How to Check If Your iPhone Is Hacked in Settings

By Simon Lewis
Published:

Do you think your iPhone might be hacked? Even though iPhones are known for their strong security, no device is completely safe from hackers.
The good news is that you can use your iPhone’s built-in Settings app to check for anything fishy.
In this article, we’ll walk you through simple steps to check your settings for signs of a hack, so you can take back control and safeguard your privacy.
Expert Insight
While your iPhone’s settings can show signs of a hacked device, they may not always tell the full story.
For a more thorough check, consider using a specialized security tool like Certo AntiSpy to perform a deep scan.
How to Check If Your iPhone Is Hacked in Settings
Check for unknown profiles
A configuration profile on an iPhone is a file that contains a collection of settings and rules that can be applied to the device to customize its behavior and control access to features and resources.
It can configure network connections, email accounts, VPN access, security policies, app restrictions, and other aspects of the device. Organizations like businesses or schools often use them to manage and secure the iPhones or iPads used by their employees or students.
However, hackers can use malicious profiles to install unwanted software or change mobile device settings without your consent.
Here’s how to check for unknown profiles via settings:
- Open the Settings app.
- Scroll down and tap General.
- Tap VPN & Device Management to see a list of installed profiles.
- If you find one you don’t recognize or didn’t install, tap it, then select Remove Profile.
Fig 1. Checking for unknown profiles in iPhone settings.
Review installed apps for malicious software
Hackers can install malicious apps on your iPhone, often disguised as legitimate software. These apps can collect personal information or monitor your activity. Because of this, you must regularly check your Apple devices for unfamiliar apps you don’t remember installing.
Here’s how to use settings to check for unrecognized apps on your iPhone
- Open the Settings app.
- Tap General.
- Select iPhone Storage to view a list of all installed apps.
- Scroll through all the apps and look for any you don’t recognize.
- If you find a suspicious app, tap it and select Delete App.
Fig 2. Checking for malicious apps in iPhone settings.
Here are some known malicious app names to look out for:
- Cydia
- Sileo
- Phone Monitor
- SystemCore
- SystemUpdate
- iPhoneInternalService
- FlexiSpy
- mSpy
- Update Service
Check if Developer Mode is enabled
Developer Mode unlocks your iPhone’s potential for developers to build and test apps. This feature allows advanced users to install apps from sources other than the official App Store.
This process, called “sideloading,” bypasses Apple’s app review process, which checks apps for security and privacy issues. Sideloaded apps could contain malware or other harmful code that could compromise your device and data.
If this mode is enabled without your knowledge, it might indicate someone has tried to gain access and install suspicious apps on your device.
Here’s how to check if developer mode is enabled on your device:
- Open the Settings app.
- Scroll down and tap Privacy & Security.
- Look for Developer Mode under Security.
- If Developer Mode is turned on and you didn’t enable it, turn it off.
Fig 3. Checking if developer mode is enabled in iPhone settings.
Check if an additional Face ID or fingerprint has been setup
iPhones allow you to add multiple fingerprints or faces to unlock the device. If you notice additional entries here that you didn’t add, it might mean someone could access your iPhone without your permission.
To review Face ID settings:
- Open the Settings app.
- Scroll down and tap Face ID & Passcode.
- Enter your passcode.
- If you see the option to Set Up an Alternative Appearance then only one Face ID is setup and no further action is needed.
- If you don’t see Set Up an Alternative Appearance then a second Face ID is setup.
- To remove a second Face ID, tap Reset Face ID to remove all stored faces, then setup Face ID again.
Fig 4. Checking for additional Face IDs in iPhone settings.
To review Touch ID settings:
- Open the Settings app.
- Scroll down and tap Touch ID & Passcode.
- Enter your passcode.
- Under Fingerprints, look for any entries you didn’t set up.
- To remove a fingerprint, tap it then select Delete Fingerprint.
Review paired Bluetooth devices
iPhones use Bluetooth to connect to devices like headphones, car systems, and computers. However, hackers can exploit the security vulnerabilities of Bluetooth to gain access to your iPhone.
For example, Microsoft Phone Link has been abused by cyberstalkers to secretly monitor communications from an iPhone. They can set up the Phone Link app on their Windows PC by scanning a QR code displayed on the computer screen with the victim’s iPhone.
This establishes a Bluetooth connection between the iPhone and the PC, allowing the cyberstalker to access the victim’s iMessages, call history, and notifications. Also, once it’s set up, Phone Link can:
- View sent and received iMessages.
- Send iMessages to contacts.
- View call history.
- Make calls.
- View the contents of all notifications, even if the iPhone is set not to display them until it is unlocked.
This is just one of the ways an iPhone can be hacked via Bluetooth. To check if there are any unrecognized Bluetooth devices on your phone:
- Open the Settings app.
- Tap Bluetooth.
- Look through the list of My Devices. Look out for any devices you don’t recognize, especially computers.
