Tech Made Simple

Hot Topics: How to Fix Bluetooth Problems | Browse the Web Anonymously | Complete Guide to Facebook Privacy | How to Block Spam Calls

Use It

author photo

Is Someone Spying on Your Phone?

by on March 30, 2012
in Phones and Mobile, Cell Phones, Tips & How-Tos, Privacy :: 758 comments

Techlicious editors independently review products. To help support our mission, we may earn affiliate commissions from links contained on this page.

[Editor's note 2/9/17: Since this article was written five years ago, many new phone hacking methods have been developed and/or discovered. We've created a new article to cover those various hacks in our new story: How to Tell if Your Phone Has Been Hacked. Please go there for the latest information. We're keeping this story active for the issues and useful advice contained in the comments.]

You probably know there are plenty of apps you can install on your smartphone to track its location in case it gets lost or stolen. Apple's “Find My iPhone” is one good one and many security apps, such as AVG Mobilation, can track down a phone in seconds.

But what if someone else is tracking you? Is there any chance your boss or spouse could be spying on everything you do on your phone?

It’s easy to do. Spy apps are plentiful and can imperceptibly track text and e-mail messages, location, Web sites you visit, who you call and what photos and videos you shoot. The problem is these apps are difficult to detect and run invisibly in the background.

I decided to track my son and installed an app on his phone called Phone Control by Laucass (free on Google Play). Of course, secretly intercepting electronic communications without the person's knowledge and consent is illegal, so I told my son I was doing it and that I’d only use it if I had good reason.

Every day I receive emails that indicate my son’s location as he’s using his phone out in the world. I can click on those links in my email to see via Google Maps where he is (although I very rarely do). I could also set up the app to send me data about everything else he’s doing on his phone, but that’s not something I personally need—or want—to do.

Signs your phone may have been compromised

Someone borrowed or took your phone

I had to have my son’s phone in hand to install Android Phone Control. Once activated, however, there’s no icon in the application launcher. The app shows up with the name “Android System” in the applications manager so it doesn’t look suspicious. If you think someone could do something like this when you’re not paying attention or asleep, secure your phone with a passcode that isn’t easy to guess.

(Editor's Note 9/26/12: To confirm you have the spyware and not a standard Android app by the same name, follow these steps to open the spy app (dial the phone number.)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for more detail on 9 of the most common spyware programs and how to detect them.)

(Editor's Note 12/16/14 (Josh Kirschner): In some of my comments below, I noted the unlikelihood of spying on iPhones that were not jailbroken. However, since many of those comments were made, certain holes were identified in iOS that exploit the iPhone's connection to trusted networks and devices to allow someone with access to the network or device to download significant amounts of personal data. Jailbreaking the iPhone was not required. Fortunately, those holes have been patched in iOS 8. For more information, see: http://www.zdziarski.com/blog/?p=3820]

Your phone is acting weirdly

Taking forever to shut off, lighting up for no reason, suddenly getting much shorter battery life or running hot when you’re not using it may indicate hidden processes are running in the background.

Your data usage skyrockets for no reason

This could be because your phone is checking in with someone else, using GPS and sending them text messages or emails that communicate where you are and what you’re doing.

What to do if you suspect your phone's being monitored

The best thing to do is perform a factory reset, which you can find as an option in your phone’s settings. Know, however, that in doing so you will lose all data stored on your phone, so back it up first.

If you’re using Apple iCloud or Android 4.0, items like your contacts, photos and music are automatically synced and saved in the cloud. But if you have an older phone, you’ll want to make sure to export your contacts before doing a factory reset. There are various ways to do this depending on what phone you’re using and which operating system it’s running. If you’re not sure, get help from your cellular provider; they can make sure to retain your contacts and other important data during a factory reset.

You'll then want to use a strong passcode to prevent unauthorized access to your device. For Android devices, you can also install an app, like AppNotifier (free on Google Play), that will email you when programs are loaded onto your phone.

(Editor's Note 9/26/12: See our updated recommendations for Android antimalware solutions)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for our latest recommendations on how to protect yourself.)

You'll then have to tackle the issue of who's doing the monitoring. Keep in mind that if your device was issued by your company or is authorized to access your company's email and other data services, you may have given your consent as part of your employment contract or when access was data access was granted.



Discussion loading

gravatar

Hi there again - I

From kc on June 11, 2013 :: 1:56 pm

Hi there again - I just contacted you at the address you gave me.  Thanks so much!

Reply

gravatar

cell phone hacking question

From jcs219 on June 24, 2013 :: 1:02 am

can someone send and receive text messages from my phone number without me knowing?  i.e. a text conversation with my number attached to it, but it never came from my phone.

Reply

avatar

Quite possible

From Josh Kirschner on June 24, 2013 :: 11:13 am

I have been testing a number of spyware programs and, while I haven’t specifically seen the feature to send messages from your phone, I certainly believe it would be possible to do given similar features I have tested.

