How To Tell If Your iPhone Is Hacked
Updated:
You may be under the impression that iPhones are the safest mobile devices on the market. Apple has worked hard to earn this reputation with its tough stance on user privacy.
However, in October 2024, 8.8% of iPhones scanned with Certo had spyware or a tracking app installed. Unfortunately, this shows they might not be as immune to hacking as some believe.
You may think that having a strong passcode and not sharing your Apple ID is enough to protect your iPhone, but hackers have many ways to gain access to mobile devices that bypass these security measures.
You’ve come to the right place if you suspect you’re dealing with a hacked iPhone. In this article, we’ll discuss the signs to look out for indicating that your phone has been hacked and what you can do about it.
Find out if your iPhone is hacked.
Detect and remove phone hackers the easy way with the award-winning Certo AntiSpy.
8 Ways to Tell if Your iPhone Is Hacked
Following the steps below, you can quickly and easily determine whether your iPhone is hacked and what to do about it.

1. Consider your battery life
It’s normal for your phone’s battery to wear down over time and become less efficient, but this usually happens over years.
If you’ve only had your phone for a few months and the battery life is poor, it could be a sign that something is wrong.
A phone’s battery draining too quickly can indicate that additional processes are running in the background, such as a malicious app spying on your text messages and phone calls.
If spyware has been installed on your phone, it could send your sensitive data to a hacker, which can drain your battery faster.
To see how your battery is performing, follow these steps:
- Open the Settings app.
- Tap Battery.
- Tap the Last 10 Days tab to show the battery usage graph for the last 10 days.
- Check if any activity surges may indicate that someone has installed spyware on your device.
- Scroll down and review which apps are using your battery the most. Pay particular attention to apps that say “Background Activity.”

Fig 1. Reviewing battery usage on an iPhone.

2. Check for high data usage
Many of us don’t use all of our mobile data every month, but if you’ve been hitting your data usage limit regularly and aren’t sure how, it might be a sign of something fishy.
If your iPhone is hacked, hidden software or malicious apps running on your device could connect to the internet and pass your information onto third parties, quickly increasing your data usage.
To see how much mobile data you’re using, follow these steps:
- Go to Settings.
- Navigate to Cellular or Mobile Service.
- Scroll down to see which apps are consuming mobile data.

Fig 2. Checking data usage by app on an iPhone.
If you notice any apps you don’t recognize using data, use the toggle to turn off mobile data for that app. We suggest you delete the app, too, which leads us to our next point.

3. Look for suspicious apps on your phone
Be vigilant for any apps you don’t remember downloading on your iPhone.
Hackers only need physical access to your phone for a few minutes to install spyware apps that can steal your personal data, messages, and photos and send them to another device.
Check your phone regularly for unfamiliar apps, and immediately delete any you find. Here’s how to find and quickly remove unrecognized apps from your iPhone:
- Open the Settings app.
- Tap General, then iPhone Storage.
- Scroll down to review the list of apps installed on your iPhone.
- To delete an app, tap on it, then choose Delete App.
Pro Tip: Some spy apps can be hidden by the hacker, which means they may not appear in this list. To check for hidden apps, run a scan with Certo AntiSpy.

Fig 3. Finding and removing an app on an iPhone.

4. Check for a jailbreak
Jailbreaking an Apple device means removing some iOS restrictions so that you can customize your phone how you want. Some people jailbreak their iPhones to be able to install apps not available on the official App Store. Hackers may also jailbreak devices to install certain types of spyware.
This is a little more advanced than other hacking methods. Still, if you’ve noticed some suspicious apps on your phone that weren’t there before (specifically apps called ‘Cydia’ or ‘Sileo’), it likely means your iPhone is jailbroken.
Cydia and Sileo are apps that require physical access to the device to be installed—and if you didn’t install them, someone else did.
Jailbreaking a device opens up many options for phone hackers to retrieve data and monitor your iPhone remotely, as the iOS restrictions designed to protect your device have been disabled.
Follow the steps below to search for these apps:
- Swipe down from the middle of the Home screen.
- Type Cydia or Sileo.
- If either appears on your device, it is a pretty good sign that your iPhone has been jailbroken.
Pro Tip: Run a free jailbreak scan with Certo Mobile Security for iOS. The app can detect all types of jailbreak, even hidden ones.

Fig 4. Finding jailbreak apps on iPhone.

