Introduction
Let’s get straight to business. Mobile hacking is not rare anymore, it’s actually quite common now. Many times, hackers don’t even need advanced techniques. They just take advantage when we unknowingly give apps too many permissions. The good part is, you can quickly check your phone in just 5 minutes using Termux and a few simple commands even if your phone is not rooted. This is not a deep technical investigation. It’s just a quick check to spot any obvious warning signs. If you find something suspicious, you can take action. If everything looks fine, you still get peace of mind and a more secure phone.
What You’ll Need
- An Android phone (non-rooted is fine)
- Internet connection
- Install Termux from Play Store
Why Termux? It gives you a controlled Linux-like environment to inspect processes, network connections, and packages without modifying the device.
Step 1: Install & Initialize
Open Termux and run:
pkg update -y && pkg upgrade -y pkg install procps net-tools lsof -y
These commands will:
- Updates package indexes
- Installs utilities to list processes (ps), network (netstat), and open files (lsof)
Step 2: Scan Running Processes
ps -A
By running this command we will list:
- Unknown services running persistently
- Suspicious naming patterns (e.g., update_service, system_monitor, daemonX)
- Processes you don’t associate with installed apps
run these commands:
ps -A | grep -i monitor ps -A | grep -i track ps -A | grep -i spy
Meaning of commands:
- One odd process isn’t proof of compromise
- Multiple unknown background processes = risk signal
Step 3: Inspect Active Network Connections
netstat -tulnp
list all connections to the Command and Control server:
- Persistent outbound connections to unknown IPs
- Listening ports you didn’t expect
- Suspicious ports: 4444, 5555, 6666 (commonly abused in testing/malware scenarios)
Red flags:
- Connection remains active even when phone is idle
- Unknown process tied to a remote endpoint
Why this matters: Most spyware needs to exfiltrate data. Network activity is the choke point.
Step 4: Check Open Files & Device Access
lsof
This will list application using your:
- Camera
- Microphone
- Storage logs
Indicators:
- Unexpected process touching /dev/video or audio interfaces
- Continuous file access patterns
If something is recording or scraping, it shows up here at least at user level.
Step 5: Review Installed Packages
pm list packages
This will tell:
- Apps you don’t recognize
- System-looking names that aren’t real system apps (e.g., com.android.service.update, com.system.core.patch)
Next step (manual):
Go to Settings → Apps → Installed Apps and cross-check.
Pro tip: Malware often hides behind generic or technical names.
Step 6: Permission Abuse Check (Critical)
Run:
dumpsys package | grep permission
Then manually verify:
- High-risk permissions
- Accessibility Service (biggest red flag)
- SMS access
- Microphone + Camera
- “Display over other apps”
Where to check manually:
- Settings → Accessibility
- Settings → Privacy → Permission Manager
- Settings → Apps → Special App Access
If a random app has Accessibility access, treat it as a potential compromise.
If You Suspect Your Phone Is Hacked (Do This Immediately)
- Turn on Airplane mode
- Disconnect from Wi-Fi
- Eliminate obvious threats
- Remove unknown apps
- Disable suspicious permissions
- Validate environment
- Boot into Safe Mode
- Re-check behavior
- Reset (Most Effective)
- Backup essentials (photos, contacts only)
- Perform factory reset
- Harden after reset
Finally
Mobile threats often work because we don’t really see what’s happening inside our phones. This quick check helps you understand what’s going on, so you can make better decisions. Try doing this check from time to time. If you notice anything unusual, take it seriously. And if something doesn’t feel right, don’t try to fix everything manually just reset your phone and start fresh.

Cyber Security Researcher. Information security specialist, currently working as risk infrastructure specialist & investigator. He is a cyber-security researcher with over 25 years of experience. He has served with the Intelligence Agency as a Senior Intelligence Officer. He has also worked with Google and Citrix in development of cyber security solutions. He has aided the government and many federal agencies in thwarting many cyber crimes. He has been writing for us in his free time since last 5 years.











