How To Unhack Your Phone
Updated:
If you’ve noticed some strange behavior from your phone and you’re worried that it may be hacked, you’re in the right place. Phone hacking is more common than most people realize, and cybercriminals, jealous partners, or even nosy employers can gain unauthorized access to your device with surprisingly little effort.
The good news? You don’t have to be a tech expert to fight back and reclaim control of your privacy. This guide will walk you through everything you need to know about phone hacking, including step-by-step instructions to unhack your device and protect yourself from future attacks.
Need to fix a hacked phone?
Certo's award-winning apps can quickly identify threats on your device and help you remove them with ease.
Table of contents
- 1. Check for and remove suspicious apps
- 2. Turn off Developer Mode
- 3. Remove unknown profiles and configurations
- 4. Remove threats with Certo AntiSpy
- 5. Review and restrict app permissions
- 6. Check logged-in devices and sync settings
- 7. Update your operating system
- 8. Enable built-in security features
- 9. Factory reset (last resort)
How Do I Unhack My Phone?
Whether you have an iPhone or Android device, the steps to remove threats and secure your phone follow a similar pattern. Here’s your complete unhacking toolkit:
1. Check for and remove suspicious apps
Look through your installed apps and remove anything you don’t recognize. Pay special attention to apps with generic names or those disguised as system utilities.
iPhone instructions:
Go to Settings > General > iPhone Storage to see all installed apps. Delete any suspicious ones.
Android instructions:
Check Settings > Apps or use your app drawer. Be aware that some pre-installed manufacturer apps are legitimate—research unfamiliar system apps before removing them.

Fig 1. Detecting malicious apps in Settings on iOS (left) and Android (right).
Known malicious app names:
Here are some common malicious app names to look out for.
- FlexiSpy
- Phone Monitor
- SystemCore
- mSpy
- SystemUpdate
- UpdateService
- iPhoneInternalService
Pro Tip: Some spy apps can be hidden by hackers, which means they may not appear in these lists. Run a scan with Certo AntiSpy
to detect hidden apps.
2. Turn off Developer Mode
Developer Mode allows apps to be installed from sources other than official app stores, bypassing normal security checks. If this is enabled without your knowledge, it could indicate someone has tried to install malicious software on your device.
iPhone instructions:
- Open Settings > Privacy & Security.
- Look for “Developer Mode” under Security.
- If it’s enabled and you didn’t turn it on, disable it immediately.
- Restart your device.
- Note: If you don’t see this option, Developer Mode has never been enabled.
Android instructions:
- Go to Settings and search for “Developer”.
- If “Developer Options” appears and is enabled, tap it.
- Turn off the toggle at the top to disable Developer Options.
- This prevents unauthorized app installations via USB connection.

Fig 2. Developer Mode enabled on iOS (left) and Android (right).
Pro Tip: Developer Mode requires technical knowledge to enable, so finding it active when you didn’t set it up is a strong sign of unauthorized access to your device.
3. Remove unknown profiles and configurations
Configuration profiles and device management settings can change how your phone behaves and what apps are allowed to do. Hackers sometimes use these to install malicious software or change security settings without your knowledge.
iPhone – Check for malicious profiles:
Configuration profiles on iPhone can install unwanted apps, change network settings, or modify security policies. These are often used by hackers to bypass App Store restrictions.
- Go to Settings > General > VPN & Device Management.
- Look for any configuration profiles you don’t recognize.
- To remove a suspicious profile, tap on it and select Remove Profile.

Fig 3. Finding a malicious profile in Settings on iPhone.
Android – Check VPN and device admin apps:
Device administrator apps have special permissions to control your phone’s security settings. Unknown VPN connections can redirect your internet traffic through a hacker’s server.
- Go to Settings and search for “device admin apps”
- Tap Device Admin apps.
- Revoke admin permissions for any apps you don’t recognize by unchecking them.
- Check Settings > Connections > More connection settings > VPN for unknown VPN connections
- Delete any VPN profiles you didn’t set up yourself.
- Note: The exact steps may vary depending on your phone manufacturer.

Fig 4. Checking Device Admin Apps in Settings on Android.
4. Remove threats with Certo AntiSpy
One of the easiest ways to identify and remove hackers is with a dedicated security scan. Certo AntiSpy works for both iPhone and Android devices and can detect threats that traditional antivirus apps miss.
For iPhone: Download Certo AntiSpy to your computer, connect your iPhone via USB, and run a scan. The software will detect spyware and provide one-tap removal for most threats.
For Android: Download Certo AntiSpy directly from the Google Play Store. It scans both your apps and deep system files for hidden threats. If a threat is detected, simply tap the Remove button to delete it for good.

Fig 5. Unhacking a phone with Certo AntiSpy for Android.
5. Review and restrict app permissions
Malicious apps often request access to sensitive features like your camera, microphone, location, and contacts to spy on you. By reviewing and restricting these permissions, you can stop unauthorized apps from accessing your private data.
iPhone instructions:
- Go to Settings.
- Tap Privacy & Security.
- Select the feature you want to check (Location Services, Camera, Microphone, etc.).
- Review which apps have access and turn off any you don’t recognize or trust.
Android instructions:
- Open Settings.
- Tap Security and Privacy.
- Tap Privacy, then select Permission Manager.
- Choose a permission type (Camera, Microphone, Location, etc.).
- Review which apps have access and turn off any you don’t recognize or trust.

