Tech Made Simple

Hot Topics: How to Fix Bluetooth Pairing Problems | Complete Guide to Facebook Privacy | How to Block Spam Calls | Snapchat Symbol Meaning

author photo

How to Figure Out Who Hacked Your Phone

by on June 16, 2020
in Privacy, Phones and Mobile, Cell Phones, Mobile Apps, Android Apps, iPhone/iPad Apps, Tips & How-Tos :: 271 comments

Techlicious editors independently review products. To help support our mission, we may earn affiliate commissions from links contained on this page.

For most of us, our phones are the center of our daily lives, and as a result, they contain a treasure trove of personal information, from banking details to messaging and email accounts. This sensitive data can be pretty enticing to a range of the nefarious, from cybercriminals to someone you may even know.

Phone hacking can involve the unknowing download of spyware that relays information on your activity – such as logging keystrokes to scrape passwords; spy apps downloaded by someone with access to your device; or other malware that exploits your phone, for example by using its internet bandwidth in a botnet, as occurred with malware that infected nearly 20 million Android devices.

“The most common way that smartphones can be hacked is to infect the device with malware,” says Victor Chebyshev, a security researcher at Kaspersky Lab. This malware can arrive on the device buried inside apps downloaded by the user – and the likelihood of a malicious app rises when downloading away from the official app stores, which police their content.

While iPhones aren’t immune to hacking, Apple’s strict vetting policy means the incidence of bad apps targeting iPhones (at least non-jailbroken ones) is lower than for Android phones. “Android devices are more susceptible to these kinds of attacks because they have the option to install applications from third parties,” says Chebyshev.

9 steps to figuring out who hacked your phone

A sluggish phone or fast-draining battery are common symptoms of a compromised phone – but they can also indicate your device needs a spring clean to spruce up performance or improve its battery life. Another red flag is if your data usage has gone through the roof – this could indicate a dodgy app is sending data back to its mothership.

“Whether a user can determine who is responsible for a compromised phone depends on what kind of threat was on the device,” says Chebyshev.

According to Verizon’s 2020 Data Breach Investigation, 86% of cyberattacks are motivated by monetary gain – for example, through selling someone’s stolen credentials on the dark web, gaining access to financial accounts, or hacking sensitive data and holding the victim to ransom. In these cases, hackers usually rely on malware that remotely exploits vulnerabilities in apps or operating systems to steal information (or in the case of phishing malware, trick people into inputting their critical data).

However, somebody known to you who wants to monitor your movements – whether that’s a disgruntled ex or suspicious parent – and who has physical access to your device might also be able to install a spy app that acts like malicious software, tracking your location, photos, messages and calls.  

To narrow down the field of suspects, you can try to determine exactly how your phone is being compromised.

1. Check your phone bill

Are you being charged for premium-rate texts you never sent – or texts you never signed up for? You’ve probably been infected by malware that forces your phone to send or receive texts that generate revenue for cybercriminals. This common form of mobile malware is believed to be the first type found targeting Android, back in 2010, and today plenty of it is still floating around.

If you’re receiving premium-rate text messages, try texting STOP to the number. If this doesn’t work, you’ll have to contact your cell carrier who should be able to block the number.

If your phone is sending the texts, you may be able to fix it by running a security app such as Bitdefender or McAfee to find and remove malware (on Android only; security apps for iOS don’t have this feature). Also, try deleting any third-party messaging apps and any other apps you installed just before the phone started sending the texts.

2. Go through your apps list

If there are any apps you don’t remember downloading, look them up online to see if any of them have been reviewed negatively for malware or other suspicious activity. In this case, the apps will have been compromised by a hacker who likely isn’t targeting you personally but is distributing malware with the aim of scraping as much data as possible. The BankBot malware, for instance, is a trojan that has infected hundreds of Android apps to display a phishing screen to steal users’ banking credentials.

“If it was a regular trojan [malware coded within another app] the user will not be able to attribute who was responsible for the attack,” says Chebyshev. “If it was commercial spyware, it’s sometimes possible to figure out the responsible person.”

3. Look up your flashlight and battery-saver apps

Got a phone full of apps and can’t remember for sure which you downloaded? Some categories of apps have attracted more than their fair share of malicious actors – several flashlight apps on Google Play were infected with malware that tried to scrape users’ financial info, while one should be wary of battery-saver apps as they have often been used for malware, says Josh Galindo, director of training at phone repair service uBreakiFix

If you have these types of apps, check online for any negative reviews. You can also try deleting them to see if this affects your phone performance. “If you install an app and the device performance decreases, that’s an indicator,” says Galindo. “If you uninstall the app and your device begins working properly again, this means that the app is likely contaminated with malware and you should avoid downloading it in the future.”