We are looking for people to anonymously participate in a story we’re working on around spyware. If you would like me to participate and have us walk you through analyzing your phone for spyware and removing any that is found, please contact me at ********.

Best,
Josh Kirschner
Founder, Techlicious

Reply

gravatar

factory reset

From brad on July 31, 2015 :: 10:59 am

Will a factory reset and a new sim card erase any tracking software or apps that have been put on my phone or do I need a new phone? thanks

Reply

gravatar

Most of the time it would.

From Ryan on July 28, 2017 :: 9:15 am

However I have a friend that is monitored on a whole other level. To the point that verizon made her wait for a few days when she went to get a new phone. They shipped the phone from another state when they had them in stock in the store. The new, different model phone exhibits the same issues as the old one. I’ve personally tried to remove the tracking software, and it cant be found. It’s embedded at the firmware, likely bootloader level.

Mind you this friend has never done anything to anyone. However she’s dealt with this all her life.

gravatar

I would like to participate.

From Jackie on November 29, 2015 :: 6:22 pm

I would like to participate.

Reply

gravatar

participate in spy testing for story

From Carmen Lambeck on December 14, 2015 :: 9:31 am

Hi,

My phone is possessed ( by a person and not a demon). I downloaded an IOS update last night after reading this thread for a hour or so.

Long story short. I want to obtain the highest level of antimalware and put it on my phone and detect and remove spyware.

I’m involved in a high dollar civil litigation and the other side is spending “whatever it takes” to defeat me and my sons. All of our phones have been accessed from another device somewhere. I have known this was gong on for about a year but upgraded to iPhone 6 and that stopped it for a time. It has to be real - the opponents literally know every email, Facebook, safari search, anything that is done on my phone. There is no other way for them to have full access and they use it.

Anyway - paranoia aside. I believe information is the answer for me. I’m gong to email you from my gmail after I remove it from my phone and use the macbook.

They managed to get into it but the updates knock them back out. I have literally sat back and watched as my computer cursor moves it self, opens files and takes away my control.

One of my sons while at home asleep with his finance was sending text messages without his knowledge to me at 1:30 am begging me to wake up and help him!

Sounds like a soap opera but if I’ve learned one thing about human nature in the past couple of years its this - money is the root of evil in this world and sane men and women will say and do anything to possess it. Its quiet disturbing .

I don’t have an URL. Just a retired school teacher, late - n - life single mother with grown sons .

Thank you and please reply.

Reply

gravatar

Your not along I've seen my computer do the same thing

From Wow same thing is happing to me on November 09, 2016 :: 7:41 pm

It’s definitely personal that’s for sure

gravatar

Similar occurrence

From Mary on February 15, 2018 :: 2:31 pm

I received an emergency call 4 help from my son’s #.Text message sent pictures of someone in distress. Looked as if someone was bruised & bleeding. It was dark out. Google Maps appeared on my screen. GM was directing me to my son’s location. A friend of my son’s happened to be with me. She was reading the directions as I drove. It was as if we were on a wild goose chase trying to track my son down. We saw another friend of my son’s who said she was going to try and reach him over the computer. We continued to follow the GM which led us right back to where we started from. The town post office. In the interim we received a phone call from the friend who reached out to him via computer. She said he was fine. He was at home on the computer the whole while. He never sent me a text or called for ER help. I was relieved that my son was okay but absolutely traumatized by the ability of someone to do this. I am so glad that there were people who witnessed what was going on. I as well am involved in a high $ civil litigation. This individual did steal my identity investigated and proven from the government. I have also witnessed my computer being taken over. The exact same thing happened. The cursor moved across the screen on its own.I had no control over the cursor. Files would be extracted from my computer. I cannot understand how this can happen. How can a cell phone be hacked.My email was also compromised. I invested in a PO Box which this person was able to obtain and use that information as well. I now have to go through the state capital, my mail is going to be sent to them then they will forwarded my mail to me. This individual was able to create 2 accounts dealing with banking. They locked me out of my own account and diverted checks being sent to me. This person’s family owns a large computer software company. I am sure they know people who have the ability to do these things. It has been a nightmare. This person also has information that could not be obtained any other way then to go through my files and emails between lawyers. Is there anyway of putting a program on my computer or phone where I can trace the activity back to whomever is doing this. I know who is doing it. Evidence is necessary. 1 investigation has proven identity theft. There are multiple issues.  Any information would be helpful.

