PanicStation.org
us Technology & digital loss phone stolen • stolen cell phone • someone stole my phone • lost phone might be stolen • worried about account access • account takeover risk • email account compromised • banking app on stolen phone • apple account stolen phone • google account stolen phone • two factor at risk • sms codes intercepted • sim swap concern • carrier port out risk • passcode compromised • find my iphone lock • find hub android lock • remote erase phone • sign out of all devices • remove trusted device • mobile wallet compromised

What to do if…
your phone is stolen and you are worried someone can access your accounts

Short answer

Lock (or erase) the phone remotely, then secure your email and your mobile number with your carrier — those two usually control access to your other accounts.

Do not do these things

  • Don’t try to confront or track down the thief in person.
  • Don’t click “we found your phone” links or sign in from unsolicited texts/emails — scams after theft are common.
  • Don’t assume biometrics alone protect you if the passcode is known or lock-screen notifications reveal codes.
  • Don’t sign into key accounts on a public/shared computer unless you can do it privately and log out completely after.

What to do now

  1. Lock the phone immediately (or erase it) from another device.

    • iPhone: use Find My (Lost Mode) and erase if appropriate.
    • Android: use Find Hub (formerly “Find My Device”) to secure/lock, and erase if needed.
    • If you see a location that feels unsafe, don’t go there — focus on locking the device.
  2. Call your wireless carrier and suspend service / block the SIM/eSIM.

    • Tell them the phone was stolen and you’re concerned about account access.
    • Ask about port-out/SIM-swap protections and make sure your carrier account has a strong PIN/passphrase.
  3. Secure your email first, then your Apple/Google account.

    • Change your email password from a safe device.
    • Use the email account’s security page to review devices/sessions and “sign out of other devices”.
    • Then change your Apple/Google password and remove the stolen phone from trusted devices if possible.
  4. Cut off the stolen phone’s access to your most sensitive accounts.

    • Banking and card apps: call issuers and ask them to review activity and disable/limit mobile access tied to the stolen device if needed.
    • Social, shopping, messaging: use “log out of all devices” where available and change passwords for anything that can reset other accounts.
  5. Protect mobile payments tied to the phone.

    • If you used Apple Pay / Google Pay, contact your card issuers and ask them to suspend wallet tokens for that device and monitor for fraud.
  6. File a police report (often needed for carriers/insurance).

    • Use your local police department’s reporting option (online if available) for a theft report.
    • Keep the report number and basic device details (model/serial/IMEI if you have it).
  7. If you see identity theft (not just a stolen phone), use the federal identity theft route.

    • If someone opened new accounts, changed details, or you’re seeing broader fraud, report it through IdentityTheft.gov and follow the site’s personalized checklist.
  8. Do a 2-minute “damage snapshot” now.

    • Time/location, which critical apps were signed in (email, banking, password manager, authenticator), and any login alerts.
    • This helps you be consistent across your carrier, bank, and account recovery steps.

What can wait

  • Buying a replacement device and restoring backups.
  • A full audit of every account — start with email, Apple/Google, carrier/SIM, and banking.
  • Long-term changes (new number, new password manager setup) once immediate access risk is under control.

Important reassurance

A stolen phone can feel like your whole life is exposed, but most real-world risk drops quickly once the device is locked/erased, your SIM is blocked, and your email is secured.

Scope note

This is a first-response checklist to prevent irreversible damage and buy time. If you discover fraud, you may need follow-up steps with banks, carriers, and identity theft resources.

Important note

This is general information, not legal or financial advice. Steps vary by device, carrier, and account provider. If money is at immediate risk or you see unauthorized logins, prioritize contacting your bank/card issuers and your wireless carrier first.

Additional Resources
Support us