4. Double-check your favorite popular games

Downloaded a new super-popular game recently? Ensure it operates like it’s meant to – and validate that by looking up reviews online – otherwise it may be a scam version, potentially ridden with cryptojacking malware.

Cryptojacking trojans mine cryptocurrency unbeknownst to users, and their prevalence has risen on smartphones that when infected in thousands, can deliver attackers a high overall processing power. The idea is that, if a cryptojacker hacks other devices, they can get paid for mining without having to use their own resources (or pay the electricity bill).

On mobile, cryptojacking malware tends to hide inside innocent-looking apps such as fake versions of popular games. If your phone slows down, heats up and its battery is dying long before the end of the day – and you’ve tried to improve your battery life– it could be a sign that a malicious app like a cryptojacking trojan is hogging all the juice.

They’re mostly prevalent on Android – and if you’ve downloaded from non-official app marketplaces, the risk is higher.

5. Scroll through your call list

Done all of the above and still convinced that someone somewhere has your personal data, siphoned from your smartphone? Apps aren’t the only way a phone can be infected by malware. Have you picked up any random calls lately? “Callers offering a free cruise or claiming that you won a sweepstakes are likely scam efforts to hack your information or record your voice,” says Galindo.

6. Did you click that link?

If you recently clicked on a link on a text message or an unexpected pop-up, you may have inadvertently fallen prey to phishing. Phishing often preys on panic or high emotion – as in the coronavirus-related scam texts claiming that receivers had been exposed to someone with COVID-19 symptoms, and exhorting them to click for more information.

It’s often impossible to divine who is behind such scams, although you can report any phishing texts to your cell carrier and block these numbers.

7. Consider the last time you used public WiFi

According to Kaspersky Lab, one in four hotspots are unsecured, and even the ones that are password-protected could potentially be set up by someone with malicious intent. On top of that, the protocol (WPA2 or WPA3) that encrypts traffic between devices and routers can itself be vulnerable – as in the serious WPA2 flaw uncovered by researchers in 2017 that would have allowed certain traffic to be intercepted.

If your phone isn’t protected by a VPN and you logged into an unsecured public WiFi hotspot, it’s possible someone could have been spying on the connection – and scraped your sensitive information if you logged into your email or bought something online.

8. Is your iCloud safe?

iPhone user? A cracked iCloud login can allow someone to not only access your photos, but also make use of semi-legal spy software to remotely monitor your device’s calls, messages, contacts and location.

Luckily, enabling two-factor authentication for your Apple ID drastically reduces this risk, because if someone tries to sign into your account from a new device, you’ll receive an approval request and sign-in code on your iPhone (or other iOS/Mac devices linked to your Apple ID).

(To enable two-factor authentication, for iOS 10.3 and newer: Settings > [your name] > Password & Security. For iOS 10.2 or older: Settings > iCloud > Apple ID > Password & Security.)

However, a weak or reused password without two-factor authentication can put your account – and phone – at risk.

Here’s how it works: Many people use the same email address in their Apple ID as the login for dozens of online accounts. If this email address is revealed in a data breach, then hackers – who may purchase or find these login details at data dump websites – have access to your Apple ID.

Couple that with a weak password and your iCloud account can be breached by attackers who use cracking software to guess hundreds of hacked or common passwords in order to breach accounts.

Unfortunately, the same goes for an email and password combo that can be guessed or found out by someone you know who’d want to spy on you – especially if they can access your iPhone to use the two-factor code.

9. Run a security scan

Since most malware is designed to evade detection, you may not discover much on your own. Spyware apps – or stalkerware – is one category of particularly insidious apps designed purely to monitor a victim’s activity (rather than for any financial gain).

Security apps, particularly for Android, can help determine if your phone contains such a malicious app, as well as help fend off future cyber attacks by, for example, preventing you from visiting malicious webpages.

Android: Commercial spyware is unfortunately all too easy to find online. Such spy apps have system-level access to extremely detailed information about your device activity such as the messages you write, photos you take and GPS location – and what’s more, these apps are hidden from view.