- If you see an unfamiliar device, tap the i icon next to it and select Forget This Device.
Fig 5. Checking for unknown Bluetooth devices in iPhone settings.
Check for suspicious Custom Keyboards
You can install legitimate custom keyboards from the App Store. These apps are designed to replace your phone’s default keyboard and add extra characters or languages.
Unfortunately, cybercriminals have discovered a way to bypass Apple’s security measures by using custom keyboards as keyloggers.
This allows them to secretly record everything typed on an iPhone, including private messages, passwords, and other sensitive data.
To check if you have any custom keyboards installed on your device, follow these steps:
- Open the Settings app.
- Tap General.
- Scroll down and select Keyboard.
- Tap Keyboards.
- Review the list for any keyboards you didn’t add.
- If you find any suspicious ones, swipe left on them and tap Delete.
Fig 6. Checking for malicious custom keyboards in iPhone settings.
Check for high data usage
Most malware sends data to the hacker over the Internet, often leading to unusually high data usage on the infected device. Because of this, reviewing the data usage on your device is a good idea.
It could be a sign of malware if you notice high data usage from apps you don’t recognize. You can check this via the settings app:
- Open the Settings app.
- Tap Cellular (or Mobile Service).
- Scroll down to see the data usage for each app.
- Look for apps using a lot of data, especially if you don’t recognize them.
- If you find an unfamiliar app using high data, consider uninstalling it.
Fig 7. Checking apps for high data usage in iPhone settings.
Check microphone and camera settings
Some spy apps use your iPhone’s microphone or camera to record your activities without your consent. Regularly reviewing access to these features can help identify any unauthorized monitoring.
Here’s how to check which apps have access to your camera and microphone:
- Open the Settings app.
- Scroll down and tap Privacy & Security.
- Select Microphone and Camera to view which apps have access.
- Review the list for any suspicious or unfamiliar apps.
- If you find an app that shouldn’t have access, toggle off the switch next to it to revoke permissions.
Fig 8. Checking microphone permissions in iPhone settings.
Keep an eye out for a colored dot in your status bar
The orange and green dots on an iPhone indicate when an app is using the microphone or camera.
The orange dot indicates an app is using your iPhone’s microphone, while the green dot means an app is accessing the camera or camera and microphone.
Swipe down from the top left to see the name of the app using your microphone or camera.
Check your battery usage
Malicious apps running in the background can cause unusual battery drainage. Monitoring battery usage can help you identify any unknown apps using excessive power.
Here’s how to check this via settings:
- Open the Settings app.
- Scroll down and tap Battery.
- Review the Battery Usage by App list.
- If you notice an unknown app consuming a lot of power, it could be a sign that the app is running in the background without your knowledge.
Fig 9. Checking apps for high battery usage in iPhone settings.
How to Protect Your iPhone from Hackers
Once you have checked if your phone is hacked via the Settings app, you must take proactive steps to keep your device secure. Here are some easy ways to protect your iPhone from hackers:
- Keep iOS updated: Always update your phone to the latest iOS version. Updates often include important security patches that fix security vulnerabilities.
- Use a strong passcode: Set a complex passcode with at least 8 characters instead of a simple 4-digit one. Go to Settings > Face ID & Passcode (or Touch ID & Passcode) to change it.
- Enable Two-Factor Authentication (2FA): Enabling 2FA for your Apple ID adds an extra layer of security. It makes it harder for someone to access your account even if they have your password.
- Be careful with app downloads: Only download apps from the official App Store. Avoid installing apps from unknown sources to reduce the risk of malware.
- Use a VPN on public Wi-Fi: Protect your data when using public Wi-Fi by using a Virtual Private Network (VPN). This encrypts your internet connection and keeps your information safe.
- Turn on Find My iPhone: Enable Find My iPhone in Settings > [Your Name] > Find My. This helps you locate your device if it’s lost or stolen and allows you to remotely erase it if needed.
- Disable unnecessary features: Turn off Bluetooth, Wi-Fi, and Location Services when you’re not using them to reduce potential entry points for hackers.
- Use secure browsing practices: Avoid clicking on suspicious links in emails or messages. Always check a URL is genuine before entering sensitive information to minimize the risk of phishing attacks.
- Install anti-malware software: Consider using trusted security apps like Certo AntiSpy to add an extra layer of protection against malware and spyware.
- Regularly Back Up Your Data: Back up your iPhone regularly using iCloud or iTunes. This ensures you can restore your data if your device is compromised.
Final Thoughts
Keeping your iPhone secure doesn’t have to be complicated. Regularly checking the Settings app can catch any unusual activity before it becomes a big problem.
Whether you’re looking for unknown profiles, reviewing your installed apps, or monitoring data usage, these simple steps can make a big difference in protecting your phone.
For an extra layer of security, consider using tools like Certo AntiSpy. It can help detect and remove threats like spyware, giving you peace of mind knowing that your personal information stays private.