Can I run a test to see if my phone is hacked?
How to check if my phone is hacked: 3 key signs
Learning how to check if my phone is hacked protects your personal data and prevents financial loss from unauthorized background activity. Recognizing subtle red flags early allows users to secure their devices before hackers cause permanent damage. Understanding these technical indicators ensures your operating system remains private and functional.
Warning Signs: Is It a Glitch or a Breach?
Determining how to check if my phone is hacked involves a systematic review of the device to identify any unusual performance issues or unauthorized changes. It is important to remember that most mobile issues - from lagging apps to sudden restarts - are often just software bugs or hardware fatigue rather than a criminal intrusion. However, when these symptoms cluster together, they form a pattern that requires closer inspection.
One of the first red flags is a sudden, drastic drop in battery life. While all batteries degrade over time, a compromised device often drains significantly faster because malicious software runs covertly in the background, keeping the CPU and radio active. Mobile cryptojacking attacks, which use a phones processor to mine cryptocurrency, rose by 60% in 2025. [1]
This constant background activity generates heat - and this is the critical part - even when the phone is sitting idle on a desk. If your device feels warm to the touch despite not being used, it is often a sign that an unauthorized process is working overtime.
I once ignored a warm phone for two days, assuming it was just a poorly optimized weather app (or so I told myself). It turned out to be a rogue background process that was constantly uploading data. This leads to the second major sign: unexplained spikes in data usage. Monitoring your data consumption can reveal if how to tell if my phone is being monitored by seeing if spyware is exfiltrating your photos, messages, or location logs to a remote server. Seldom do these breaches happen without leaving a digital footprint in your cellular or Wi-Fi statistics.
The "Dialer Test": Using Secret Codes to Spot Redirections
There is a series of USSD (Unstructured Supplementary Service Data) codes that function as a manual diagnostic test for your cellular connection. These phone hacked test codes - and they work on both Android and iPhone - allow you to see if your calls or messages are being intercepted and redirected to another number. This is a common tactic used by attackers to bypass two-factor authentication by catching your verification codes before they reach you.
To run this manual test, open your phones dialer and enter the following codes: Check Call Forwarding (#21#): This code shows if your calls, data, or SMS are being unconditionally forwarded to another device. A safe result should show Not Forwarded for all categories. Check Conditional Forwarding (#62#): This tells you where your calls go when your phone is unreachable or switched off.
Often, this will show your carriers voicemail number - but if you see an unfamiliar personal number, it is time to take action. The Master Reset Code (##002#): This is not a diagnostic code but a kill switch. Dialing this will instantly disable all forms of redirection on your line, effectively cutting off a hackers access to your redirected communications.
Wait a second. Before you panic over a number found in the #62test, Google that number first. More often than not, it is simply your service provider's automated voicemail routing system. But staying vigilant is the only way to ensure your personal information remains protected from sophisticated redirection schemes.
Running a Digital Scan: Mobile Security Tools in 2026
While manual codes check your carrier settings, they cannot see what is happening inside your operating system. For that, you need a dedicated malware scan for phone. As of early 2026, the total number of distinct malware programs in circulation has surpassed 1.3 billion, [2] making it nearly impossible for a human to spot every threat manually. Security software provides a deeper layer of defense by scanning for known signatures and suspicious behaviors.
Most modern malware is now polymorphic, meaning it changes its underlying code structure every time it executes to evade detection. Nearly 90% of new malware strains identified in 2026 utilize this technique. Because of this, standard file scans are often insufficient. Modern security apps now use real-time behavior monitoring to flag apps that suddenly start accessing the camera or microphone without a clear reason. I have found that running a full scan at least once a week is the sweet spot for catching these silent intruders before they do permanent damage.
But there is a catch. Not all security apps are trustworthy. Some malicious actors disguise their spyware as antivirus tools - a classic bait-and-switch. Stick to well-established names with a proven track record. I will break down how to fix a hacked phone by reviewing the differences between the top scanners in the comparison section below to help you choose a legitimate tool.
Deep Dive: Hidden Background Activity and App Audits
If you suspect a hack but your scans come back clean, the next step is a manual app audit. Hackers often disguise malware as harmless tools like calculators, flashlights, or simple games. In fact, security researchers now identify an average of 560,000 new malware variants every 24 hours, [4] many of which hide in plain sight on unofficial app stores.
Go to your settings and look at your Battery Usage and Data Usage per app. If a simple calculator app has used 500MB of data and 15% of your battery in a single day, it is almost certainly a data harvester. You should also check your Permission Manager to see which apps have access to your mic, camera, and location. There is no reason for a solitaire game to need your microphone access 24/7.
