In this article:
In this article:
Scammers can do more damage than you think with a stolen phone. Here’s what to do if your phone is stolen to protect your identity and more from fraudsters.
In this article:
In this article:
When Gaetano DiNardi lost his phone during a trip to Mexico, he thought the worst-case scenario was that he'd have to buy a new device. Instead, he lost over $10,000 when scammers broke into his online accounts and stole his identity [*].
According to the Federal Communications Commission (FCC) [*]:
1 in 10 American smartphone owners are victims of phone theft — with 68% unable to recover their lost or stolen device.
The cost of your phone getting lost or stolen can amount to more than a replacement device. In some cases, it can cost you your identity.
Every day you add more personal information to your phone — from banking app logins and passwords to sensitive data, information, and photographs. Scammers know that your phone contains everything they need to steal your identity, empty your bank accounts, or worse.
If you think (or know) that your phone has been stolen, don’t wait any longer. Here’s exactly what you need to do now to protect yourself (and possibly even get your phone back).
{{show-toc}}
The moment you can’t find your phone, you should assume the worst.
Phone thieves often go straight for your personal information after stealing your phone. They’ll try to access banking and investment apps, social media and email accounts, photos, and passwords.
They’ll change your passwords and lock you out of your email accounts so that you can’t get back in, while they run their schemes.
But what about phone locks?
Professional thieves know the exact moment to strike — such as when you’re walking down the street checking Google Maps for directions, and your phone is unlocked. Even if you have a phone passcode and enabled biometric security (like fingerprint ID), hackers can still gain access to your device.
With your phone, thieves can:
The list is endless. And we’re not even talking about the fact that you’ll need to spend hundreds or even thousands on buying a new phone.
💡 Related: What Is the Google Voice Verification Code Scam? →
The moment you discover that your phone is missing, there are two scenarios to consider:
Let’s start with the best-case scenario and review what you should do if your phone is lost.
The best-case scenario is that your phone is lost and secured with a password or biometrics, and your SIM is protected with a PIN. Luckily, you’re actually two times more likely to lose your phone than to have it stolen [*].
Here’s what to do if your phone is lost:
You don’t want to confront thieves if they are on the run. If your phone is just lost, it’s likely in a location where you’ve recently been, and not in motion.
If you can’t find your phone using the “Find My” feature, or if you’re sure it was stolen, don’t try to get it back. Instead, follow these steps to secure your personal information and stop scammers from emptying your bank account.
Ideally, your phone will be secured by a unique passcode (i.e., not your birthday) and biometric security such as fingerprint ID or facial recognition. But even with these security measures in place, scammers can access your device.
Locking your phone will prevent anyone from using it without your account ID and password. This is the first thing you need to do to protect yourself against identity theft and fraud.
How to remotely lock your iPhone:
Apple lets you lock your iPhone remotely so that people cannot access your personal information.
Using a different device (such as an iPad, Mac desktop, or laptop), log into your iCloud account using your Apple ID and then enable the Find My iPhone feature. This will automatically turn on Apple’s Activation Lock feature and stop scammers from accessing your phone.
You can also turn on “Lost Mode” to track your phone’s location and display a custom message on your screen (with your contact details).
Note: You need to have enabled the “Find My” feature before losing your phone in order for this to work.
How to remotely lock your Android phone:
To lock your Android device, use a different device to log into your Google account and enable the Find My Device feature. Once logged in, select “Secure Device” and then set a new lock screen password.
You can even remotely erase your device from the “Find My Device” screen. However, you should wait to follow some of the next steps before erasing all of your device’s data.
Watch now: How to use Android’s “Find My Device” feature ↓
If you’re logged into your Google account on your laptop or another device, you can also Google “Find my phone” to see your phone’s last location. Again, you’ll need to have the “Find My Device” feature enabled before your phone is stolen in order for these steps to work.
Not using an iPhone or Android phone? Here’s how to find and lock a stolen Windows phone.
💡 Related: Can iPhones Get Hacked? How To Tell & What To Do →
You may have a PIN, password, or pattern to protect your phone — but even those can be hacked. Despite any remote locking or data wiping, there is a possibility that the thief has or had access to your phone for a short time.
No matter what, you should consider any account or app on your phone as potentially compromised, and change your passwords immediately.
Account passwords you should change:
Do you auto-save passwords?
If you’ve made the mistake of auto-saving passwords in Google Chrome or Safari, all of your accounts and even your credit card numbers could be at risk.
Make sure to update all of your passwords with new, unique, and secure passwords. This means choosing passwords that are at least eight characters long and include a combination of letters, symbols, and numbers.
For added security, enable two-factor authentication) on all your accounts. 2FA is an additional security measure that requires a special one-time-use code, along with your password, to access an account.
But it’s critical that you don’t use SMS for receiving your 2FA codes (your phone is stolen, after all). Instead, use an authenticator app like Authy or Google Authenticator.