They also need to be downloaded physically to your device, which means if they’re on your device it was done by someone with access to your device (and your PIN). Chances are, you can figure who in your life would want to monitor your phone. 

To find out if you have such apps on your Android phone, download a security app such as Bitdefender or McAfee, which will flag any malicious programs. You can also head to Settings > Security > Device administration and check if “Unknown sources” for app installations is enabled (and you didn’t do it) – this allows apps from non-official app stores, on which there’s likely to be far more stalkerware.

iPhone: Spy apps on a non-jailbroken iPhone are far less prevalent since such software – which tampers with system-level functions - doesn’t make it onto the App Store. (However, they do exist and work via someone knowing your iCloud login and password.)

If your iPhone is jailbroken, that opens it up to potentially malicious apps that haven’t been vetted by the App Store, including spy apps downloaded without your knowledge.

Security apps such as Lookout and Sophos will alert you if your iPhone has been jailbroken – so if you’re alerted of this but haven’t done it yourself, that can be a red flag.

However, whether security software – for Android or iOS – can find spy apps will depend on how sophisticated or new the spy app is since security software scans for malware that’s already known. (That’s why it’s crucial to download updates to security software as soon as available since updates will incorporate new instances of discovered malware.)

3 steps to take if your phone has been hacked

1. Delete any apps or messages that may be malicious

If deleting them fixes any performance issues, great. Even if not, it’s a good idea to clear your device of apps that may have been flagged from that security scan.

You can also try shutting down apps one by one, as soon as your phone starts to slow down or heat up. If shutting down a particular app seems to return things to normal, that app may be malicious – or at the very least, not play too well with your device.

2. Do a factory reset

If after deleting the suspicious app(s) your phone is still behaving strangely, this nuclear option is a quick way of clearing your device of malicious – or sluggish – software left behind.

Android: Settings > System > (Advanced) > Reset options > Erase all data

iPhone: Settings > General > Reset > Erase All Content and Settings

3. Check if your information is out there

Unfortunately, many hacks and malware present few to no symptoms and often the only time people are aware of a breach is when their digital services are hacked, or, worse, they’re the victims of identity fraud, where hackers have used their stolen information to open accounts or lines of credit. 

There are a few tools you can use to check if any of your information has already been compromised. Have I Been Pwned? is a website run by security developer and Microsoft Regional Director Troy Hunt that checks if email addresses have been exposed in breaches of popular apps and services.

Security apps including Bitdefender (Android) and Lookout (iOS) can also alert you if apps and services you use have been breached, putting your personal information at risk.

Depending on the scale of the data that has been exposed, you may want to set up a fraud alert at the major credit agencies, which will require any potential creditors to request additional verification of your identity.

Keeping your smartphone safe

If you find that your logins – particularly passwords – are floating around online, the first thing to do is to change your passwords. The best way to do that is to use a password manager which can automatically generate and save complex, unique passwords for each of your accounts. Check out our top-rated picks here. We like the Dashlane password manager, whose Premium version (from $4.99/month) also scans the Dark Web for instances of your emails or logins being posted for sale.           

And to reduce the risk of future phone hacks, always observe general cybersecurity hygiene:

  • Think twice before clicking links in SMSes, other messages and emails
  • Review app permissions to minimize the risk of a malicious app download.
  • Enable two-factor authentication for every online account possible – and especially primary emails and logins like your Apple ID.
  • Download security updates for your phone when available to patch vulnerabilities that could otherwise be exploited.
  • Protect your device with a PIN or biometric authentication.

Updated on 6/16/2020 with new tips and recommendations

[Image credit: phone hacker concept via BigStockPhoto]

Natasha Stokes has been a technology writer for more than 7 years covering consumer tech issues, digital privacy and cybersecurity. As the features editor at TOP10VPN, she covered online censorship and surveillance that impact the lives of people around the world. Her work has also appeared on BBC Worldwide, CNN, Time and Travel+Leisure.

Discussion loading


From Rockie Vincent on January 20, 2021 :: 8:54 pm

Man I just typed a Long page of what was going on with my devices and it wouldn’t even let me post it this happens every time I try to get help please help me


Is there no one

From Jeremy Birmingham on January 29, 2021 :: 9:52 pm

Is there no one to help the little guy anymore. People just laugh at me when I tell them I’ve been hacked I buy brand new video cameras that will not record.  My I phone will record but it blurry. This isn’t the America my granddad fought for. He would be ashamed. Thank anyway.


