
Two months ago, my iPhone 13 started acting strange. Battery draining in 4 hours instead of the usual 14. Apps opening by themselves. Data usage spiking to 18GB when I typically use 6-8GB monthly. Random pop-ups appearing even when I wasn’t browsing.
I was at home when I noticed R2,400 missing from my mobile banking app. Money I definitely didn’t spend. My stomach dropped.
I called my bank immediately from the food court. They confirmed: unauthorized transactions. Someone had accessed my banking app and transferred money to three different accounts. The bank blocked my cards and started an investigation, but the damage was done.
My colleague Sipho found me sitting there, visibly shaken. “Bongani, what happened?” When I explained, he said something that hit hard: “Your phone’s been compromised, bro. Those aren’t glitches—those are symptoms.”
He was right. My phone had been hacked, and I’d ignored every warning sign for three weeks.
That incident cost me R2,400 and nearly destroyed my perfume business’s cash flow. But it taught me something crucial: phone hacking isn’t some distant threat that happens to other people. It’s happening right now, in Gauteng province, to regular people like me who work at Checkers Allens Nek and run side businesses.
After securing my phone and investigating how it happened, I learned to recognize the signs early and fix vulnerabilities before they’re exploited. Let me show you exactly what to look for and what to do—because the next target could be you.
Why Your Phone Is a Target (Especially in South Africa)
Before we dive into signs and fixes, understand why hackers want your phone.
Your smartphone contains:
- Banking apps with direct access to money
- Personal information (ID numbers, addresses, contacts)
- Business communications (WhatsApp, email, client details)
- Photos and videos (potential blackmail material)
- Social media accounts (can be hijacked or used for scams)
- Passwords stored in browsers and apps
Working at Checkers Allens Nek as a perishables controller, I manage inventory worth hundreds of thousands of rands using mobile devices. My perfume business runs entirely through my iPhone 13—supplier communications, customer orders, payment processing, product photography, everything.
If someone gains access to my phone, they gain access to my entire financial life and business operations.
South Africa-specific risks:
In 2025, phone hacking in Gauteng has increased by 43% compared to 2023 (according to SAPS cybercrime reports). The methods are getting more sophisticated:
- Fake WiFi hotspots at malls (Clearwater Mall, Cresta, Sandton City)
- Phishing SMS messages pretending to be from banks, SARS, or delivery services
- Malicious apps disguised as legitimate South African services
- SIM swap fraud (still rampant despite new regulations)
My colleague Zama fell victim to a SIM swap attack last year. Someone walked into a mobile store with fake documents, got a duplicate SIM, and within 2 hours had drained her bank account. Her phone never showed any “hacked” symptoms—the attack bypassed her device entirely.
12 Warning Signs Your Phone Has Been Hacked
These are the exact symptoms I experienced and what my colleagues Njabulo, Snethemba, Sipho, and Zama reported when their devices were compromised.
1. Sudden Battery Drain
Normal: My iPhone 13 lasts 14-16 hours with heavy use
Hacked: Lasted 4-5 hours with the same usage patterns
Why this happens: Malware runs constantly in the background, consuming power. Hackers use your phone’s processing power for cryptocurrency mining or to relay data.
My experience: I blamed iOS updates initially. Wrong. It was spyware transmitting my data continuously.
2. Unexplained Data Usage Spikes
Check your data usage: Settings > Cellular (iPhone) or Settings > Network & Internet > Data Usage (Android)
My normal usage: 6-8GB monthly (WhatsApp, Instagram, email, maps)
During hack: 18GB in two weeks
Malware uploads your information, downloads additional malicious code, and communicates with remote servers—all consuming massive data.
Sipho’s experience at Checkers: His Android phone used 22GB in one month when he typically used 8GB. He discovered a fake “System Update” app running constantly in the background, transmitting data to servers in Eastern Europe.
3. Phone Overheating When Idle
Your phone shouldn’t feel hot when you’re not using it.
What I noticed: My iPhone 13 was warm to the touch even when sitting on my desk at Checkers Allens Nek. No apps open, screen off, but the processor was working overtime.
Why: Malicious software running background processes, mining cryptocurrency, or recording audio/video continuously.
4. Apps You Didn’t Download
Check your app list regularly.
What I found: Three apps I didn’t recognize:
- “System Security Pro”
- “Battery Optimizer Plus”
- “WiFi Manager”
All had generic names designed to blend in. All were malware disguised as utility apps.
Njabulo’s story: He discovered 5 apps on his Huawei phone he never installed. They had permissions to access contacts, messages, camera, and microphone. He’d clicked a malicious link in a phishing SMS pretending to be from his bank.
5. Increased Pop-Up Ads
Legitimate apps show occasional ads. Hacked phones show constant, aggressive pop-ups even when you’re not browsing.