gravatar

Soooooo I will volunteer?been through

From beatrice on January 29, 2016 :: 4:16 am

Soooooo I will volunteer?been through at least a dozen phones prepaid and not prepaid. after his phone with AT&T iCloud they went over my phone and for me it has been rooted I explained I did not know what that meant so therefore I didn’t do it and there went everything warranties everything out the window I do resets factory data reset nothing gets rid of this I have noticed in my abs Android OS instead of Android system I’m going to assume that this is the app that will not allow me to stop it or uninstall it or disable it every phone I’ve had has been tortured I just got a Samsung Galaxynote 5 and I set it down fell asleep woke up it to have been rooted I do believe I cannot find out for sure however my battery is drained since then it doesn’t work properly I cannot log into any of my accounts all my passwords are wrong what do I do and besides you know the obvious help.another indication is I had 24 apps installed complete after this incident I had over 45 helped
please

Reply

gravatar

Help me

From Mimi on June 14, 2016 :: 3:57 am

I have had problems with my phone for a long time. Ive tried several apps factory reset and tried to get help. My locations are tracked my messages read and my camera has even been hacked. Not to mention unusual things going on in my home. Ive been called crazy and i just don’t trust anyone because of this.  Im deeply disturbed and depressed over this. Please help me. I csnt get help anywhere

Reply

avatar

Can you provide more information?

From Josh Kirschner on June 14, 2016 :: 9:27 am

Hi Mimi,

Can you provide more details on why you think your locations are tracked and messages read? That will help me understand what issues you’re seeing and what the cause might be.

Thanks,
Josh

gravatar

Same called xrazy its in my head ur loosing it

From Samyaza grigori on May 05, 2018 :: 6:52 pm

Its been my understanding when people say this they are apart of the game thats being played i have had hard evendince messages screenshots of the viruses an their permissions an its “ur nuts” “dude its in your head” my own family think im making it up get some sleep itll go away hahahahahahahaha i switched phones last night had virus total mobile on that phone first rhing i did when i got home downloaxed virus total but now the app has been updated now we cant upload apks an thats my biggest ease cant upload emails either or text message links well i hate chess i was never good at it i get mad an flip the board over the board AND the TABLE getting flipped this time

gravatar

Hello Josh, I have had

From Jill pawlak on March 06, 2018 :: 10:09 am

Hello Josh, I have had this stalker on and off for awhile. If you could help me determine if he has spyware on my phone and computer that would help me feel a lot safer. I hired a private investigator and he basically scammed me out of a lot of money that I can’t afford. I was so scared and he made false promises si I’m right where I was. I would be greatly appreciated.  Sincerely, Jill

Reply

He's stalking me....

From Maggie Jackson on June 25, 2013 :: 2:15 pm

My jealous, over-protective BF installed “Find my iPhone” on my phone to make sure I was where I said I would be and make sure I wasn’t “doing anything sketchy”.  He told me when he did this & I didn’t think anything of it since, contrary to his imagination, I’m not doing anything wrong.  2 questions:  Sometimes he tells me he “sees me” yards & yards from where my phone actually is. How can that be? Also, how can I be alerted everytime he is actually tracking my phone?  I;m not going to turn the feature off because then he will believe I’m hiding something, but I would like to be aware of when he does it and can I be alerted every time he tracks me?

Reply

avatar

And you're okay with that?

From Josh Kirschner on June 26, 2013 :: 11:02 am

Let me start with your technical questions. Location tracking can be inaccurate for a number of reasons. If you don’t have a good satellite signal or no signal, your location will be off. This could be because your iPhone is reporting its last known good location or switching to cell tower-based location tracking, which can be much less accurate.

There’s no easy way to be alerted when someone is using the Find My Phone feature. Part of the feature is not to alert the person who has the phone, so you can better track down a stolen device.

It’s also possible that your controlling BF has installed other spyware on your iPhone that will allow him to track you texts, voice calls and even your email. Downloading Lookout Security for your iPhone to check for jailbreaking. If it is jailbroken, it’s highly likely there is spyware on the device.

It’s beyond me why you’re okay with him tracking you this way - my expertise is in tech, not relationships. Though my wife would probably say I’m at least doing an okay job with the latter. But you may want to consider talking to a counselor about your relationship. It’s not normal and it’s not healthy.

Reply

gravatar

Use Being Hacked to YOUR Advantage

From Susan on July 07, 2013 :: 11:49 pm

To all the hackees reading this site:  If you are in some kind of battle/contest like a nasty divorce, child custody, alimony contest, etc., and you have been hacked, and you know about it, you have been handed a golden opportunity.

Go to the store and get a NON smart phone and use that to speak with attorneys, family and other confidants.  You may have to leave this cell locked in your work desk if you live in the same house as your hacker because, as my friend’s husband did to her, your hacker may be going through your car, your purse and your pockets after you get home from work.  Then, only use the hacked phone for incidental phone calls AND to provide the information to your hacker that you WANT him/her to have.  It is a beautiful way to turn this situation to your advantage.

