• Can someone mirror your phone without you knowing?
  • How to tell if someone is mirroring your phone
  • How someone can mirror your phone
  • Risks of phone mirroring
  • How to stop someone from mirroring your phone
  • Can you fully prevent phone mirroring?
  • How to prevent unwanted phone mirroring
  • FAQ: Common questions about phone mirroring
  • Can someone mirror your phone without you knowing?
  • How to tell if someone is mirroring your phone
  • How someone can mirror your phone
  • Risks of phone mirroring
  • How to stop someone from mirroring your phone
  • Can you fully prevent phone mirroring?
  • How to prevent unwanted phone mirroring
  • FAQ: Common questions about phone mirroring

How to stop someone from mirroring your phone

Tips & tricks 04.09.2025 23 mins
Michael Pedley
Written by Michael Pedley
Ata Hakçıl
Reviewed by Ata Hakçıl
William Stupp
Edited by William Stupp
How to stop someone from mirroring your phone

Phone mirroring technology is very useful, but it’s also potentially dangerous. The ability to project photos or videos on a larger screen, like a TV, has obvious applications at home and at work. But in the wrong hands, that same technology can be harmful.

Imagine, for example, if a complete stranger were to remotely view your phone’s screen, tracking your every action. It’s a terrifying form of cyberattack.

Fortunately, most forms of this attack are very rare due to the sophisticated nature of the tools required. Most people simply aren’t at risk. Still, it’s worthwhile to learn about the threat posed by phone mirroring and the steps you can take to stay safe.

Can someone mirror your phone without you knowing?

Yes, resourceful cybercriminals have ways to mirror a victim’s phone without their knowledge. Once the device is mirrored, the attacker can spy on the victim’s screen, tracking their every action.

What is phone mirroring?

Screen mirroring is when a mobile device’s display is transmitted to another device, like a TV, computer monitor, or projector. This can work in two basic ways: casting and true mirroring.

Casting (called Screen Mirroring on iOS devices) is a native, easily accessible feature on most phones. It only displays specific media from your phone onto the second device. For example, you could cast a YouTube video to your TV while texting friends on your phone. Only the video will be displayed on the TV.

With mirroring, the exact same content you see on your phone at a given moment will be displayed on the second device. So if you left the YouTube app to send a text, your messaging app would also be visible on the TV.

Methods used to mirror a phone remotely

An overview of how phone mirroring attacks can be executed.With the right combination of tools, access, and knowledge, a cybercriminal can mirror a victim’s phone fairly seamlessly. An attacker needs to make use of at least one of the following:

  • Spyware or malware: One of the most common ways criminals obtain remote screen mirroring is via malicious software. Using fake app listings, bogus QR codes, or some other method, these apps are installed on a victim’s phone. From there, they can begin the process of gaining access to the phone’s screen.
  • Phishing attacks: Malicious hackers are constantly sending out phishing emails containing malicious links. Clicking one of these won’t immediately grant a hacker the ability to mirror your phone, but it could be the first step in a complex attack.
  • Vulnerabilities and exploits: Even the best operating systems have weaknesses in their code. Criminals can exploit these to mirror your phone. That said, this type of attack is extremely difficult and usually very expensive to pull off, so most people aren’t likely to ever be targeted.
  • Physical device access: If a criminal somehow gains physical access to your phone, they can install malware or make changes in the settings to grant themselves remote access to screen activity. If you don’t know what changes to look for, you might not know your screen is now being mirrored.

How to tell if someone is mirroring your phone

A list of common signs to watch for when your device is being mirrored.Being able to spot the signs of unsolicited phone mirroring is essential if you want to prevent this kind of invasive attack. You won’t always be able to tell, but there are usually some signs to look out for.

Unusual battery drain and overheating

Mirroring uses a lot of your phone’s computing power and resources. As a result, both casting and mirroring will cause the battery to drain more quickly than normal. For the same reasons, the phone is likely to get hot as its chipset works to maintain the mirroring connection.

If your phone is getting hot or rapidly losing battery even though you aren’t using demanding apps or processes, it may be mirroring without your knowledge. Note, however, that there are other possible explanations for this, such as background apps using up your resources, an old battery, or other hardware issues.

Strange apps or admin permissions

Cybercriminals can use various methods to get apps onto your device that can remotely mirror its screen. You may be able to notice them if you regularly scroll through the list of installed apps on your device.

Some apps may appear normal but ask you for an excessive amount of admin permissions, such as the ability to mirror your screen, access your camera, and so on. Be suspicious of apps that need to make use of Accessibility Service, Media Projection, or administrator privileges.

Always be wary of apps that ask for lots of permissions without any logical reason, especially when they come from unofficial libraries.

Duplicate screen activity

If your device is being mirrored, you may notice some unusual behavior on the screen. It might light up randomly or without you interacting with it, which could indicate that a cybercriminal is interacting with your device in some way.