My experience: Pop-ups appeared on my home screen, during calls, and when opening any app. They advertised fake antivirus software (ironically) and “system optimization” tools.
6. Unusual Account Activity
Check your email, social media, and banking apps for:
- Login attempts from unknown locations
- Password reset requests you didn’t initiate
- Messages or posts you didn’t create
- Friend requests or follows you didn’t send
What happened to me: My Instagram account sent DMs to 47 followers with phishing links. I only discovered this when someone replied asking why I was sending spam.
7. Slower Performance
Normal: Apps open instantly, smooth scrolling, responsive touch
Hacked: Lag when opening apps, freezing, delayed touch response
Malware consumes processing power and memory, degrading performance noticeably.
Zama’s experience: Her iPhone 12 became so slow she thought it was broken. Turns out, spyware was recording every keystroke and transmitting it in real-time.
8. Strange Texts or Calls in Your History
Check your call log and message history for:
- Calls to premium numbers you didn’t make
- SMS messages to short codes (5-digit numbers)
- International calls you didn’t place
My call log showed: Three calls to premium-rate numbers (R15/minute) totaling R127 in charges. I never made those calls—the malware did.
9. Unusual Background Noise During Calls
Clicking sounds, static, or echoes during phone conversations can indicate someone is listening.
Snethemba’s story: During calls at Checkers, he heard faint clicking sounds. His girlfriend mentioned hearing the same. Spyware was recording his conversations.
10. Automatic App Installations or Updates
Apps installing or updating without your permission indicate someone has remote access to your device.
11. Difficulty Shutting Down Your Phone
If your phone takes unusually long to power off, restarts on its own, or refuses to shut down, malware might be preventing it to maintain access.
12. Unexplained Financial Transactions
The ultimate red flag: money disappearing from your accounts.
My R2,400 loss breakdown:
- R800 to “TechStore Online” (fake merchant)
- R900 to “Airtime Vendor” (never used)
- R700 transferred to unknown bank account
All happened within 45 minutes while I was at Clearwater Mall, phone in my pocket.
How Phones Get Hacked (Common Attack Methods in Gauteng)
Understanding how it happens helps you prevent it.
Method 1: Phishing SMS/WhatsApp Messages
Real example I received:
*”Your SARS tax refund of R4,850 is ready. Click here to claim: [malicious link]
*”
Looked legitimate. Had SARS branding. The link installed malware when clicked.
Other common phishing messages in South Africa:
- “Your Checkers/Pick n Pay delivery is delayed—track here”
- “Unpaid e-toll fine—pay now to avoid penalties”
- “Your bank account has been compromised—verify here”
- “Congratulations! You’ve won a Takealot voucher”
Method 2: Fake Public WiFi
At Clearwater Mall, Cresta, or any public space, hackers create fake WiFi hotspots with names like “Mall_Free_WiFi” or “Starbucks_Guest.”
When you connect, they intercept everything you do—passwords, banking details, messages.
My colleague Njabulo’s mistake: Connected to “Checkers_Staff_WiFi” at Allens Nek. It wasn’t our actual staff network—it was a fake hotspot in the parking lot. Within an hour, his Facebook and email were compromised.
Method 3: Malicious Apps
Apps downloaded from unofficial sources or even some on official app stores contain hidden malware.
Red flags:
- Apps with generic names (“System Manager,” “Phone Cleaner”)
- Poor grammar in descriptions
- Excessive permissions requests
- Few downloads or reviews
- Developer with no other apps
Method 4: Physical Access
Someone borrows your phone “to make a quick call” and installs spyware in 30 seconds.
Sipho’s story: A “customer” at Checkers asked to borrow his phone for an emergency call. Returned it 2 minutes later. Three days later, Sipho’s banking app was compromised. The person had installed remote access software.
Method 5: SIM Swap Fraud
Hackers use fake ID documents to get a duplicate SIM card from mobile providers. Once they have your number, they bypass two-factor authentication and access your accounts.
Zama’s R18,000 loss: SIM swap attack. Her phone suddenly showed “No Service.” By the time she realized what happened, her bank accounts were empty.
How to Check If Your Phone Is Hacked (Right Now)
Stop reading and do these checks immediately.
For iPhone (Like My iPhone 13)
Check installed apps:
- Settings > General > iPhone Storage
- Review every app—delete anything unfamiliar
Check battery usage:
- Settings > Battery
- Look for unknown apps consuming power
Check data usage:
- Settings > Cellular
- Scroll down to see data usage by app
- Investigate anything suspicious
- Remove unknown devices
For Android
Check running apps:
- Settings > Apps > Running Services
- Look for unfamiliar processes
Check permissions:
- Settings > Apps > App Permissions
- Review which apps have access to camera, microphone, location, contacts
Check data usage:
- Settings > Network & Internet > Data Usage > App Data Usage
My discovery process: Spent 20 minutes checking these on my iPhone at home in Roodepoort after the Clearwater Mall incident. Found 3 malicious apps, 2 unknown processes, and excessive data usage from “System Security Pro.”