My friend very accidentally discovered that her estranged husband had called their family plan cell phone provider and enabled GPS tracking on her handset just before she left to drive across two states to visit me for ten days.  She was scared to death, but then we couldn’t stop laughing after we made our game plan.  We got even with him by getting a non-smart prepaid phone which she keeps locked in her desk at work, and then we immediately sent the GPS-enabled phone on a little trip.  We charged it, and then mailed the phone and the charger to my cousin in California, then he charged it and mailed it to Georgia, then next person charged it and mailed to Florida.  So for almost two weeks, he wasn’t tracking her, he was tracking some mailman!  It made him NUTS, and it was just what he deserved.

If someone you are in a dispute with gets access to your phone, the only thing better for you is if you can make sure they also get access to an email account that you have.  You will be able to provide false information, and you will control the entire situation.  It’s a beautiful thing.

Reply

gravatar

Spying on my phone & text messages

From Lucy on July 08, 2013 :: 7:35 pm

I recently divorced and still think my ex is spying on me. I know he somehow hacked into my old IPHONE. He was able to turn in on and listen to conversations I was having with others. I think he has gotten into a phone my mom got me. How can I be sure who it is? Him or my new guy? It is an old T Mobile Nokia smart phone. It has had all the thing described above. Comes on for no reason, phone or battery hot, wont shut off when I try the first time. I have info I stored all the nasty text he sent into a folder on my phone. But not every T Mobile knows how to retrieve my text which is stupid to me. I store them on a thumb drive. So my ? How can I tell if it is still being spied on what can they see? Text, phone conversations and numbers? Can I find out WHO it is spying??? My new guy I think has cheated on me twice and talking to another girl and text quit often. He’s talking to someone how can I track his texts and phone conversations???

Reply

avatar

Contact me for help with your current phone

From Josh Kirschner on July 22, 2013 :: 2:46 pm

Hi Lucy,

We’re looking for participants in a story we’re working on about victims of spyware. If you’re interest in participating (we won’t use your real name in the story), we can walk through an analysis of your phone and resolve hardware threats we find. Though it can be very difficult to tell who is actually doing the spying just from a technical analysis. Contact me at ********* if interested.

Best,
Josh Kirschner
Founder, Techlicious

Reply

gravatar

scan asap!!

From Nate 9708884811 on February 12, 2015 :: 6:25 am

There are some people in my life right now telling me to destroy my IphoneS. I told a detective i would assist him, but was really just trying to say my goodbyes to my papa who may not be around when i get out!. Now i have a certain Cartel awaiting orders from HA tomorrow

Reply

gravatar

My number bud!!

From Nate 9708884811 on February 12, 2015 :: 6:33 am

My number bud!!

Reply

gravatar

I've been hacked my phone

From ricky on June 08, 2015 :: 1:27 am

I’ve been hacked my phone has been rooted without my knowledge. I have background processes running and bad batterylife my phone takes audio and video recordings of me etc. How can I get this off

Reply

gravatar

Crazy girlfriend

From Holly on June 25, 2015 :: 2:17 pm

I am currently being spied on by my bf…she has me video n audio recorded with hidden cameras n also has my phone bugged n has parental controls on my LG flex..what can I do to block her or find what apps she has put on my phone. I don’t care if she knows I found them. please help me..n how do I find the hidden cameras in my house

Reply

gravatar

Want to be part of study

From Sydni sallee on January 02, 2016 :: 5:21 pm

iPhone 6 in probate litigation I get text while writing text that said a legal action was “stupid” when got black banner top screen rolling message that said “not stupid I can’t hack your iPhone”.


Urgent help needed

Reply

gravatar

Unbelievable, even to myself

From Kat on September 04, 2017 :: 3:46 pm

I previously was in a relationship, when in the beginning was what I thought to be my own personal “Cinderfuckingrella” story, that blindsided me in whole. When I tell people bits and pieces of the hell I lived daily for almost 2 years I almost feel like I should be in a mental hospital. I reassure you I am of sound mind. When one lives through the hell I faced then there would be understanding. Even to this day (1 year later) I revert back to moments with my “ex-ass” that left a scar. So many times I wonder what is wrong with me that I stick it out for as long as I did? One can’t fathom that the environment around them could possibly be compromised in it’s entirety. Mine was and because of it I have inherited a paranoia that never even remotely existed in anything me. It is literally living he’ll. I have been trying to find information explaining the technical aspects “the monster” used to aide in destroying my life wholy. My story is long.  It is crazy. I will let you in on a brief moment that took place then and if you would like to know anything more then email me and I will set aside time to write more detailed happenings.
  My mobile carrier at the time was T-Mobile. I went to the mall and for “the devil’s advocate” and myself a LG K-7 phone. I didn’t have it very long and started having issues. I kept saying that someone was in my phone and has been changing my passwords and settings on my phone. All felt I was a bit extreme in my thinking and blew me off. I called t-mobile with a technical issue that arose. When talking to anyone through my, now 2 week old phone, I would have to practically yell into the phone in order to be heard. I explained to the tech that ,crazy as it sounds, I think someone is in my phone. He entertained me and told me to hold my thumb down on each empty app slot on my app pages. In doing so the first slot I tried revealed a hidden app. He couldn’t believe it even more than myself. For as much as I was relieved for the visual proof of my paranoia it was very unsettling. They gladly sent me a new phone. It came while I was at work and when I got home was handed my new phone, opened, and “all ready to go” said “the creepy coward”. I had an uneasy feeling but brushed it off. I returned my other phone as required. Each phone and all it’s guts and parts have id numbers making them unique to one phone. I factory reset it instantly and then set up my new Google account and email. Miraculously my contacts and old texts and info from my bad phone are present in my new one? How? “The multi-abuser” tried convincing me that was a carrier benefit. I knew better but played along. .......when packing up my house i am bring made to leave due to financial misery I gained from the relationship, i discovered hid broken phone that was “thrown away”. I discovered that the motherboard wasn’t the same number as the other parts.  It was my old pho e and mine was hid and my new one was on the phone I returned. Wtf? And there is so much more…..

