and locked them. Took them back to the retailer, and they said they didn’t understand what was going on. Happened 4 times, different phones/carriers/phone numbers/names/accounts…same result.

Reply

I've been hacked for over 2 years

From Craig k on March 08, 2020 :: 4:47 pm

I go through a phone a month. Every time I get a new phone it’s hacked in the first hour. I’ve tried everything to protect it nothing works. I’m also believe I’m being gaslighted. This has ruined my life. Been to two psychiatrist both have told me I’m not crazy and to get out of my current marriage. I’m having to move from the place I’ve called home for over 30 plus years. Our elected officials need to implement laws and stand behind them

Reply

Hacked

From Hacked on March 25, 2020 :: 1:27 pm

Notice when you go in the phone store, who is in there or cones in after you. They get your account info while youre in the store. Thats how youre havked so fast… Be aware of your surroundings..

Reply

Can't access my account he's in there right now hacking

From Wendy Kinyoun on March 08, 2020 :: 10:14 pm

He has my social security number as the password for 57 apps and my legal name is the username plus @ gmail.com added on some of them i have about 15 different gmail accounts now no matter what i do for the last 3 weeks he is camping in my account i have dialed 911 twice no help i have reporting to google a dozen times and nothing the FTC is investigating and the hacker is still in there. Identity theft.com is doing a phone/ video investigating Monday. Morning at 9am he said it could take 6 months. He has put me on google as in prison stole my health insurance money and need to access my old gmail he deleted to verify my identity with insurance and doctors

Reply

You cant fix it...

From Hacked on March 25, 2020 :: 1:20 pm

...

Reply

You cant fix it...

From Hacked on March 25, 2020 :: 1:24 pm

They can hacknyou from yoyr phone carrier store. They remotely access your cell. They grey out the apps they use so you cant delete. They use your data and wifi againat you. Changing your pin or setting back to factory doesnt work. When you turn your phone off and on and put in your pin youll see ‘starting your androud’. Thats them getting back in your phobe AFTER youve signed in. Parasites…

Reply

hack

From jasmine mistry on March 27, 2020 :: 2:29 pm

a friend of mine has hacked my phone and is checking every chat of mine what should i do

Reply

You should follow the steps in the article

From Josh Kirschner on March 27, 2020 :: 4:44 pm

If they really do have access to your texts, then they have likely either installed spyware on your device or they are accessing your texts online because you have insecure passwords on your iCloud or Google accounts. So follow the steps we list in the article above to resolve those issues.

Reply

Some one is my hacking my phone😭

From Mohd on April 01, 2020 :: 4:48 am

Plzz halp me

Reply

Help

From Laura Jones on April 08, 2020 :: 1:41 am

Same for my best friend and it driving us all crazy someone needs to find a fix

Reply

Someone keeps hacking my account

From Ronald Hicks on April 14, 2020 :: 9:46 pm

Someone keeps hacking my account I have the ip adress will that help

Reply

Hacked 2

From Linda on April 24, 2020 :: 11:51 pm

Omg reading this stuff makes me feel less alone but also so afraid because im not crazy and this shit is happening to not only me but many of u. Its purely evil to put anyone through this. God help us

Reply

I’m hacked too. I have

From Susie on May 06, 2020 :: 12:53 pm

I’m hacked too. I have gone through 8 phones and thousands of dollars within the last few months. I’ve changed my phone number accounts lost pictures and personal information and I’m still getting hacked. Where should I go to get help. I’m not very good with technology so I would prefer to pay someone to help me. I lost my job because of this and it’s been going on for a year now and I’m just hopeless

Reply

I’m hacked too. I have

From Susie on May 06, 2020 :: 12:53 pm

I’m hacked too. I have gone through 8 phones and thousands of dollars within the last few months. I’ve changed my phone number accounts lost pictures and personal information and I’m still getting hacked. Where should I go to get help. I’m not very good with technology so I would prefer to pay someone to help me. I lost my job because of this and it’s been going on for a year now and I’m just hopeless

Reply

Incognito

From Spyg on June 27, 2021 :: 5:00 pm

ENCRYPT IT ALL. Use a disposable phone for important stuff. Delete all unsecure email accounts i.e. Yahoo, Gmail, AOL etc etc. Get a encrypted email account ONLY. Stay away from APPLE it is a hackers paradise.

Reply

Hacked phone call

From Shahanasshanu Muhammad Shahanas on May 14, 2020 :: 2:20 pm

Some one hacked my phone calls I know that who is one

Reply

I need help badly not a tech person and I recently discovered my ex girl been hacking me

From Travis on June 10, 2020 :: 11:04 pm

For 7 months or longer now I went through he’ll. My ex tossed me out and kept all of my property. I went through several phones from breaking them cause I’m not a tech guy and got frustrated. I went through several emails cause my password keeps changing and several Facebook accounts. I know its her doing it, I just need to get proof of it so I can have a life again. I want to take her to court to get something back out of out of our 10 year relationship. She left me with nothing and homeless. I lost all my contacts and couldn’t even call for help if I wanted to. I still have 3 phone that work and I just took batteries out. Please help me get my life back and move on with my life.

Reply

Hacked to death

From Brenda ' Bree' Shelton on June 15, 2020 :: 7:30 am

17 months of unrelenting stalking. Monitoring, isolation, control. Not allowed communique. This is 3rd attempt in a row to send to u. 13 phones destroyed disabled and q Dl laptop and recovery disabled, drivers re.oved. I am dying stage IV renal Failure wish I was dead already. Not one month in 17 with a full month on phone. 6 months I gave up no phone at all. Can’t call my doctors. Family, nomore friedslest hero same to them. I am dying alone because of him. He is interfering now with my keyboard. He blocks federal documents and intercepts federal mail to me. Police dept. =  Po Dunk. Make fun . Don’t respond, or give me requested reports at all . “We don’t have time for…. “Are you on any mention meds and taking them regul6?’ And simple denial that weknow nothing about computers, on one hand. Ut on the other they tell me, ‘he’s, probably in Africa,’ or ’ He can’t do that.’ And won’t even open. Flash drive evidence of him downloading entire accounts and transfering them using my name to other carriers, changing phone numbers. And more, more more.. call please XXXXXXXX or write me with some help, no one else will, XXXXXXXXX
BREE SHELTON

[Edited to remove personal information]

Reply

Find hacker name

From Mahesh Kumar on June 17, 2020 :: 9:48 pm

One who a person hacked my phone I must know his or hes name is it possible

Reply

hack

From MGR on June 29, 2020 :: 4:26 am

someone has hacked my instagram account and typed messages to random people

Reply

Read More Comments: 1 2 3 4 5

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships
Accessibility Statement
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.