Given how often we communicate via text, messaging apps and phone calls, you might not think twice about replying to a text from your bank, a delivery service, a job recruiter, or even an unknown number that sends a seemingly harmless “Hi! How’s everything going?” message. But hackers can do numerous things with just your cell phone number, so replying to these texts could get you tangled up with a scammer.

The Federal Trade Commission (FTC) found that phone calls and texts were the second and third most commonly reported contact methods for fraud in 2024. According to the 2024 Trucaller Insights U.S. Spam & Scam Report, Americans have collectively lost $25.4 billion to phone scams—and text scams are on the rise. “In today’s world, it is extremely easy for hackers to wreak havoc on your life using your cell phone number,” says Hari Ravichandran, founder and CEO of Aura, a family online safety company. So, how can you protect yourself from phone scams?

Read on for tips from Ravichandran—and five other experts in cybersecurity, tech, and privacy—on how to prevent phone number hacking, and what to do if your number has been compromised.

What hackers can do with just your cell phone number

How do hackers use cell phone numbers to scam you?

Scammers who know your cell phone number may use it to access your financial accounts, social media and personal information. After obtaining this info, they may then use it to blackmail, stalk, dox, or impersonate you, access your bank accounts or attempt to steal your identity.

“Last year, nearly half a million business and government imposter scams were reported to the FTC,” Ravichandran says. He notes that while these scams are shifting from phone calls to more sophisticated text and email tactics—often impersonating organizations like EZ-Pass, USPS, or Amazon—they continue to display the same pattern: a sense of urgency, threats, requests for personal information, and unverified sender details. 

Here are some common scammer tactics and a few things hackers can do with just your cell phone number. 

Spoofing

Scammers sometimes use a technique calledspoofingto make your phone number appear on a caller ID—even though it really isn’t you making the call. If they know your phone number, they could attempt to use this tactic to trick your loved ones into answering the phone. Once they’ve got your loved ones on the line, the scammer could pretend to be you (sometimes with a dramatic sob story) and ask for money. Or, the scammer may use the four-word phone scam to record your loved one’s voice saying “yes” in response to a simple question. The scammer may then use the recorded “yes” to authorize big purchases or to access accounts. 

One-ring phone scam

Scammers may call you from what appears to be a U.S. area code, but then hang up after one ring; this is to try to trick you into calling them back. If you call them back they can then use the tactics mentioned above—to impersonate a loved one and ask you for money or to elicit a “yes” from you that they can record. 

SIM swapping

Here’s how the SIM swapping tactic works: A scammer gathers enough info about you to correctly answer security questions that convince your mobile service provider it’s you. Then, the scammer asks the mobile service provider to port your phone number to their SIM card. With your calls and texts now routed to their phone, they can request password reset links for your email, social media and financial accounts, then change your passwords and gain control.

Text scams

Scammers can also use your phone number to send you malicious text messages that appear to be someone wanting to help or notify you of problems with your accounts. Ray Walsh, a digital privacy expert at Comparitech, says this type of scam is called “smishing.”

These texts often appear to be from someone you’d trust. The scammer may pretend to be your bank, the IRS, your doctor, a job recruiter, a debt collector, or even someone who seems like a long-lost friend. (This is where those seemingly innocent “Hi! How’s everything going texts?” come in.) 

The texts may be some version of the following messages:

  • We’ve noticed suspicious activity or log-in attempts.
  • There is a problem with your account.
  • You need to make a payment.
  • You’re eligible for a refund.
  • You’ve won a prize. Here’s how to claim it.

These texts are often accompanied by a link or request to submit personal info (which the scammer can then use to hack your accounts). In addition, a consumer safety and cybersecurity expert and the founder of SecureLabs, Paige Hanson, warns that sometimes the links—if clicked—can infect your phone with malware. 

Verification code scams

Personal accounts, including financial, social media and email, often require verification by text or phone call, especially if you’re making any changes such as a password reset. This is a security step intended to protect your accounts. But if you unknowingly share verification codes with a scammer, they will easily be able to access your money and additional personal information. You shouldn’t share your verification codes with anyone. And you can assume anyone who asks for the code is up to no good!