Reply

gravatar

How to contact u?

From Samyaza grigori on May 05, 2018 :: 7:05 pm

Ur contact info has *******so email the astrix or…..........needing some1 to talk to who hasnt been PLAYING with me since they noticed how fun it is but theu came for a show i dont want to disappoint

Reply

gravatar

I'm interested

From Michael DiCarlo on September 05, 2019 :: 10:42 pm

I am interested in participating in your story about victims of spyware. Please contact me in regards to this, thank you and I look forward to hearing from you.

Reply

gravatar

WornOut

From WornOut on July 08, 2013 :: 8:24 pm

Well, I’m tired of the endless tracking by my supposed significant other. He hacked into my computer and then lost all my vacation pics and files. I no longer have a computer at home and only use the one at work.  Now he has hacked my phone. Before I put any antispyware on my phone, I want to know if there is reverse spyware that can tell me where the data is going once spyware is located. If I can prove where my data is going (via e-mail or notification), I could use that to my advantage. Wouldn’t this be proof enough for those that wish to prosecute?? I want to do this before installing anti-spyware and lose any proof.

I called my ex-husband twice this week because we agreed to remain friends but it makes BF crazy. He knew that I had made these calls and he cannot keep himself from asking questions the very same day, like “When was the last time you spoke to your ex.” Right away, I knew the snooping was happening again.  Then he has the stupid audacity to make a Facebook post that says “Deception is never the best policy, for it is far too easy to be informed in our technologically advanced society.” Wow, if that isn’t calling the kettle black - suggesting that I AM being deceptive. HA!!  Even crazier, he spent the entire weekend taking me out and spending money on me to ensure that I will always want him. [Mind you - I haven’t nor ever intended to cheat.]

And thank-you Susan for your comments on “using it to your advantage.” I thought I was the only one thinking like this. But I think I’m more vindictive. My BF is so insecure that I would cheat on him despite no proof after ALL his investigating. Now I’m ready to give him a run for his money. I’m going to buy the non-smart phone and have a hottie man leave a suggestive message on it. Then I will call it and have it call me A LOT all day when I am at work. He will go crazy and I will be taken out to a lot of nice places in the end. 
But seriously, is there a way to trace back where the data is going on my android smart phone? Is there an app for that?? If so, what kind of software is it? What is it called?  I’m sure it is stored in my phone, but I don’t know where to look. Am I looking for exported SMS data? How do I find that in my Kyocera phone?
Thanks, WornOut.

Reply

avatar

That's not easy.

From Josh Kirschner on July 22, 2013 :: 2:50 pm

If you know what spyware is installed on your phone, you may be able to get into the settings using the default password, assuming the spy wasn’t smart enough to change it. Depending on which program it is, there may be info there on a phone number or email the info is being forwarded to. But the more advanced programs don’t work that way, and the only way to track it back to someone is via a sting type process.

If you’re interest in participating in a spyware story we’re working on (we won’t use your real name in the story), we can walk through an analysis of your phone and resolve hardware threats we find or provide guidance on what to do next. Contact me at ******* if interested.

Best,
Josh Kirschner
Founder, Techlicious

Reply

gravatar

You will find my mob bugs interesting, need you help

From Rez on September 06, 2016 :: 9:25 am

Hi Josh,
Thank for the info you provided above.
I been targeted directly and indirectly for sometimes now, my past n current phones, pic, laptop n everything else been compromised to the point of my extinction.
I am not that tech savvy but I see many many threads, malware n spyware on the log events that re crazy n clearly describing the tasks, I need you to get in touch with me and help me out,
And yes I am a human right/environmental activist

Reply

gravatar

My ex husband and his

From Barbara on June 09, 2019 :: 8:30 pm

My ex husband and his new chick and her assocated are linking into all my info messages and I can’t stop them and I reported it to police and the guy I was dating is involved yo through a chat message thang I’m lost when it comes to this and I tried if this shit what can I do if I don’t know how there doing it I have info in some of the criminal activities that could help what can I do they live in same complex and one if the office manager is good friends w 2 of them and I don’t know who to trust and they know when I come when I go and I reported it but nothing gets done I don’t really know why there doing this

Reply

gravatar

Prevent text message surveillance

From Jake on July 10, 2013 :: 7:17 pm

If you’re concerned about your text messaging privacy, you can use an encrypted messaging app, here’s the one I use for example: http://www.reviewsuniverse.com/send-secure/

Reply

gravatar

Help!