Fig 6. Checking location permissions on iOS (left) and Android (right).
Pro Tip: If you have Certo AntiSpy installed, you can use the Privacy Audit feature to quickly see which apps are accessing your GPS location, camera, microphone, and other sensitive functions all in one place.
6. Check logged-in devices and sync settings
If someone has gained access to your Apple ID or Google account, they could be accessing your backed-up photos, messages, contacts, and other synced data from another device. Review and remove any unfamiliar devices from your accounts.
iPhone instructions:
- Open Settings.
- Tap your name at the top.
- Scroll down to see devices signed into your Apple ID.
- Tap any device you don’t recognize and select Remove from Account.
- Change your Apple ID password after removing unknown devices.
Android instructions:
- Go to your Google account and tap Your devices.
- Review all signed-in devices.
- Tap any unfamiliar device and select Sign out or Remove.
- Change your Google account password if you find suspicious devices.

Fig 7. Connected devices on iOS (left) and Android (right).
7. Update your operating system
Operating system updates often include critical security patches that fix vulnerabilities hackers exploit to install spyware. Beyond prevention, updates can actually fix a hacked device—for example, iOS updates can automatically unjailbreak an iPhone and restore its security protections.
iPhone instructions:
- Go to Settings.
- Tap General.
- Select Software Update.
- If an update is available, tap Update Now and follow the on-screen instructions.
Android instructions:
- Open Settings.
- Scroll to System (or About Phone on some devices).
- Tap System Update.
- If an update is available, follow the prompts to install it.
- Note: The exact location may vary depending on your phone manufacturer.

Fig 8. Software Update on iOS (left) and Android (right).
Pro Tip: Installing updates can often disable commercial spyware apps, providing immediate protection. It’s worth updating even if you’re not sure your device is compromised.
8. Enable built-in security features
Your phone comes with several built-in security features that can help protect against future attacks and limit damage if someone does gain access. These advanced protections are specifically designed to combat sophisticated threats.
iPhone – Enable Lockdown Mode:
Lockdown Mode provides extreme protection against advanced spyware and targeted attacks by limiting device functionality.
- Open Settings.
- Tap Privacy & Security.
- Under Security, tap Lockdown Mode.
- Tap Turn On Lockdown Mode and follow the on-screen instructions.

Fig 9. Activating Lockdown Mode in Settings on iPhone.
Android – Verify Google Play Protect:
Play Protect scans your apps for malicious software and helps prevent harmful downloads.
- Open the Play Store app.
- Tap your profile icon at the top right.
- Select Play Protect.
- Ensure the toggle is turned on.
- Tap Scan to run an immediate security check.

Fig 10. Enabling Google Play Protect in the Play Store.
9. Factory reset (last resort)
If other methods fail or you’ve discovered extensive compromise, a factory reset will completely clean your device by erasing everything and returning it to its original state.
This last-resort option removes all malware, spyware, and unauthorized modifications, but it also wipes all your personal data.
Before you begin: Back up important photos, contacts, and documents to cloud storage or another device.
iPhone instructions:
- Go to Settings.
- Tap General.
- Select Transfer or Reset iPhone.
- Tap Erase All Content and Settings and follow the on-screen instructions.
Android instructions:
- Open Settings.
- Scroll to System (or General Management on Samsung).
- Tap Reset or Reset Options.
- Select Factory Data Reset or Erase All Data and follow the on-screen instructions.
Important: After the reset, set up your phone as a new device rather than restoring from a backup, as backups might contain the same malware that infected your phone originally.

Fig 11. Performing a factory reset on iOS (left) and Android (right).
Get your privacy back
Download one of Certo's award-winning apps today and uncover spyware and other cyber threats on your phone.
Wrapping Up
Taking back control of a hacked phone can feel overwhelming, but you now have the tools to fight back effectively.
The reality is that phone hacking has become disturbingly accessible—anyone with $30 and basic technical skills can purchase spyware and install it on your device.
The steps we’ve covered aren’t just about cleaning up after an attack; they’re about fundamentally changing your relationship with your device’s security.
Remember, the goal isn’t perfect security (that doesn’t exist), but rather making yourself a harder target. Most phone hackers are opportunists looking for easy victims. When you take proactive steps to secure your device, it’s often enough to make them move on to someone else.
Essential steps to prevent phone hacking:
- Run regular security scans with Certo AntiSpy to catch threats before they cause damage.
- Only download apps from official stores like the Apple App Store or Google Play Store.
- Keep your operating system updated with the latest security patches and features.
- Use strong, unique passcodes and enable biometric locks like Face ID or fingerprint unlock.
- Connect to a VPN when using public Wi-Fi to encrypt your internet traffic and protect your data.
- Be cautious with links and attachments in texts or emails, especially from unknown contacts.
- Enable Find My Device or Find My iPhone to track and remotely wipe your phone if it’s stolen.
- Never jailbreak or root your device as this removes critical security protections.
- Review app permissions regularly and remove access for apps that don’t need sensitive data.
- Back up your data regularly so you can recover quickly if you need to factory reset.