What to do if…
your contacts list suddenly fills with unknown entries or random names
Short answer
Freeze contacts syncing and secure the account that controls your contacts (Apple Account/iCloud, Google, Microsoft, or a work account) before you delete anything.
Do not do these things
- Don’t bulk-delete contacts yet — you may erase your real contacts and remove the easiest recovery path.
- Don’t text/call the unknown entries — that can confirm your number is active or trigger spam.
- Don’t install “cleanup” or “contacts fixer” apps in a rush — some collect data or add more access.
- Don’t share verification codes or approve unexpected sign-in prompts.
What to do now
-
Pause syncing to stop further changes.
- Prefer turning off Contacts syncing for your main account rather than full Airplane Mode if you think you’ll need to receive sign-in codes or support calls right away.
-
Capture a backup/export immediately (before changing anything).
- Export contacts from the main account (vCard/CSV) if you can.
- Take screenshots showing a few examples of the unknown entries and when you noticed.
-
Check for account takeover indicators.
- Look for: sign-in alerts you don’t recognize, password reset emails you didn’t request, changes to recovery email/phone, unknown devices, or new apps connected to your account.
-
Secure the syncing account right away.
- Change the password (preferably from a trusted computer).
- Turn on two-factor authentication (or confirm it’s enabled).
- Sign out/remove unknown devices from the account’s device list.
- Review and revoke third-party app access that can read/manage contacts.
-
Check whether a work/school profile or directory is injecting contacts.
- If you recently added a work/school account, installed a device management profile, or enrolled in MDM, it may be pulling a directory into Contacts.
- If you’re unsure, stop and contact your IT/helpdesk before removing profiles you need for access.
-
Confirm where the bad data is coming from.
- Check your contacts on the provider’s web interface (iCloud / Google Contacts / Microsoft account pages, as applicable).
- If the random contacts appear there too, it’s likely account-side (not just your phone).
-
Recover/roll back safely once the account is secured.
- If you use iCloud, use the iCloud Data Recovery → Restore Contacts option (where available) to roll back to an earlier archived version.
- If you use Google Contacts, use Undo changes (available for changes within the past 30 days).
- Then delete any remaining unknown entries from the web contacts view so you’re cleaning the “source of truth,” not just one device.
-
If you were scammed, lost money, or your account was used for fraud, report it carefully.
- Report cyber-enabled crime to the FBI’s Internet Crime Complaint Center (IC3) using the official site (type it yourself and avoid lookalike links).
- If identity or account fraud is involved, use FTC consumer guidance to help you harden accounts and document what happened.
What can wait
- You don’t need to factory reset your phone right now.
- You don’t need to warn every contact immediately (unless you see messages being sent from your accounts).
- You don’t need to perfect your contact list today — the priority is stopping syncing damage and locking the account.
Important reassurance
This often happens after a sync/import event (adding an email account, work directory, or a new app) — and sometimes it’s an early sign of an account security problem. Securing the account first is the safest move and prevents irreversible deletion of your real contacts.
Scope note
These are first steps to stabilize and prevent further loss/exposure. If you confirm account compromise, you may also need to secure your email, review financial accounts, and consider broader identity protections — but those come after you stop the contact changes.
Important note
This guide is general information, not professional IT, legal, or security advice. If your device is managed by an employer or school, their policies and tools can change what you should remove and how recovery works.
Additional Resources
- https://www.ic3.gov/
- https://consumer.ftc.gov/articles/use-two-factor-authentication-protect-your-accounts
- https://consumer.ftc.gov/articles/protect-your-personal-information-hackers-and-scammers
- https://support.apple.com/en-us/102560
- https://support.apple.com/en-us/102508
- https://support.google.com/contacts/answer/7280886