From Alayna on July 22, 2013 :: 11:58 am

Hi Josh…I found this article & comments very helpful & alarming. I recently got a restraining order against someone I didn’t even date due to harassment/etc. I changed my number before that. I know he continues to stalk me on every social media site, but I keep my privacy & am aware he does this & also keep tabs on his to see if he is breaking the restraining order. I do not know him to be a computer genius or anything, but he has decent knowledge about jailbreaking iphones, iphone apps that give you alternative #s to call/text (he has many) and he also would tell me about how he’d hack his ex’s facebook with false password setups etc. I wouldnt put it past this kid to do anything honestly and I’ve been living in fear.

I finally relaxed thinking he didn’t have my # and that he’d leave me alone but now am very alarmed. Less than a week ago I answered a blocked call only because I thought it was my friend on her work phone. It was very sketchy & they mumbled for a lot of it and eventually asked if I was a local hospital line. I have good hearing & I know they were just mumbling. It sounded just like this kid & I regretted answering it but nothing else happened. I never answer blocked #s. Now, last night I received a text from a random number asking me a personal question only he would ask me. I texted back who is this etc and even said I was someone else.

Now, this morning, I wake up and my phone is saying I need a PUK code for my SIM card. There is nothing I did to make this happen. My phone is a jailbroken iphone4. What should I do? I am freaked reading about how a 30 second call someone can hack into your SIM, or with a response to a text. Im not sure if this kid has this capability, but after reading all this I have no doubt. Also around the time I got that call he posted online “Shits too easy”.  I don’t know if I should allow it to keep going for now to try to bag him on a violation or just immediately change all my phone info again & reset my phone. Please help with any info on SIM hacking or ways to detect iphone hacking!

Reply

avatar

Some advice

From Josh Kirschner on July 22, 2013 :: 2:59 pm

First of all, I’m not aware of any way to hack a phone through a phone call or simply by responding to a text. If you have a reference for where you saw this, please forward along.

But to tackle the bigger question, why is your iPhone jailbroken? Given your security concerns, the last thing you want to do is leave your phone open for hacking or spyware. You can un-jailbreak by installing the latest iOS update, which you should do ASAP.

Beyond fixing the jailbreak issue, there is no easy way to analyze an iPhone for hacking. Sometimes the hacking app can show up in your device memory usage logs, but this is hit or miss. Best just to update your phone.

Reply

gravatar

RE: Some advice

From Alayna on July 22, 2013 :: 6:12 pm

Well I went and changed my number & sim card as well as updated & restored my phone, getting rid of my jailbreak & updating to 6.1.3. What confused me is how my SIM card got locked overnight, ironically the same night, its never happened before.

When I woke up I was browsing through sites and found similar info to this on a few sites… http://blogs.computerworld.com/cybercrime-and-hacking/22520/750-million-phones-vulnerable-spying-hack-sim-card-tainted-text-get-root

I was only scared because I did answer the blocked call in which he mumbled to intentionally get me to talk/extend the call, which at first I figured was to verify my voice, but the call was around 30 seconds which someone stated is all someone would need. I also am kind of in disbelief as to how thatd work but that article talks about a Java program that can hack your SIM card by accessing your SMS unknowingly. Or that guy claims all he needs is a phone number and he can hack into a phone??

I do not know how this kid could have got my number. I’ve been living in fear & expending a lot of $ and energy into all this. I have good general knowledge about iphone software as far as jailbreaking & honestly have heard that you can have better control of your phone when jailbroken? I at least had more apps & tweaks to track things better….I just wish I could track these numbers to actually get him arrested for breaking the restraining order but it seems near impossible now that cyber stalking is on another level

Reply

avatar

Thanks for that link

From Josh Kirschner on July 22, 2013 :: 6:52 pm

The method being described will only work on older SIMs and certainly doesn’t sound like it’s out in the wild yet, so I think it’s highly unlikely this was used on your phone.

Jailbreaking obviously gives you more control over your iPhone, with the flip-side that others get more control, too. Unless there are specific third-party apps you really need, I don’t think the risk is worth it, especially in your situation.