5. Look for enterprise or developer apps
With iOS, it’s possible to circumvent Apple’s security systems by allowing a device to use ‘developer’ or ‘enterprise’ versions of apps.
These are apps that aren’t ready to be released to the public yet or bespoke internal apps used by companies that don’t need them to be available on the App Store. However, hackers can also use these apps to bypass your phone’s security system.
These apps can be installed in various ways, including over USB or via a custom profile installed on the iPhone. This means that the app doesn’t need to pass the strict checks of the App Store.
Hackers use this method to their advantage to install apps on phones so that they can be accessed remotely.
If you have an enterprise or developer app you don’t remember installing on your iPhone, your phone may have been hacked.
Check for any unrecognized apps by following the instructions in Step 3. You can also check if a developer app has been installed on your iPhone by following these steps:
- Open the Settings app.
- Tap Privacy & Security.
- Scroll to the bottom and check if Developer Mode is turned on. If it’s on, but you didn’t do this yourself, someone may have installed a developer app without your knowledge.

Fig 5. Checking if Developer Mode is enabled on an iPhone.

6. Run a malware scan
The best way to determine if your iPhone is hacked is to run a malware scan.
Antivirus apps for iOS are quite limited, as Apple’s operating system doesn’t allow them to access areas of the device where malware typically hides.
However, alternative tools allow you to perform a full malware scan by connecting your iPhone to your computer.
We recommend Certo AntiSpy, the award-winning anti-spyware tool for iPhones.
The software will scan your iPhone for suspicious apps and malware. It will also check to see if your device has been jailbroken. If security threats are found, you can remove them with just a tap.
Here’s how to run a scan:
- Download and install the Certo AntiSpy app on your computer.
- Plug your iPhone into your computer with a USB cable.
- Click Scan.
- Tap Remove next to any threats.

7. Check for malicious keyboards
On iOS devices you can custom keyboards from the App Store. These apps are designed to replace your phone’s default keyboard and add extra characters or languages.
Unfortunately, hackers have discovered a way to bypass Apple’s security measures by using custom keyboards as keyloggers.
This allows them to secretly record everything typed on an iPhone, including private messages, passwords, and other sensitive data.
To check if you have any custom keyboards installed on your device, follow these steps:
- Open the Settings app.
- Tap General.
- Scroll down and select Keyboard.
- Tap Keyboards.
- Review the list for any keyboards you didn’t add.
- If you find any suspicious ones, swipe left on them and tap Delete.

Fig 6. Checking for malicious custom keyboards in iPhone settings.

8. Look out for unexpected status icons
Your iPhone shows status indicators at the top of the screen to tell you when certain functions are active.
These icons can alert you to unauthorized access if they appear unexpectedly. For example, Apple uses colored dots to indicate when the microphone or camera is in use:
- Orange dot: This indicates that your microphone is active. If you see this icon and aren’t using an app that requires the microphone, it could be a sign that an app is recording audio without your permission.
- Green dot: This icon signals that your phone camera is active. If you see the green dot but aren’t actively using the camera, it might mean an app has accessed it without authorization.

Fig 7. An iPhone showing the green and orange indicators.
If you notice these dots appearing when you’re not using apps that require the microphone or camera, it’s worth investigating further:
- Swipe down from the top right to open the Control Center. Here you can see which app is currently using your microphone or camera.
- Next, check your app permissions. Go to Settings > Privacy & Security > Microphone or Camera. Review which apps have access to these functions. Turn off access for any unfamiliar or suspicious apps.
Related: Are you curious about unfamiliar symbols on your screen? Discover what each iPhone status icon could mean for your privacy with our comprehensive guide
How Do iPhones Get Hacked?
Many iPhone users believe that their Apple product is safe from hacking. But there are several ways you can fall victim to phone hacking, including:

1. Clicking suspicious links
While Apple and other tech companies work hard to implement virus and malware protection into their operating systems, these measures don’t provide much security when users manually follow a suspicious link.
Avoid links with strange spellings, odd-looking logos, and any that aren’t secure —especially when using public Wi-Fi networks, which are more vulnerable to attacks.
A standard strategy phone hackers use involves attempting to impersonate a well-known brand you’re likely to trust without much thought.
They’ll set up a website and copy the brand’s design, then host it on a URL almost identical to the company they’re attempting to copy.
The site will then coerce you to click on one of these malicious links, allowing the hacker to access your personal or financial information and other login credentials.
Check URLs Carefully
Always double-check the URL of any website you visit. If it seems suspicious, it most likely is. Before following any links you don’t recognize, check that the URL is spelled correctly and that you can easily find it by searching online.
Another tip is to use a virtual private network (VPN) when browsing to protect your personal information and make your phone less vulnerable to attacks.

2. Targeted attacks
We often think of being hacked as something you may fall victim to by chance. But this ignores the existence of targeted attacks, which happen frequently.
A targeted attack is an invasion of privacy by a virus or malware directed at a specific person.
People who could be hacked in this way include those in the public eye or those with an ex-partner or controlling spouse with direct access to their phone. It can, however, happen to anyone at any time.