Criminals can rack up text, call, and data charges with your stolen phone. Even worse, they could start to run smishing scams on your friends and family using your phone number.
Contact your phone service provider, and tell them that your SIM has been lost or stolen and you want to block it. This stops scammers from using your phone.
The following providers offer phone support:
If you use AT&T, you can sign into your account and report the phone stolen online. Here’s how:
If you can't remotely lock or erase your phone, your wireless provider might be able to help. If you call them, it is possible to have your provider deactivate your phone and wipe your data.
💡 Related: What Can Scammers Do With Your SIM Card? →
Thieves can use Apple Pay or Google Pay to make fraudulent purchases. Contact your bank and ask them to cancel the credit cards that were linked to your stolen phone. You can also ask to speak to their fraud department and dispute any recent fraudulent activity.
Yes, this step is annoying. But it’s more than worth it to help ensure that you don’t become a victim of fraud.
In the weeks and months following the phone theft, you should monitor your account statements closely for any unrecognized charges. You never know what accounts a scammer has access to, even after you have recovered your phone and data.
💡 Related: Did Someone Open a Cell Phone Account In Your Name? Do This! →
Scammers can use your phone number to impersonate you and harass your friends and family with phone or text message scams.
For example, scammers could hack your Venmo account and request money from your family. Or, they could send text messages asking for sensitive information that they can then use for further identity theft and fraud.
Once they have access to your phone number, hackers can send seemingly harmless messages to your friends or family members asking them to click on links to fake websites. The sites may appear legitimate, but they are not. The information that your contacts provide, such as passwords, addresses, or credit card numbers, will go to the scammers.
💡 Related: How To Tell if Someone Is Scamming You Online (Real Examples) →
If your phone is stolen, do not confront the thieves. Sometimes these cases can become dangerous very quickly, like when a 23-year old man from Alabama was shot and killed after tracking his phone and trying to retrieve it from thieves [*].
Instead, file a police report for the missing device. You can either contact your local law enforcement’s non-emergency line (not 911) or file a police report online. Try to provide as much information as possible, including:
Some providers require proof that your mobile phone was stolen in order to process claims with your phone insurance carrier. A police report helps provide that documentation.
When your phone is stolen, you should consider it gone. Make sure to erase your device’s data to stop thieves from finding sensitive information or photos.
On Android and iOS, you can wipe your phone’s data remotely by using the “Find My” app. Follow the prompt for locking your phone, but then choose the “erase phone” option.
Note: This action performs a factory reset on your phone and will delete all apps, photos, music, and settings. If your phone is offline, the reset will happen once your phone is connected to a cellular or Wi-Fi connection.
If thieves gained access to your private information before you could lock and erase your phone, they could perform different types of financial fraud. For example, they could:
The best way to protect yourself is to lock or freeze your credit.
Both a credit lock and a credit freeze stop credit bureaus from opening new accounts in your name. If your financial information has been compromised, this is one of the only ways to ensure a criminal can’t rack up debts and leave you with the bill.
A stolen phone can leave you on the hook for hundreds of dollars. If your phone is stolen, call your insurance provider to try and get money back to cover or replace your lost device.
There are typically two ways that people obtain phone insurance:
Once your insurance claim has been approved (and you know there’s no chance of getting your phone back), you should remove the phone from your account. This is the final step in severing your stolen phone from your sensitive personal information.
Here’s how to remove your device from both Google and Apple accounts:
To remove a device from your Google account:
To remove a device from your Apple iCloud account:
💡 Related: How Can Someone Track Your Location? (And How To Stop Them) →
Even if your phone has been erased and removed from your account, you can’t be sure that criminals don’t have your personal information.
Your phone could have images stored of your passport or driver’s license — or even documents that contain your Social Security number (SSN), account passwords, and credit card numbers. If criminals have access to any of these, they could steal your identity over and over again.
Aura’s all-in-one digital security solution helps keep your identity and finances safe from scammers.
With Aura, you get:
After dealing with the fallout from a stolen phone, the last thing you want is to put yourself at risk again. Here’s how to secure your new phone against scammers and hackers:
Realizing your phone is missing might merely seem frustrating — until you realize what it could lead to. The reality is that a stolen phone can lead to identity theft, fraud, and worse.
If your phone is stolen, you should try to get it back in the safest way possible. However, your first priority should be to secure your identity. Remotely lock and erase your phone, and monitor your bank and online accounts for signs of fraud.
And for the best protection, consider signing up for Aura’s all-in-one digital security and identity theft solution.
Editorial note: Our articles provide educational information for you to increase awareness about digital safety. Aura’s services may not provide the exact features we write about, nor may cover or protect against every type of crime, fraud, or threat discussed in our articles. Please review our Terms during enrollment or setup for more information. Remember that no one can prevent all identity theft or cybercrime.