Scammers often target people selling on Facebook Marketplace or Craigslist. Beware of any buyer who tells you they need your cell phone number to verify your identity. If you share your number with them, they can prompt Google to send you a verification code. Then, they’ll ask you to provide them with that code to “confirm your identity.” When you give them the verification code, they can use it to complete the setup of a Google Voice number—linked to your phone number. The scammer can use the Google Voice number to conceal their identity and scam other people or to open new accounts in your name.

Mining your private data

Some scam tactics are frighteningly simple. In a matter of seconds, someone can type your phone number into a people search site like WhoEasy, Whitepages or Fast People Search and find personal information about you, says Burton Kelso, a cybersecurity and artificial intelligence expert. That info on display could include your home address, the names and addresses of your family members and sensitive info such as criminal records and bankruptcies. A hacker or scammer may use what they find to steal your identity, hack your social media, or blackmail, stalk, or dox you.

How to protect your phone number from hackers 

Now that you know the things hackers can do with just your cell phone number, you’re likely wondering how to stop hackers from using your number. Read on for some expert advice. 

  • Learn about cybersecurity for mobile users. Read up on security and privacy apps for your mobile phone.
  • Vary your passwords. Hackers will try to access your other accounts. Don’t make it easy for them. “Do not use the same usernames and passwords across several websites,” Hanson says. “Make your passwords long, complicated, and difficult to guess.”
  • Enable two-factor authentication (2FA). Setting up 2FA makes it more difficult for hackers to access your accounts even if your number is compromised.
  • Don’t share verification codes. Doing so is like handing scammers the keys to your accounts.  
  • Don’t click links or reply to suspicious texts. “If you ever get an unsolicited SMS [text] from a contact you don’t recognize (or even from your own number), you should treat it like a suspicious email asking you for money,” says Ryan Toohil, chief technology officer of Aura. Don’t supply personal info or click links. 
  • Verify the sender. If you receive a suspicious message but think it could be from a friend or colleague, “reach out to them to confirm via another means—whether that be calling their phone, Slacking them, emailing them, etc,” Toohil says. 
  • Block suspicious numbers. Any time you receive suspicious texts from unknown senders, block them so they can’t send you more messages.
  • Monitor your accounts. Review your credit card bills, bank statements and phone bills. If something doesn’t add up, report it immediately.
  • Leave your phone number out of online forums. One of Hanson’s top phone number privacy tips? Leave it offline. “Do not publish your phone number on your public profile on social media [or other online forums].”
  • Be quiet about cryptocurrency. “Cryptocurrency is one of the most sought-after forms of currency in this type of crime,” Hanson says. She suggests being discreet about discussing cryptocurrency online to avoid attracting scammers’ attention.
  • Masking. You can press *67 before dialing out to temporarily hide your number. You can also use apps like DialPad to mask calls and texts. Or sign up for an alternate phone number through an app like TextNow or Burner so you don’t have to share your personal phone number everywhere.

It can feel overwhelming to learn about all of the things hackers can do with just your cell phone number. But, ultimately, Ravichandran says, “The advice remains simple—don’t respond, avoid clicking links, and block the sender. If you’re really unsure [whether the call or text was legit], contact the organization directly using a trusted phone number from their official website.”

How can you tell if your phone or phone number has been hacked?

You may not know right away that your phone or phone number has been hacked. Here are some things to look out for.

  • Account lock-out. Unable to sign into your Apple, email, social media or bank accounts? If so, this is an indication that your phone or phone number may have been compromised.
  • Unauthorized charges. Unusual or unexpected charges on your bank or credit card accounts are a sure sign someone has gained access.
  • No signal. If your phone goes from fully operational to suddenly displaying “no signal” or “emergency calls only” (and you’ve not changed locations to a place without service), try to restart it. If it still shows no signal after restarting, Hanson suggests using another phone to call your provider and have them check the status immediately.
  • Performance or battery issues. Red flags also include an abnormally hot device, the phone operating slower than usual, the battery draining quickly and/or apps frequently crashing.
  • Increased data usage and pop-ups. Spyware and malware can cause an uptick in notifications and data usage.
  • Verification codes. If someone attempts to access your accounts, you’ll likely receive verification codes you didn’t request.
  • It’s a little too quiet. On the other hand, if you stop receiving notifications, calls and texts, you may be the victim of SIM swapping.

What to do if a hacker has your number

photo illustration of a smartphone ripped apart by a glitch effectJorg Greuel/Getty Images

Now that you understand how to tell if hackers are using your phone number, you’ll want to know how to keep your phone number from being further compromised. Here is what you should do.

  • Contact your cell service provider. Even if your phone appears to be working, scammers may access your accounts using other personal info they gathered about you. If you suspect your number has been compromised, contact your service provider immediately and report the situation. If need be, ask them to put a temporary freeze on your line so that scammers can’t use your number.
  • Monitor your accounts. Contact your bank and credit card companies to report the situation and determine the next steps. Put a temporary freeze on your accounts, change your passwords and keep an eye on all online accounts for any suspicious activity. 
  • Remove access. Uninstall phone apps you don’t recognize. If you have Apple or Google accounts, check to see if any new devices have been linked, and then remove them. 
  • Reach out to your personal network. Contact people you know to warn them that your phone may have been compromised.
  • Report the scam. Submit complaints to the FTC, the Federal Communications Commission and the Better Business Bureau.
  • Document everything. To protect yourself from being held responsible for any potential crimes committed using your number, document all steps you’ve taken and everyone you’ve contacted, and keep track of the dates.
  • Update your info. If you need to change your number, update your contact information on all relevant accounts (your bank, your kids’ school, etc.) to protect more of your information from being compromised.

Additional reporting by Alina Bradford.

About the experts

  • Hari Ravichandran is the founder and CEO of Aura, a family online safety company, and the author of Intelligent Safety: How to Protect Your Connected Family from Big Cybercrime. After dealing with the damage hackers caused him and his family in 2014, Ravichandran set out to help others. He’s since been named EY’s Entrepreneur of the Year for New England and a Forbes most powerful CEO under 40. He also speaks on cybersecurity at major conferences like SXSW and Collision, and is named on over 40 approved or pending technology patents.
  • Ryan Toohil leads the platform, information security, and corporate IT teams as the chief technology officer (CTO) of Aura. His experience includes engineering, project management and technical support. Toohil holds multiple web services patents. 
  • Burton Kelso is an expert on cybersecurity and artificial intelligence (AI), and is the owner and chief technology expert at Integral, a computer repair and IT support services provider. He is an on-air guest TV tech expert and cybersecurity and AI speaker who delivers in-person and virtual presentations and workshops in addition to two TEDx talks.
  • Ray Walsh is a digital privacy expert, reviewer and writer at Comparitech. He previously worked as a researcher, spokesperson and writer at ProPrivacy, where he published tech reviews about privacy-related products and services and wrote content and opinion pieces about digital privacy, cybersecurity, hacking and more. 
  • Paige Hanson is the cofounder of cybersecurity company SecureLabs. She is a certified identity theft risk management specialist and the former chief of cyber safety education at NortonLifeLock. Hanson speaks and moderates talks on security-related topics including digital safety, identity and cyber threats.

Why trust us

Reader’s Digest has published hundreds of articles on personal technology, arming readers with the knowledge to protect themselves against cybersecurity threats and internet scams as well as revealing the best tips, tricks and shortcuts for computers, cellphones, apps, texting, social media and more. For this piece on tech tips, Rachel Weingarten tapped her experience as longtime journalists and tech reporter. We rely on credentialed experts with personal experience and know-how as well as primary sources including tech companies, professional organizations and academic institutions. We verify all facts and data and revisit them over time to ensure they remain accurate and up to date. Read more about our team, our contributors and our editorial policies.

Sources: