Think Your Phone Has Been Hacked? Here Is What To Do in Australia
Your phone contains more sensitive information than any other device you own — your banking apps, your emails, your messages, your location history, your photos, and often your two-factor authentication codes. If your phone is compromised, it is serious. Here is how to tell if your phone has been hacked, and exactly what to do about it.
Signs Your Phone May Be Hacked
No single symptom confirms a hack — but several together are a strong signal. Battery draining much faster than normal, even when you are not using it heavily, can indicate a background process running constantly — malware, spyware, or cryptomining software. Your phone getting unusually hot when idle is the same signal. Data usage that is much higher than your normal usage — check under Settings > Mobile Data — suggests something is transmitting data in the background. Apps you do not recognise appearing on your phone. Your contacts receiving strange messages from your number that you did not send. Accounts getting logged out or passwords changed without your action. And in the case of stalkerware installed by someone with physical access to your phone — unusual battery drain and data usage with no other visible symptoms, and your private conversations seeming to be known by someone who should not know them.
The Most Common Ways Phones Get Hacked
Phishing links — clicking a link in a text message or email that installs malware or captures credentials. Fake apps — downloading an app from outside the official App Store or Google Play that contains malware. Someone with physical access — a partner, family member, or person who borrowed your phone installing stalkerware or spyware. SIM swapping — a criminal convincing your carrier to transfer your phone number to their SIM, allowing them to receive your calls and SMS messages including two-factor authentication codes. And public Wi-Fi attacks — connecting to a malicious or compromised Wi-Fi network that intercepts traffic.
What to Do If You Think Your Phone Is Hacked
First, change your most important passwords from a different device — a computer or another phone — not from the potentially compromised device. Start with email and banking. If you think someone has remote access to your phone, turn off mobile data and Wi-Fi to cut the connection while you work through the other steps. Check for apps you do not recognise and delete them. On Android, go to Settings > Apps and look for anything unfamiliar. On iPhone, check your home screens and App Library for apps you did not install. Run a security scan — on Android, Google Play Protect is built in; on iPhone there is no direct equivalent but checking for unusual profiles under Settings > General > VPN and Device Management can reveal suspicious configurations.
When a Factory Reset Is the Right Answer
For serious infections — particularly if you downloaded software following instructions from a scammer, or if a technician you do not fully trust had access to your device — a factory reset is the most reliable way to remove all malware. This means backing up your photos and contacts first (back up to iCloud or Google Photos, not to a computer that may also be compromised), then performing a full factory reset. This removes everything including any malware. After resetting, restore only your photos and contacts — not your app data, which may include infected apps.
SIM Swap Protection
SIM swapping is a serious attack that moves your phone number to a criminal's device, giving them your calls and SMS messages including two-factor authentication codes. Contact your mobile carrier and ask them to add a SIM lock or port lock to your account — this requires a PIN to be provided in person before your number can be transferred. This simple step prevents SIM swapping attacks. Also switch your two-factor authentication from SMS to an authenticator app (Google Authenticator or Microsoft Authenticator) where possible — app-based codes cannot be intercepted through SIM swapping.
Getting Professional Help in Melbourne
If you are unsure whether your phone is compromised, or if you need help with the cleanup process, IntrusionX provides professional phone security assessments. We can check your device for malware, stalkerware, and suspicious configurations, and help you secure your accounts and prevent future compromise. Call us on +61 499 468 971 or fill in our contact form for same-day help.
Need help protecting your business or home?
IntrusionX provides independent cybersecurity for Melbourne businesses and families. Free consultation, no lock-in contracts.