3. Downloading malicious apps
Apple monitors the App Store closely and is renowned for its strict guidelines on who and what can be published. However, some things may inevitably slip through the cracks.
It can be pretty easy to determine whether an app is trustworthy. A particularly slow app with an outdated look or one with obvious glitches shouldn’t be trusted, especially if it requests access to your phone’s camera, microphone, and location.
Be sure to check reviews before downloading apps from the App Store and delete any that raise questions about their trustworthiness.
Pro Tip: Avoid downloading apps from unofficial app stores. Apps from these sources do not go through the same approval process as Apple’s store and are therefore much more likely to contain malware.

4. Using weak passcodes
Using a weak or easily guessable unlock passcode is one of the most overlooked security risks for iPhone users.
If someone gains physical access to your device, a simple passcode makes it significantly easier for them to unlock your phone, exposing your data and potentially allowing them to install malware or spyware.
Once inside, they can view sensitive information such as messages, photos, and app data. Worse, they might even install tracking apps or spyware without you noticing, putting your privacy and security at serious risk.
To protect yourself, always use a strong passcode. Ideally, choose a six-digit or, even better, an alphanumeric passcode, which is much harder to guess or crack.
Additionally, avoid using easily guessed numbers like birthdates or simple sequences like “1234.”
For maximum security, consider enabling Face ID or Touch ID for an added layer of protection. This makes it virtually impossible for anyone without your biometric data to access your device, even if they get hold of your phone.

5. iCloud hacking
If someone can access your iCloud account, they may be able to steal any data synced to your account from your iPhone. This could include iMessages, notes, photos, videos, and contacts.
Although iCloud security has improved greatly in recent years, if a hacker can break in, they could download a vast amount of data from your iCloud account.
If you also back up your device to iCloud, a hacker with access to your account could also view this backup.
What to Do if Your iPhone Has Been Hacked
If you think your iPhone has been hacked, follow these steps to secure your device and protect your data and online security:
Remove suspicious apps
Uninstall any apps that look unfamiliar or unnecessary:
- Go to Settings > General > iPhone Storage.
- Scroll through the list of installed apps, and tap on any app you don’t recognize.
- Select Delete App to remove it from your device.
Update your iPhone’s software
Apple regularly releases iOS updates with security patches to help protect against threats. Performing an update can not only protect against new threats, but can also remove malware that is currently affecting your iPhone.
Go to Settings > General > Software Update. If an update is available, tap Download and Install to update your device.
Change all passwords
Secure your accounts by updating passwords for your Apple ID, iCloud, email, and sensitive apps. Use unique, strong passwords for each account:
- Open each app or account individually and navigate to the settings or security section to change your password.
- Use uppercase and lowercase letters, numbers, and special symbols for each password.
- Consider using a password manager like NordPass to securely generate and store strong passwords.
Enable two-factor authentication
Adding two-factor authentication (2FA) to your Apple ID and other important accounts can prevent unauthorized access:
- Go to Settings > [Your Name] > Sign-In & Security.
- Tap Turn On Two-Factor Authentication if it’s not already enabled.
- Follow the on-screen instructions to complete the setup. You may need a trusted phone number or device to complete this step.
Run a malware scan
Use an anti-spyware tool like Certo AntiSpy to check your device for malware:
- Download and install Certo AntiSpy on your computer.
- Connect your iPhone to your computer with a USB cable.
- Open Certo AntiSpy, click Scan and follow the prompts.
- Select Remove to delete any threats from your device if they are detected.

Fig 8. Finding spyware on an iPhone with Certo AntiSpy.
Factory reset your iPhone
If you’re still concerned, consider resetting your iPhone to remove all data, apps, and settings, restoring it to its original state:
Go to Settings > General > Transfer or Reset iPhone > Erase All Content and Settings.
ℹ️ Make sure to back up any essential data before doing this.
Cancel any linked credit cards
If your financial accounts might have been accessed, cancel any linked credit or debit cards to prevent fraudulent charges. Contact your bank or credit card provider to report potential fraud and request replacements.
Freeze your credit
To protect against identity theft, consider freezing your credit. Contact the three major credit bureaus—Equifax, Experian, and TransUnion—to freeze your credit. This will make it harder for anyone to open new accounts in your name.
Wrapping Up On iPhone Hacking
Many people think having an iOS device means you automatically have the best security. However, according to our data, iPhones are still vulnerable to hacking through spyware and tracking apps.
Whether it’s through a targeted attack or accidentally downloading malicious software, hackers can access your phone.
Now that you know how to tell if your iPhone has been hacked and what this does to your device, you can take steps to safeguard your phone.
Download our award-winning anti-spyware app to detect malware and protect your iPhone against security threats.
Stop hackers for good
Combat spyware and cyber threats with Certo AntiSpy, the world's leading anti-spyware tool for iPhones.