It sounds tedious. It is. But manually reviewing these permissions is often the only way to catch "stalkerware" - apps designed to be installed by someone with physical access to your phone. These apps are specifically built to be invisible to traditional antivirus scanners.
Choosing a Trusted Security Scanner
Running a digital scan is the fastest way to detect mobile threats. Here is how the top-rated security tools of 2026 compare across key categories.Bitdefender Mobile Security
• Ultra-lightweight; has minimal impact on battery life and processing speed
• Consistently identifies over 99% of new malware variants through cloud-based reputation services
• Autopilot mode provides proactive recommendations without constant user alerts
Malwarebytes for Mobile
• Moderate; the deep scanning process can temporarily slow down older devices
• Excellent at identifying non-traditional threats like PUPs (Potentially Unwanted Programs) and adware
• Aggressive removal of pre-installed bloatware that may have security vulnerabilities
Avast Antivirus & Security
• Slightly higher battery usage due to the comprehensive web-shield monitoring
• Strong protection against phishing links and malicious websites in real-time
• Photo Vault and App Lock features add a layer of physical privacy for your data
For most users, Bitdefender is the best all-around choice due to its high accuracy and low battery drain. However, if your phone is flooded with pop-ups and junk apps, Malwarebytes' aggressive cleanup engine is often more effective at purging deep-seated adware.The Mystery of the Vanishing Data
David, a graphic designer in Austin, noticed his phone's monthly 20GB data cap was hitting zero within the first week of every month. He assumed it was high-res file syncs, but his frustration grew when the battery began dying by noon, even when sitting untouched.
He first attempted to fix it by closing all his background apps and lowering screen brightness. Result: The drain continued, and he was confused when his phone felt hot while charging in his pocket.
He finally looked at his cellular data stats and realized a 'Free Flashlight' app he downloaded months ago had uploaded 12GB of data in four days. He realized the 'glitch' was actually a data exfiltration script hiding inside a simple utility.
David deleted the app and ran a full scan, which found three more hidden scripts. Within 48 hours, his battery life returned to normal and his data usage dropped by 85%, teaching him that 'free' apps often come with a hidden security cost.
Further Reading Guide
Can I tell if my phone is being monitored through the camera?
Modern smartphones now include a small green or orange dot in the top corner of the screen whenever the camera or microphone is active. If you see this indicator while not using an app that requires it, it is a strong sign that someone - or something - is watching or listening.
How to tell if my phone is being monitored by a person I know?
Check for 'Device Administrator' or 'Accessibility Service' apps in your settings that you don't recognize. Stalkerware often requires these permissions to track your keystrokes and messages. If you find an app like 'System Update' or 'Device Sync' with full admin rights that isn't from your phone's manufacturer, it may be spyware.
Will a factory reset remove a phone hack?
In nearly all cases, a factory reset is the most effective way to wipe malware and spyware. It clears the operating system of all third-party files. Just ensure you have backed up your photos and contacts manually, as restoring from a cloud backup might inadvertently reinstall the malicious app.
Most Important Things
Use dialer codes for immediate redirection checksDial #21and #62to instantly see if your calls and messages are being intercepted by unauthorized third parties.
Monitor the 'Big Three' symptomsExcessive heat, sudden battery drain, and unexplained data spikes are the most reliable indicators of a background breach.
Audit your permissions monthlyMalware can bypass scanners, but it cannot hide from the permission manager. Revoke camera and location access for any app that doesn't strictly need them.
Kill all forwarding with a single codeIf you find suspicious redirections, dial ##002to reset all forwarding settings to factory defaults immediately.
Reference Materials
- [1] Controld - Mobile cryptojacking attacks, which use a phone's processor to mine cryptocurrency, rose by 60% in 2025.
- [2] Controld - As of early 2026, the total number of distinct malware programs in circulation has surpassed 1.3 billion.
- [4] Controld - Security researchers now identify an average of 560,000 new malware variants every 24 hours.
- How to make sure VPN is turned on?
- How to tell if a VPN is on a computer?
- How to check the VPN status?
- How do I know if my VPN is on or off?
- Should the VPN be on or off?
- Where can I find VPN on my phone?
- Where do I find my VPN in settings?
- How much does a VPN typically cost?
- Does my phone have a builtin VPN?
- How to use a VPN for beginners?
Feedback on answer:
Thank you for your feedback! Your input is very important in helping us improve answers in the future.