PanicStation.org
uk Technology & digital loss phone stolen • stolen mobile • lost phone but stolen • someone has my phone • worried about account access • accounts compromised • email account at risk • banking app on stolen phone • apple account at risk • google account at risk • two factor codes exposed • sms codes intercepted • sim swap risk • stolen phone passcode known • find my iphone stolen • find hub stolen phone • remote lock phone • remote erase phone • logged in sessions • remove trusted device • mobile wallet on stolen phone

What to do if…
your phone is stolen and you are worried someone can access your accounts

Short answer

Lock the phone remotely (or erase it), then secure your email and mobile number (SIM/eSIM) immediately — those two usually control access to everything else.

Do not do these things

  • Don’t chase the thief or arrange meet-ups to “get it back”.
  • Don’t keep calling/texting if it reveals your name, workplace, or address.
  • Don’t click “your phone was found” links in texts/emails — scams after theft are common.
  • Don’t assume Face ID/fingerprint alone protects you if your passcode is known or notifications show codes.
  • Don’t sign into key accounts on a shared/public computer unless you can do it privately and log out completely after.

What to do now

  1. Lock the phone immediately (or erase it) from another device.

    • iPhone/iPad: use Find My / Find Devices on iCloud to turn on Lost Mode (and erase if appropriate).
    • Android: use Find Hub (formerly “Find My Device”) to secure/lock the phone (and erase if needed).
    • If location shows somewhere unsafe, don’t go there — just secure the device.
  2. Call your mobile network provider and ask them to bar the SIM/eSIM right now.

    • Say: “My phone was stolen and I’m worried about account access.”
    • Ask them to bar the SIM, and add/confirm extra account security (for example an account PIN/passphrase) to reduce SIM-swap/number-port risk.
  3. Get your IMEI number and write it down.

    • Your network/provider can usually provide the IMEI.
    • Keep it with the theft details — police and insurers often ask for it.
  4. Secure your email account first (then your Apple/Google account).

    • Change the email password from a safe device.
    • In email security settings, look for devices/sessions and “sign out of other devices”.
    • Then change your Apple Account or Google Account password and remove the stolen phone from trusted devices if possible.
  5. Stop the stolen phone being used as a login “key”.

    • Review account security settings for trusted devices, passkeys/security keys, and 2-step verification methods.
    • If your authenticator app or passkeys were on the stolen phone, treat that as sensitive: remove the device/method and re-add on a safe device where your provider supports it.
  6. Protect money first if there’s any chance of access.

    • Call your bank(s)/card issuers and ask them to review activity and disable mobile app access tied to that device if needed.
    • If you used Apple Pay / Google Pay, ask card issuers to suspend wallet tokens for that device and monitor for fraud.
  7. Report the theft and get a crime reference number.

    • Contact your local police (often by calling 101 or in person; online reporting may also be available depending on area).
    • Provide the IMEI if you have it and keep the crime reference number for insurance.
    • If you’re also dealing with fraud/cybercrime: in England, Wales or Northern Ireland, report via Report Fraud; in Scotland, report via Police Scotland (101).
  8. Do a 2-minute “damage snapshot” now.

    • Time/location of theft, which critical apps were signed in (email, banking, password manager, authenticator), and any unusual login alerts you’ve received.
    • This makes calls and recoveries faster and reduces mistakes when you’re stressed.

What can wait

  • Replacing the handset and restoring photos/apps.
  • Insurance decisions/claims (once your accounts and SIM are secured).
  • Auditing every single app — focus first on email, Apple/Google, banking, and anything that can reset other passwords.

Important reassurance

Feeling exposed and panicky after a phone theft is normal. Once the phone is locked/erased, the SIM is barred, and email is secured, the most common takeover routes are usually cut off.

Scope note

This is first steps only — to reduce immediate harm and prevent account takeover. If you discover confirmed fraud, you may need follow-up steps with banks and account providers.

Important note

This is general information, not legal or financial advice. Exact steps vary by device, network, and account provider. If you see unauthorized transactions or active account access, prioritise contacting your bank/card issuer and your mobile provider first.

Additional Resources
Support us