Many spyware programs can be remotely controlled by text message (once they are already installed).  If it is possible he had access to your phone in the past and installed something, then perhaps he was trying to activate it again and that somehow caused the PUK lock? I’m speculating here, but now that your phone is updated, you should be okay.

gravatar

I dont think thats accurate josh maybe u can review this

From Samyaza grigori on May 05, 2018 :: 7:20 pm

Someone could mock an email or a text message from someone that you trust and there could have a link in it as soon as you press the link s*** starts happening it’s happened to me I don’t have the phone of the pictures to prove it anymore but like I said if we’re going to make a story let’s make it good that’s why I really miss the upload function of the virustotal mobile because you could take links and stuff like that and put them into the app and find out but sadly that ability was taken away in an update but the mobile website who virustotal actually is and not some funny cat that’s the guy who makes the the mobile app it’s not really virustotal some funny cat is the producer of the mobile app it has virustotal in the name and it I guess uses the same search engines but for some weird reason the permissions that I were able to see yesterday and yesterday was Saturday May for Friday May 4th 2018 I was able to see the permissions of the the red letter text viruses that I had I installed the vibrator the thing today there’s no permissions and I can’t upload apks but yeah they took that ability out of the app

Reply

gravatar

basic phone can be hacked or not ?

From nadeem on July 30, 2013 :: 11:46 am

i dont know how this number appeared on my call details 8747747*7174*44444 , 47474441 , 44
i doubt someone is tracking my call , though i have a basic phone .
but the thing which created doubt was that on 44 the time duration was 35 minutes 12 sec ? how is it possible .
i am not tech savvy , please help me .

Reply

avatar

Sounds like pocket dialing

From Josh Kirschner on July 31, 2013 :: 1:38 am

While getting spyware on a basic phone isn’t impossible, it’s usually not nearly as easy as with a smartphone. And the numbers you listed look more like pocket dialing than spying. The reason for the long call was most likely that you dialed some number that never hung up on your phone, causing it to remain connected.

Reply

gravatar

iphone4 hacking

From mike on August 05, 2013 :: 4:21 pm

Hi there as any one been hack with a wired noise on the line when taking some one from iphone then block iphone calling then stop internet working on iphone as well as laptop on hotspot ive rung my service and the police and no clue about internet crime so if any one out there as solve this problem please let me know regards mike.

Reply

gravatar

Did that fix it??

From Hailey on August 27, 2013 :: 10:41 pm

A while ago my brother updated my Facebook from his phone and I didn’t think much of it until I realized right now that he can read my texts and brought up something I haven’t told anyone, except to my friend through texts.

And he did say something about getting into my phone before. I’m like 99% sure he did the spy crap that was stated in this article.

I decided to do a factory reset thing, and disabled every single running app. Would that make sure he won’t be able to get back in my phone?

Reply

gravatar

response to Hailey

From holly on August 28, 2013 :: 1:20 am

Change your Facebook password. Until you change the password is changed, your brother can still can access your facebook from his phone if he saved your username and password when he updated the software.

Reply

gravatar

phone hack question

From guest on October 03, 2013 :: 2:42 pm

Hello,

I’m concerned that a verizon flip phone I had in 2007/2008, and eventually a verizon htc android phone in 2009/2010 and both were hacked by the same person. this person wouldn’t have had physical access to the phones. my questions are:
1. How could they have been remotely hacked?
2. if the smartphone was remotely hacked, could the hacker read emails via my gmail app, once they were “in” the smartphone? or would they only be able to intercept voice calls and texts?
3. I still have both phones; would it be possible to find out if there was ever malware/spyware on the phones, and, if so, to what account was my data sent or stored?

thanks

Reply

avatar

Unlikely

From Josh Kirschner on October 03, 2013 :: 3:30 pm

It’s extremely unlikely that someone could remotely install spyware on your phone. I know of no generally available application that would allow you to do that. And the spyware available for Android requires your phone to be rooted in order to access Gmail (again, something that would require physical access).

It is possible to check your old phone for spyware by installing one of our recommended antispyware apps on it. You can see our recommendations and get further guidance here: https://www.techlicious.com/review/mobile-security-apps-perform-dismally-against-spyware/.

Remember that people can also spy on you if they uncover your login information for your gmail account or your phone carrier’s web portal. So if you suspect someone has access to your personal information, resetting you login details to use a new, strong password should be one the first steps you take.

Reply

gravatar

cell detective software

From robert on October 19, 2013 :: 12:31 pm

Cell Detective claims to be able to monitor any cell phone without ever touching or downloading any software to the target cell phone.  How is this possible and how does own know that their phone has been compromised and what does one do to prevent this since no programs have been downloaded to their phone?

Reply

avatar

People claim all sorts of stuff

From Josh Kirschner on October 20, 2013 :: 12:57 am

Reply

gravatar

There are ways you overlook!?