If a malicious actor has simply enabled your phone’s built-in mirroring tools, you should be able to see a notification in your phone’s top bar indicating this. On Android, this will usually say “Link to Windows” or “Casting,” while iOS users should look for anything mentioning mirroring or “Phone Link.”

In extremely rare cases, dedicated attackers can exploit your phone’s built-in processes to mirror your phone in a much more subtle way. Your phone’s built-in safety measures usually require apps running in the background to display a persistent notification. But, seeking to avoid detection and misdirect victims, a hacker could write code so that the notification claims to signal another, innocuous feature completely unrelated to mirroring.

In the most dangerous scenario involving highly advanced exploits, it could be possible for a cybercriminal to run a mirroring app that displays no notification whatsoever. Average users aren’t likely to face this kind of attack, fortunately.

High data usage

Mirroring a device requires an internet connection and can use quite a lot of data. If you suspect your phone is being mirrored, check how much data each app is using and look for anything suspicious. You should be able to do this through your phone’s settings. With some devices, you may be able to display your live data usage in the top bar, so you can see if your phone is using lots of data when it shouldn’t be.

How someone can mirror your phone

As touched on earlier, cybercriminals can use a broad range of malicious tools and tactics to mirror your phone’s screen without your permission or awareness.

Through physical access

Someone with physical access to your phone could potentially set up mirroring on another device. This can be achieved using only your phone’s native features or in combination with malware or legitimate third-party apps.

This is probably the most common method used to mirror phones. The upshot is that, to execute the most basic form of this attack, the malicious actor will need to be nearby and also know the password to your Microsoft or Apple account to set up full mirroring.

But with even a small amount of technical knowledge, someone with physical access could use debug mode to stealthily install a mirroring app even without your password (iPhones are more secure than Androids in this regard).

Depending on whether you are trying to connect an Android or iPhone to a Windows or Mac computer, the mirroring process is different. For example, if a malicious attacker links your iPhone to their PC, they’ll be able to view texts, notifications, and recent photos, but not set up true 1-to-1 mirroring. On the other hand, if your Android is connected to a stranger’s PC, they can mirror your phone and open apps freely thanks to full remote access.

To check for the most basic methods of mirroring, look to your phone’s top tray. You may see an icon from (depending on the devices involved) Link to Windows, AirPlay, or Phone Link. It’s also a good idea to monitor for third-party tools like AirDroid and TeamViewer and check to see whether debug mode has been enabled.

Via spyware or malicious apps

Criminals use a variety of means to get specially designed apps onto victims’ phones. The vast majority of spyware apps are incapable of mirroring your phone’s screen. Instead, they collect other kinds of data, like your location or usage habits. That said, some rare apps can exploit your phone’s mirroring function. In extreme cases, they can even enable mirroring without creating any notification that mirroring has begun. Once infected, the cybercriminal will be able to see what’s on the phone.

Again, true spyware mirroring apps are sophisticated and quite rare. Most people aren’t at risk of being targeted. Still, it’s best to regularly check your phone for unfamiliar apps.

Through public Wi-Fi or Bluetooth

Connecting to public Wi-Fi in places like hotels and airports carries far more risk than using home networks. This is due to the increased risks posed by fake hotspots, man-in-the-middle attacks, and other threats. Connecting to a network or a Bluetooth device can’t automatically enable a hacker to mirror your device. But if the conditions are right and the target is careless, doing so could open them up to a phone monitoring attack.

With phishing

Criminals can also use phishing to begin the process of mirroring a victim’s phone. This can be done through links sent via email, chat, or SMS message. Clicking on a malicious link alone won’t provide a hacker with access to your phone’s screen, but it might be a step in that direction if you’re being targeted by cybercriminals with access to advanced exploits.

Risks of phone mirroring

A list of some of the dangers associated with screen mirroring attacks.Illicit phone mirroring is a very dangerous form of cyberattack. If criminals can see everything you do on your device, there are many ways this can be used against you. Here are just some of the biggest risks to be aware of:

Privacy invasion

It’s obviously a massive invasion of your privacy for a stranger (or even someone you know) to have the ability to remotely view what’s on your phone’s screen.

They’ll be able to see everything you do, from the websites you visit and the terms you search for to the photos you take and the messages you send.

They could use the information they gain to blackmail you or sell embarrassing details to others. Even if they keep what they learn to themselves, you surely don’t want a stranger knowing everything that you do on your phone.

Credential theft

Every time you open an app or website and log into one of your accounts, a cybercriminal with access to your device’s screen will be able to see the data you enter. That includes your usernames, email addresses, credit card numbers, and passwords.

From there, criminals could steal your accounts, putting you at risk of identity theft and highly targeted scams. Alternatively, they might sell this information on the dark web or make purchases using your cards.