I can’t believe it

From shawn on February 02, 2021 :: 1:49 am

I just found out that I’ve been tracked for a very long time on my iPhone. Not only my location but everything I viewed on the Internet, all my apps my personal information my password has been changed several times and just now I found out where the phone number was coming from that was accessing all my personal information. I hit pound pound ##002# and it said your deactivation of this person‘s phone number is a success. Additionally I found on my computer all these different monitors somewhere human interface devices. And now my information is all over the Internet. Tomorrow I have to go to banks I have to go to my school I have to call Facebook I have to delete apps get new phones change passwords and then file a report. I want to document this because the person that I think it is might try to do something to me. On the Internet my phone number was attached to this person on many different sites I’ve taken pictures and sent them to friend and then today all that information was taken down, my phone number was not connected to that person anymore. So what I did was take before and after pictures and send them to friends. I’ve given this person an opportunity to come and talk to me about the situation and own up for whatever reason they were doing this. I don’t want to hurt anyone, but my personal life has been violated and put on the Internet. So what I’m writing this for back up so everyone knows what I’m going through, And all my information has been sent to parties in three different locations. I don’t want anyone making up anything about me. And it’s horrible because all I want is an apology and a reason why. In the most horrible thing about this it’s a family member. I’m crushed . Devastated but this is to protect myself. I have a big paper trail to prove what they did, but I have a feeling they’re going to try and do something to me before I rectify the situation thank you for listening


I know I have been hacked!

From Ashley on February 24, 2021 :: 9:34 am

Please if there is anyone that can help me prove to the police that it is this man who is evil. Please if you have a heart and a good soul he has taught me the antichrist can look like your best friend. I’m begging. Thanks


I have been hacked he

From Ailes on March 04, 2021 :: 6:56 pm

I have been hacked he phone me tell me that he wants money or he will post nude Pic of me across the world what to do guys any help


Sounds like a scam

From Josh Kirschner on March 05, 2021 :: 6:44 pm

You didn’t provide enough detail about what actually happened, but it sounds a lot like the porn email scam we wrote about here: With that scam, the person doesn’t have any nude pics and your device wasn’t compromised, the scammer is just lying to you to try to trick you into paying.


Need Help

From Hacked CPT SA on March 08, 2021 :: 2:00 am

Hi there, my phone got hacked. My Gmail was stripped and all my backed up photossnd vids of 15 years and documents all gone. My phoje started to act suor slow at random and my flashlight would go on at random during thr night somtimes daytime too. I would wske up and check my phone and it would be on some site called soaptoday. Just reading whats happening is scary.
I definately need help.



Do you perhaps know of

From O-o on September 01, 2021 :: 8:44 pm

Do you perhaps know of one by the name Michael James minie.


Its funny how alot of those emails so are bullshit n try to cover your own ass ...yeah i do know

From Gerrod Chambers on April 03, 2021 :: 11:23 pm

All that patenal out the window


I have been hacked

From Jay on April 11, 2021 :: 2:02 am

My phone, internet and emails getting hacked repeatedly
I changed my phone   Factory reset   Passwod reset but still same issue.
I get popups, spam calls and sms and mails.
My whats app, appleid are getting hacked too
Even my tv is showing content not relevent to me
Please help me

Thank you


6 phones 6 email 6

From Tim on April 16, 2021 :: 6:37 am

6 phones 6 email 6 different address phones are completely taken over.. passwords settings the works .  Is it mostly my wife .. had Norton and PC matic deleted also


Also get locked out of

From Tim on April 16, 2021 :: 6:43 am

Also get locked out of factory reset s


Sorry also no Ransom no

From Tim on April 16, 2021 :: 6:48 am

Sorry also no Ransom no cryptic messages . Just take over and shut down . This phone is next


Phone huked, emails, facebook

From Lala on May 03, 2021 :: 7:21 pm

Hi guy’s. Please If any one can help or any info. sorry to say but .. previous domestick violence survivor. All away sense so that I did get away. No. Wrong. Do not meter haw many times I changed my phones, numbers, SIM just make it. Some one is in my phone. I know it, I fill it. Emails was huked. Change the passwords, did all this staff. Just name it. I even know who does it. But.. can’t prove it. Law does nothing. Not enaff evidence. Hmm. I open my own business. All off a sudden do not receive none one call any more. Going on 5 years off that.2 disaibele kids.child Suport not pay at all. They’re walk away with all. Do not meter who I say about it every one looks at me like I’m crasy. No one believes. Haw and what can I do. It’s been so long that I do starting fill like crasy. I swear its like in a movie. Would never say that it’s ever can happen to me. Any one, any thing, any help. Please. [personal information removed].text.Thanks



From Shivani on May 15, 2021 :: 11:04 am

I think someone is watching me…I think there is some hacking device or apps or something else in my mobile..I dont know what is that please help me to come out of that…Please secured my mobile


Please help!