From D.J. Mapes on August 05, 2016 :: 2:26 am

Pardon my impertinance but if you own a programmable scanner and can be within 5 miles of target cell phone then you can indeed listen to conversations, it does require a considerable amount of patience and stockpiled junk food but this is still used under certain circumstances by P.I.‘s and I’m aware of a corrupt CHP officer who used this tech to track drug dealers. Ashamed to admit it but I used it to clarify my Fiancee was cheating, she never gave the ring back which had belonged to my Grandmother! Just saying is all!

Reply

avatar

That's not correct

From Josh Kirschner on August 05, 2016 :: 2:49 pm

Modern cell phones use encrypted digital signals that cannot simply be intercepted by a scanner. Unless that person is using a really, really old phone on a really, really old network, your conversation will remain private.

There are a couple exceptions to this. First, law enforcement agencies have a device called Stingray that mimics a cellphone tower, tricking a target cell phone into connecting to it. Once connected to the Stingray device, conversations can be monitored. However, these devices are very expensive (hundreds of thousands of dollars) and not available on the open market. Plus, you need to be in very close proximity to the target phone to have it connect.

Second, older cordless phones (not cellular) phones transmit analog signals that are very easy to intercept. Perhaps this is what happened in the case you are referring to? Though again, you would need to be in very close proximity to the cordless phone to intercept it.

gravatar

Texts not visible to me but are sent

From Stephen on November 02, 2013 :: 9:37 am

Hi I am using a nokia lumia wp8 and I suspect my sister in law is spying on me,  last week my phone wouldn’t show my texts MSG even though they were being sent and any received, I could part read on the notification screen but when I press open they are not in the text messages so I cannot see what they have said.
Its only when I sent a specific text msg calling her out,  my phone is working again.
You see the sim was her sisters and her dad had also used it but now I have it, she could easily impersonate the billing holder as she is her sister, but I just want to know if the missing texts is a sign I was spied on?

Reply

Some apps...

From Tomas Kosek on December 21, 2013 :: 7:40 am

Hey guys, there are assholes, who will plant this aplication in system - factory reset will not delete it, so if your smartphone acts weird after factory reset, backup all, download your Android version on your PC, move it on SDcard, then on your phone make Factory reser AND FORMAT /SYSTEM and install the android on your SDcard again… but now, without the spying aplication (For example: Cyberius is security aplication what can be moved to the system, so it will be still there after factory reset. But people can use Cyberius to spy on you too. It tooks 5min to install it on your phone ) You better lock your phone with passcode wink

Reply

avatar

Do you have a link?

From Josh Kirschner on December 21, 2013 :: 1:58 pm

Hi Tomas,

Do you have a link for more information on Cyberius? I can’t find anything on it and I’m curious to see how (and if) it avoids deletion on factory reset.

Thanks,
Josh

Reply

Yes I do :P

From Tomas Kosek on January 14, 2014 :: 9:32 am

Sorry, my fault. It’s called Cerberus :D
https://play.google.com/store/apps/details?id=com.lsdroid.cerberus&hl=cs
If you have rooted phone, you can put this app in /system - it will be still there after full wipe or factory reset
Sorry for very slow response..
-Tom

Reply

avatar

That is scary

From Josh Kirschner on January 31, 2014 :: 4:59 pm

Tom, Thanks for bringing Cerberus to my attention. It is definitely the scariest app I’m aware of that’s currently available in Google Play. Worse, I tested numerous antimawlare apps against it - McAfee, Norton, Lookout, Avast, ESET, Kaspersky, Trend Micro - and they all failed. Only TrustGo and AVG appropriatly flagged it as a serious risk.

I’m following up with the security vendors to determine why they’re continuing to miss such obvious risks.

gravatar

yeah but the assholes look over your shoulder

From kitty on March 29, 2014 :: 2:53 pm

and you don’t notice them eye balling your passcode to get into your phone.  I hate F@*ked up people.  There’s so many scams going today it’s just too much to ever think you’re ahead of this prey on people game with their privacy and personal info.  Some do it cuz they have no life.  others because they have no life, love 3 hots & a cot & just enough skill to steal & fraud others usually people they cling onto and call friend…., then theres cops that get a hard on for you and you aren’t even the right guy.  Then theres everyone else…google big time plus….your local home improvement store that tracks how long you shop.  you can run but you can’t hide.  every traffic light where i live has a camera on it to watch the traffic flow they say…right?  can’t even take cops on a wild chase through a town anymore n get away with it.  not that i would.  not my thing.  I can log into a site that shows me cameras on 101 freeway and I can tell who my friend is bringing to my house cuz I’ll see her car driving down to my house.

Reply

gravatar

To Tomas re: Cyberious

From Jackie on November 29, 2015 :: 5:44 pm

How can I know if Cyberius is on my phone?  It’s Android Samsung Core Prime.

Reply

Read More Comments: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships
Newsletter Archive
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.

site design: Juxtaprose