What to do immediately if your phone is hacked is not about panic—it’s about sequence. The first actions you take can either contain the damage or silently make it worse. Many people rush to reset their phone, delete apps, or install security tools, only to discover later that attackers still control their email or cloud accounts.
This guide focuses on the first critical actions to take when you suspect a phone compromise. You’ll learn what to do in the right order, what to avoid, and how to stabilize the situation before moving into cleanup or recovery. Think of this as digital first aid: stop the bleeding first, then treat the wound.
Quick Navigation
Step 1: Isolate the Phone Without Destroying Evidence
Your first goal is to stop live access.
How to isolate safely
-
Turn off Wi-Fi and mobile data
-
Avoid uninstalling apps or resetting yet
-
Do not click suspicious pop-ups or alerts
Isolation limits data exfiltration and real-time spying without alerting the attacker.
For the full threat overview and context, see: If Your Phone Is Hacked: How to Know, What to Do, and How to Stay Safe
Step 2: Secure Your Email From a Clean Device
Email is the master key to all other accounts.
Why email comes first
-
Password resets depend on it
-
Security alerts go there
-
Attackers often pivot through email
Use a trusted device to:
-
Change the email password
-
Enable two-step verification
-
Review active sessions and recovery options
A deeper walkthrough is here: Secure your email after phone hack
Step 3: Lock Down Core Accounts (Apple ID / Google)
Once email is safe, move to platform accounts.
What to check immediately
-
Login history and connected devices
-
App passwords and third-party access
-
Recovery phone numbers and emails
If platform access is lost, device cleanup won’t help.
Follow the structured recovery order here: If Your Phone Is Hacked: Step-by-Step Recovery Guide (Android & iPhone)
Step 4: Pause High-Risk Activity
Some actions create new risks during an active incident.
What to avoid right now
-
Banking or crypto transactions
-
Logging into new apps
-
Restoring backups
If financial or work apps are involved, containment matters more than speed.
Related guidance:
Step 5: Decide Whether to Power Down or Use Airplane Mode
This decision depends on your situation.
Airplane mode helps when:
-
You suspect live monitoring
-
You need temporary isolation
Powering off helps when:
-
You can’t secure accounts immediately
-
The phone behaves erratically
Neither option fixes the problem—but both buy time.

What to do immediately if your phone is hacked
Step 6: Document What You’re Seeing
Documentation helps recovery and escalation.
What to capture
-
Screenshots of alerts or unknown apps
-
Dates and times of suspicious activity
-
Account notification emails
This is especially important if reporting becomes necessary later.
What Comes After Immediate Actions
Once the situation is stable, move into cleanup and recovery, not before.
Next phases include
-
Identifying spyware or permission abuse
-
Deciding on factory reset vs safe cleanup
-
Restoring trust in accounts and the device
If you reached this stage, continue with: Remove hacker access safely
Security authorities consistently recommend isolating compromised devices and securing accounts before attempting cleanup, because premature resets often allow attackers to regain access through synced accounts or restored credentials Guidance on responding to suspected device compromise
Frequently Asked Questions
Should I reset my phone immediately after hacking?
No. Secure email and accounts first, or the attacker may follow you.
Is turning off Wi-Fi enough?
Temporarily, yes—but account access must still be fixed.
Can hackers spy in real time during this phase?
Yes, if the device stays connected.
Should I install antivirus immediately?
Not yet. Stabilize accounts before adding tools.
What if I can’t access my email at all?
Start account recovery from a clean device and pause phone use.