From Andrea on May 20, 2021 :: 1:57 pm

I stumbled into this article and I have to make this quick since I may get booted out or frozen but I’m going through the same thing as many of you are if anyone can get back to me it’s been over a year now and I know who they are and have some evidence to support it as well as an open police report and Ic3 form from the FBI but no one will do anything! My life is controlled and restricted by “developers students” that work with Microsoft teams so they have unlimited access to my devices I’ve gone thru 12 phones and 15 numbers new accounts and I need to get them out of my shit! ASAP.


I just noticed when texting

From Janet Iddings on May 20, 2021 :: 11:20 pm

I just noticed when texting on my phone messages, when I send there is in small letters
LuobTiX’s Boneyard

Is this a hack or?? What and who is this? What do I do?


It sounds like something in your signature settings

From Josh Kirschner on May 21, 2021 :: 10:12 am

This sounds like something in your text messaging signature settings, but current stock Android doesn’t offer a signature option. What device, operating system and messaging app are you using where you’re seeing this happen?


i have been hacked and can't log into my google account

From Cherry on May 27, 2021 :: 11:46 pm

i have been trying for a week and i don’t know what else to do.. they changed options for 2factor authentication i do not know the new password and i have photos etc that are priceless to me… can anyone help


phone hacking

From Mary Growth on June 18, 2021 :: 2:26 pm

Working with Andrew is something I’ll never forget because I wasn’t really expecting it to work. I was only testing him and he delivered more than I expected, he really amazed me and till now I still have access to the phone. Contact him on gmail andrewthoma cyberhelp @gm ail. com and you can also contact him on whatsapp +14696097628 or call and text him on +14696097628. for any phone hacking


My LG Stylo 5 has been hacked using Google workspace

From Jamison G on June 18, 2021 :: 8:21 pm

I am no longer the admin of my phone - I cannot do a factory reset. I cannot access the source code, cannot disable or uninstall suspicious apps. I found an app which reads the code from everything on my phone and discovered more than one PREINSTALLED APP with tracking/additional permissions orders written into it. I found audio files that were snippets of recorded conversations, audio msg, and phone conversations which I was unaware existed. Some code is for removing my permissions and hiding the fact from me. Making certain toggles - in the permissions manager, for instance- invisible or unable to affect. I uninstalled my chrome update because I read about an issue with the most recent one. That’s when I realized that I had been using g-suite apps .... The icons are different. What prompted me to investigate initially was my stumbling onto a website with very strangely formed syntax…. Like double talk - coded language that was clearly meant for a very select group and worded innocuously for the general public…. I swear, I thought I was dreaming because I tapped something that seemed like it was a link and it opened up a hidden menu… I used my husband’s Gmail credentials and FML it logged me into something I couldn’t emotionally handle and I closed the tab. It was a dashboard to my fucking life. I almost passed out. Now, for nearly a month, I’ve been spiralling into depression and a quiet desolation as I dig into everything I am permitted to access… Its sad to think that after eight years, this is our life… I literally have had zero privacy for at least the entirety of this year. Possibly since I got this phone in January 2020. Anyway, sorry. I have had all the classic signs of my phone being monitored: heat, bad battery, no storage available, glitchy screen, weird text, missed calls with no log and vice versa. I’m guessing they exploited the Qualcomm back door thing as well as the chrome, in addition to having some paid bullshit….
IDK where I was going b4 the rant. Can anyone help? Should I bring the phone and the copies of the code I have from the rewritten apps to the FBI or something?
This is ruining my life and I need it to end.


We should talk

From Laura Robbins on October 15, 2021 :: 12:58 am

This is exactly what I have been going through. I posted back in dec 2020 on this same thread about my situation only at that time I didn’t know that this google workspace was how it was being done. (2)Would be (6) amazing (9) to have (4) someone to (2)talk to that (0)not only understands(4) but doesn’t look at you like your totally nuts.(2) If your interested(4) you can contact me day(4) or night doesn’t matter a time I don’t sleep well haven’t for long long time.


Fit for a Straight Jacket EX-BEAU

From Tonya Ramsey on June 21, 2021 :: 7:13 am

I have read the first page of comments and no longer question my sanity. Same scenarios all started 2 weeks after leaving a narcissist who has an addiction to cyber sexting. He will stop at nothing to protect his circle(?) and his reputation in my very small community. Originally, he gave me my phone and set up the email account. So, he has had access all along quietly. After the break up my phone went haywire linking and syncing contacts. He had already Enterprise enrolled my chromebook. He now has control over all online accounts including my admin account with Google. To explain the entire scheme would take too many minutes of your life. I found his MOBI drive which had everything I needed for proof. Before I could download the info. he moved it somewhere. I believe he is using my name and identities to elicit people to video chat, share and whatever else. He downloads files to my phone and computer. I have no idea what they contain. I think he is installing spyware descretely onto other people’s computers and watching them, also. He is an admitted voyeur. He is blatant when it comes to me and his intrusions, but he was doing it for two years without my knowledge. So, it’s likely he is remotely viewing others. I reported to the local police. They did nothing. They said the things I was describing were not possible. I blew up at my counselor who in turn along with the local authorities (who assume I am delusional or on drugs), got together and had me involuntarily committed. I was released with a clean bill of mental health. I have no friends left. They are afraid he’ll do the same to them. Actually, one of them did have her passwords changed. It’s quite a mess. This is going on five months and I cannot prove anything. I’m scared to death of what he is compiling to implicate me in some sort of crypto currency scam or internet sex crime. He allows me to keep this email address for reasons I fear is a set up. What am I going to do? Is there any way to get justice and hold him accountable for what he has done? I’ve found no way. Please, even if you have no answers, respond. I am completely ostracized in this community with no means of leaving. I’ll be happy with outside reassurance. Exhausted and pissed, Tonya Ramsey, [personal information redacted]


Stolen Identity over 4yrs of hell

From Not my name anymore. on July 29, 2021 :: 4:54 pm

All my accounts, personal information stolen by hackers. Since 2016 imposters possing as a fake oof my identity online romancing and swindling others fraudulent Ly, copies of personal documents, devices are cloning as first Samsung..s9 keep rebuilding and cloning over and hackers are using as tools to do fraudulent activities creating “the activities to make it look like myself”. My computer devices are showing they are organized and members connected to cell phone provider where original device was compromised. The provider ignored my report said I need to provide proof. That was the start of March covid 2020. The dataHarvesting start starting Dec 7 2019. Over 700 gigs per month of data used and the of the changed service provider but the imposters entered the place to change files jacking services to redirect the modem to dark server dataHarvesting on the modem logs communication services are unstoppable.
My business is folding, lost work leads, vehicle repo’d not able to meet financial obligations. So close to bankruptcy and have personally been sedated and have hired my services by using my kind natuured character and teaching me to not trust nor return to be harmed. The Machines are tasked to never stop. And to ruthlessly intended only collect website images one piece at a time to build fake websites and today the icing on the back because the ISP is as dark as the AundroidAuto app can be. My apologies to whom my name has been used to victimize as well as this who I disappointed unintentionally be it physical or psychological. 
I so wish you all the best.



From Not Rewarding Hackers on August 05, 2021 :: 1:57 pm

Been fully privacy & data breeched since Jan 2021- house, shop, online, etc. I was told after 6 phones that they have your social and that is how they are able to find your new purchases. Call the SS administration, i am calling today. All of the IP addresses loging into my account all stem from a cello partners/DBA verizon office. DO NOT GIVE IN!! They want my settlement from losing everything in a fire…. the dirtbags will not get a dime.



From Latif Siddique on August 20, 2021 :: 3:10 pm



please just a moment of your time.,

From peter-john on September 01, 2021 :: 8:15 pm

My girlfriends galaxy has hacked last Sunday the guy lived with us for a bit but we soon reallised he needed to leave I don’t wan to get into it he’s copied all her data to his one drive and whiped every thing she had like pics of now deseased dogs and and I tried my best to get software to try regain anything guys and girls please I come forward begging on both knees is there anything you can help or tell me to try .. Thanks for your time


Where Is The Information On Find Who Hacked Your Phone

From Vicky on October 18, 2021 :: 3:43 pm

I read through this and I see 9 items to help you determine if your phone is hacked.  But, the title is Find Out Who Hacked Your Phone.  I do not see
this information anywhere.  I know about the 9 different test…I want to know who has hacked my iPhone, just as the title expresses.