Physical safety concerns

One of the most concerning aspects of phone mirroring attacks is that they can affect your real life as much as your online presence.

If someone can see your device when you open Google Maps, for example, they could then pinpoint your exact location. They could also see your Calendar app or track your messages to determine where you’ll be at a given time.

Again, there are various ways that information could be used against you. Thieves, for example, could plot to break into your home.

How to stop someone from mirroring your phone

Thankfully, there are plenty of ways you can guard against phone mirroring. Even a few small, simple adjustments to your device settings can make all the difference for your long-term safety.

Let’s take a look at how to stop someone from mirroring your phone on both iOS and Android devices.

Stop phone mirroring on iPhone

We’ll begin with steps you can take to stop screen mirroring on iPhones.

Stop screen mirroring on iPhone

This covers stopping someone from mirroring your phone using its built-in tools.

  1. Swipe down from the top of the screen to access the Control Center and tap the Screen Mirroring icon. It looks like two overlapping rectangles.
    The Control Center of an iPhone, showing the Screen Mirroring icon.
  2. Tap on Stop Mirroring.
    The Screen Mirroring menu of an iPhone, showing the option to stop mirroring.

Remove mirroring or spy apps from iPhone

  1. Find the icon(s) of the app(s) you wish to remove from your device.
    A range of app icons on an iPhone screen.
  2. Look for any suspicious apps. If you see one you want to uninstall, tap and hold on it, then select Remove App.

Factory reset iPhone to eliminate any screen mirroring access

If you are still worried that your screen is being mirrored, your best option is to initiate a full factory reset of your iPhone. In doing so, you’ll lose any data that isn’t backed up. For this reason, make sure to save copies of any photos, videos, contacts, and documents on a cloud service or secondary device before moving forward. This is a fairly radical step and won’t be necessary in most cases.

Here’s how to do a factory reset:

  1. Open the Settings app and tap on General.
    The Settings menu of an iPhone, with the General option highlighted.
  2. Tap on Transfer or Reset iPhone.
    The General settings menu of an iPhone, with the Transfer or Reset iPhone option highlighted.
  3. Select Erase All Content and Settings.
    The Transfer or Reset iPhone menu, showing the Erase All Content and Settings button.
  4. Enter your Apple ID password and wait for the reset to complete.

Stop phone mirroring on Android

Staying safe from criminals seeking to mirror your Android phone or tablet involves similar steps, but the process is different. Note that the exact process may vary depending on the model of your phone and version of Android.

Turn off casting features on Android

If you want to see if someone is using your Android’s native casting function, here’s what to do:

  1. Open the Settings app.
    The main page of the Settings app on an Android phone.
  2. In the search bar, type “cast” and tap on the Cast or Screencasting menu that should appear.
    The Settings app of an Android phone, with the "Cast" option highlighted.
  3. Disconnect from any devices you’re connected to. To do this, just select the device and then tap Disconnect.
    The list of connected casting devices on an Android, showing the "Disconnect" button for a smart TV.

Find and remove admin apps that enable mirroring

  1. Unlike normal apps, admin apps aren’t readily visible, so you won’t find them on your Android’s home screen. To find out if you have any, open your device’s Settings app. Your next step will vary depending on your device and Android version. Another option is to simply search for “admin apps” and proceed from there.
    The Android Settings app, with the "Apps" menu option highlighted.
  2. Look for an option labeled Special app access or Admin apps.
    The Apps menu of the Android Settings app, showing the "Special app access" option.
  3. Tap Device admin.
    The Special app access menu of the Android app settings, with the "Device admin" option highlighted.
  4. You’ll see a list of apps with admin privileges. Tap on any unfamiliar app, then toggle its admin rights off.
    A list of Android apps with admin privileges, showing the toggle switch to disable admin rights for each app.
  5. Once you’ve removed the admin rights, it’s a good idea to check for regular apps that can mirror your screen, too. The easiest way to review your list of apps is to open the settings tool and search for “apps.”
    The android settings page once you search for "apps"
  6. In the search results page, tap Apps.
  7. You will now see a list of every app installed on your phone. Review it for any suspicious entries. Once you find one, tap on it.
    A list of apps installed on an Android
  8. You’ll see information about the app you’ve selected. There should also be an Uninstall button, though in some cases you might need to tap Remove.
    An app info screen with the uninstall button highlighted

Clear cache partition to remove residual tracking components

This step won’t be necessary in most cases, but if you have a strong reason to believe you’re being targeted, it might be a good idea to clear your Android’s cache partition. Here’s how to do it:

  1. Turn off your device.
  2. Restart it in Recovery Mode. To do this, you usually need to long-press the Volume Down and Power buttons at the same time, but the exact process can vary on different makes and models of phones.
  3. Use the Volume buttons to navigate the Recovery menu and find the option to Wipe cache partition.
  4. