Can Apple tell me if my iPhone is hacked?
If Apple detects evidence of a state-sponsored attack, the targeted user will get a Threat Notification on the top of the page when signed into appleid.apple.com. Apple will also send an email and iMessage notification to the account associated with the user's Apple ID.
Welcome to the Apple Support Communities. Yes, this is a phishing attempt: Recognize and avoid phishing messages, phony support calls, and other scams - Apple Support. Ignore it!
Mysterious apps, calls, or texts appear
A potential telltale sign that your phone has been hacked is the appearance of new apps that you didn't download, along with spikes in data usage that you can't account for. Likewise, if you see calls in your phone bill that you didn't make, that's a warning as well.
While the message might seem convincing, it's merely a scam that's designed to swindle money from unsuspecting users, steal personal data, and spread malware. It's important to mention that Apple doesn't send security warnings and this alert is fake.
Reset your phone
The majority of malware can be removed with a factory reset of your phone. This will, however, wipe any data stored on your device, such as photos, notes, and contacts, so it's important to back up this data before resetting your device. Follow the instructions below to reset your iPhone or Android.
Use the phone's built-in antivirus to remove any offending apps. Some Android manufacturers pre-install security apps that will allow you to remove any hacking apps from your device without the need to install anything else.
Your phone loses charge quickly. Your phone is running slower than usual. You notice strange activity on your online accounts, like unfamiliar logins, new account signups, or password reset emails. You see unfamiliar calls or texts.
The affected devices include the iPhone 6S and later models; 5th generation iPads and later, all iPad Pro models and the iPad Air 2. The flaw also affects Apple's Mac computers running MacOS Monterey and some iPod models.
Sign in to the Apple ID website (https://appleid.apple.com) and review all the personal and security information in your account to see if there is any information that someone else has added. If you have two-factor authentication turned on, review trusted devices for any devices that you don't recognize.
Hackers can use keyloggers and other tracking software to capture your phone's keystrokes and record what you type, such as search entries, login credentials, passwords, credit card details, and other sensitive information.
How does your phone act when its hacked?
“The most common signs of a device being compromised are that the battery gets drained faster than usual, you experience spikes in your internet data usage although your browsing habits haven't changed, your GPS feature or internet (either Wi-Fi or mobile data) can be enabled or disabled by itself, and random ad pop- ...
- Unusual sounds during calls. ...
- Decreased battery capacity. ...
- Phone shows activity when not in use. ...
- Phone takes a long time to shut down. ...
- Battery temperature feels warm. ...
- Receiving unusual texts. ...
- Increased data usage. ...
- Android.

An easier way to check if you're being tracked is to browse your device's application list. If there's any suspicious app installed on your device, there's a good chance that it's being used to monitor your activities.
- Go to Settings > Privacy & Security > Tracking. The list shows the apps that requested permission to track you. ...
- To stop all apps from asking permission to track you, turn off Allow Apps to Request to Track (at the top of the screen).