Help me please

From Joseph Klein on November 03, 2021 :: 10:43 am

My phone has been hacked my life has been hacked I need help please I’m on my third phone I don’t know what else to do they clone my phone they’ve done a lot of things and I just need my life back


I've been hacked on all levels even call intercept they even use Bluetooth cops are waiting on osbi

From Greg cater on November 22, 2021 :: 10:11 pm

They hold my messages. They use my cameras against me. They hack every app I download finally got a firewall but they still have control please help


Being hacked

From Anthony Hall on November 24, 2021 :: 12:12 am

Some one else is using my phone number and email address and Google account from me Anthony Hall from Monticello Ark


Emei Number

From Karen Marie Lord Eyewe on November 29, 2021 :: 7:25 pm

What can be done if somebody else has your emei number on your phones? How can they use the emei numbers?


Compromised IMEI is not a big risk

From Josh Kirschner on December 01, 2021 :: 11:44 am

Unfortunately, if your IMEI is compromised, there’s nothing you can about it. Your device IMEI can’t be changed. But the risks are very low.

If someone knows your phone’s IMEI number, they could (theoretically, at least) create a clone of your physical device. However, that doesn’t give them access to your phone, call, messages, etc. The only real risk is that they could do something bad with that phone and law enforcement might track it back to you. It’s also possible they could report your device as stolen, though they would likely need proof of ownership, as well, to do that.


Someone has hacked my phone, I've has 3 new ones so far. They got access to my Google acct & put me

From Denise on December 29, 2021 :: 10:44 pm

My cell phone was hacked & they have taken control over 3 cell phones. Ive
lost access to my apps, accts & google acct, that had photo/contacts, only photos. I don’t get all my important emails, their being forwarded, get like junk email. I’m starting to get aggravated, like I don’t need a cell phone bc they’ll just keep doing it. Please help me, I don’t know what to do…..


The narcissist or the ones that are saying hacking is not possible

From Jonathan McDonald on January 07, 2022 :: 10:54 pm

The narcissist or the ones that are saying hacking is not possible.. it’s actually very easy to hack. All you people who say it’s not possible go get a job



From Bee on January 09, 2022 :: 3:43 pm

You have enough information about him and his past actions for them to look into it. It’s not that you can’t prove it, it’s that someone is doing all this after you separated from you ex. With everything together you have enough details for them to look into it, and by looking into it they would find that is it. In situations like this they’re supposed to look into people like your ex, especially if he’s tried to run you off the road, ect.

They’re either lazy, protecting this person or dont take you seriously.

It’s about the corruption, not about your lack of evidence. I’m so sorry you have to go through this.


Find My Phone

From mohamed on January 19, 2022 :: 7:56 am

halo i need help sambody steel my phone please help


who cares why...

From Jennifer Bromfield on March 07, 2022 :: 8:07 pm

fill out a cyber crime report through the FBI website.  Let them figure out who it is and why.



From Karrie tann. on April 28, 2022 :: 9:16 am

I have been hacked March 28 2022 my file photos of my husband’s he passed now iv lost all.they also got into my bank account took my money I got a new cell new everything they still got in .now iv closed my bank I don’t pay my bills I’m in debt because here all prepayment cards companies wont take them I can’t even use my cars nothing I so mad I even thought of suicide. Because I loved my husband so much now all my videos are gone but iv except thT some were I made a mistake so iam ok I just wish I could get help



From Shannon Henry on June 07, 2022 :: 2:25 pm

just hoping he gets board


What is the solution? Hacked

From Bri on June 13, 2022 :: 7:16 pm

All of us have similar problems to put it mildly. Does anybody know of any way to get help or to fix it?

What is the solution??


I need help, life in danger

From Salih Floris on July 11, 2022 :: 11:02 pm

Hi there,

Anyone please help. It’s 05:00 in the morning South Africa, Cape Town. Everything has been hacked or cloned and i am being framed.
Please reply so I know someone received this email as I am loosing my mind and don’t know what’s going on?