How to Remove Malware and Secure Your Phone
If you’ve identified signs of hacking, act immediately.
Step 1: Disconnect from Internet
Turn on Airplane Mode to prevent further data theft while you clean your device.
Step 2: Delete Suspicious Apps
Remove any apps you don’t recognize or didn’t install yourself.
iPhone: Long-press app > Remove App > Delete App
Step 3: Run Security Scan
iPhone: No built-in antivirus, but check Settings > Safari > Clear History and Website Data
Android: Use reputable antivirus:
- Bitdefender Mobile Security (free version works)
- Avast Mobile Security
- Kaspersky Mobile Antivirus
Sipho used Bitdefender at Checkers and found 4 pieces of malware on his Samsung.
Step 4: Change All Passwords
From a secure device (not your compromised phone initially), change passwords for:
Email accounts
- Social media
- Any app with payment information
Use strong, unique passwords for each account. I use a password manager (Bitwarden, free) on my MacBook laptop to generate and store complex passwords.
Step 5: Enable Two-Factor Authentication
Add extra security layers to critical accounts:
- Banking apps
- Social media
Important: Use authentication apps (Google Authenticator, Microsoft Authenticator), not SMS-based 2FA. SMS can be intercepted through SIM swaps.
Step 6: Factory Reset (If Severely Compromised)
If malware persists after removing apps and scanning, factory reset your device.
Before resetting:
- Back up photos to Google Photos or iCloud
- Export contacts
- Note down important information
Android: Settings > System > Reset Options > Erase All Data
I did a complete factory reset of my iPhone 13 after the hack. Took 2 hours to restore everything, but I had complete peace of mind.
Step 7: Contact Your Bank Immediately
Report unauthorized transactions. South African banks have fraud protection, but you must report within 24-48 hours.
My bank (FNB) reversed R1,600 of the R2,400 stolen. I lost R800, but it could have been everything.
Step 8: Report to Authorities
File a report with:
- SAPS Cybercrime unit
- Your mobile provider (especially for SIM swap fraud)
- South African Banking Risk Information Centre (SABRIC)
Prevention: How to Protect Your Phone Going Forward
After my hack, I implemented these security measures. Zero incidents in 8 months.
Daily habits:
- Never click links in unsolicited SMS/WhatsApp messages
- Don’t connect to public WiFi without VPN
- Don’t lend your phone to strangers
- Lock your phone with strong passcode (not 1234 or your birthday)
- Enable Face ID/fingerprint authentication
Weekly checks:
- Review installed apps
- Check data and battery usage
- Monitor bank account activity
Monthly maintenance:
- Update iOS/Android to latest version
- Update all apps
- Change critical passwords
- Review app permissions
At Checkers Allens Nek, my colleagues and I now:
- Never connect to unknown WiFi networks
- Verify sender before clicking any links
- Use VPN when accessing banking apps on mobile data
- Keep phones locked and never unattended
Snethemba created a WhatsApp group where we share suspicious messages we receive. Last week, Njabulo posted a fake “Gauteng e-toll refund” SMS. Three of us had received the same message—none of us clicked.
The Bottom Line: Your Phone Security Is Your Financial Security
Two months ago, I lost R2,400 in 45 minutes because I ignored warning signs my iPhone 13 was compromised. My phone was draining battery, using excessive data, and showing strange behavior for three weeks before the theft.
I told myself it was iOS bugs, old apps, or network issues. I was wrong. It was a hacker systematically accessing my device, learning my patterns, and waiting for the right moment to strike.
That attack happened at Clearwater Mall, 500 meters from my home in Roodepoort, Gauteng province. It could have happened anywhere—at Checkers Allens Nek during my shift, at the gym, at soccer practice, or in my own flat.
Phone hacking isn’t a distant threat that happens to careless people. It’s happening right now to regular South Africans who work retail jobs, run side businesses, and use their smartphones for everything from banking to business communications.
Here’s what I learned:
Your phone contains your entire financial life. Banking apps, business records, client information, payment systems. If someone hacks your phone, they hack your income, your savings, and your livelihood.
The warning signs are always there. Battery drain. Data spikes. Strange apps. Unusual behavior. Most people ignore them until money disappears.
Don’t be most people.
Check your phone right now using the steps I’ve outlined. Look for the 12 warning signs. Run security scans. Delete suspicious apps. Change your passwords. Enable two-factor authentication.