[personal information redacted]



From Jessica Heredia Cota on November 13, 2022 :: 8:43 am

This is all happening to me too!! And I know who is doing it,  there is no way to be able to 100% know for sure p if you’re trying to prove it to someone else.  I end up looking crazy! And he keeps blaming it on me,  that I’m doing it to him! You would think with all of the spy apps, someone would come up with a REAL spy detector that could find these apps that hide in the background or disguise themselves 0a0s0 system apps.  Why is that so hard to do? There should be an app that tells you it is there, where it was, and when it was installed. I wish I was smart enough to write that one,  I’m sure it would over sell!)


Download an antimalware app

From Josh Kirschner on November 14, 2022 :: 10:43 am

Hi Jessica,

There are a number of security apps for Android that can detect and remove spy apps. Bitdefender, McAfee and Norton are all choices we would recommend.



still compromised?

From steve on November 13, 2022 :: 12:47 pm

Hello ,its Nov /22 and Ive had same thing for last 6 mths. Are you still being hacked?


Been Hacked / Compromised

From Alan on January 11, 2023 :: 8:33 am

Hi, My name is Alan and it’s been almost a year that I been hacked. I see myself from being happy go luck to a man I don’t even recognize who has been physically and mentally abused, like my life juice has been drain out of me. They have ruin my life financially, physically, mentally, socially, and emotionally.  I am now all alone in my garage searching and researching to find out who is this person or team that is doing this to me. I been slowly tortured and now I trust no one and I developed this rage of anger and how I would repay them 100x my pain and suffering. I even thought of skinning (those who are doing this to me) them alive and just watch them die. That’s how bad I want to catch them and take justice in my own hand.  On the other hand, I also wanted to strip down naked and just walk away from it all this year, but guess what, they don’t even let me do that. I have an idea of who is behind it but I don’t have any proof or I don’t have the resources to find out who is behind it. I have spoken to GOD for guidance and I have even tried to make a deal with the devil to sell 5 years of my life to get this people. That’s how much I hated this hacking, monitoring, controlling everything smart electronics in my home. I am sick now and I can barely breathe from this. I really need help before it’s too late and I don’t think I have much time left. Please call me coz email if not going to get through for any advise or just share your story would be helpful. My phone number [personal info redacted]. Hope to hear from you!



From Becoming Feral on February 17, 2023 :: 2:38 am

*Walks to the Denny’s*


Need help asap someone hacked boyfriend phone and he thinks it was me.

From Ashley Phillips on February 28, 2023 :: 12:43 am

Hi! My name is Ashley Phillips and my boyfriend of 9 years says someone hacked his phone. And if they did or have they have made it seem like I did it to him. And I am far from the type of person to even think to do something like this to him or anybody. It’s been going on for a little over a year now. I have been falsely accused everyday and night for the past year. He has called the cops on me saying I did this to him. The cops have told him that there is no evidence that I did anything. He still choose to say I am the one doing it. It has him believing that everything in his room has been hacked by me. And it’s not but please if someone can help please email me at [redacted]


From Classy on March 09, 2023 :: 12:32 am

That was my nice way of putting it so hopefully I don’t get flagged. Maybe use your brain next time instead of talking like a smart-a** so your not sounding like a dumb-a**. Heck I might get karma myself free talking to you this way because you just may not have any common sense then that…nah New Orleans even with no common sense you would still no how to talk to ppl ( have manners, morals, etc..) apparently not having common sense is actually normal. Anyways people are probably hitting reply to your message because they think that’s how they have to post something as some sites are like that 🙄 or maybe it could have something to do with the fact that like me I didn’t want to sign in cuz I am in the incognito mode so hitting reply on a post keeps me from having to put so much info in to comment which apparently was something I didn’t want to do or I would not be in the incognito mode in the first place. But either way you didn’t have to be so toxically rude. It’s crazy from where I read where somebody hit reply to you it had nothing to do with a thing you said and maybe it’s because they like u really probably didn’t give a craps about your problems either. Haha sorry just thinking that mouths probably what got u hacked in the frist place. And no you didn’t say u was hacked but you’re bi**hing about spyware does. Which is kinda even more funny to me because not only do you sound like a shelf absorbed jerk but also probably talk to everyone liked that ... 🤔 KARMA lol



From Who cares on March 15, 2023 :: 3:21 am

We all need to simply pity the lames for their futile attempts and waste of time. Likely.


Read More Comments: 1 2 3 4 5 6

Love getting helpful tech tips? Subscribe to our free newsletter!

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships
Accessibility Statement
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.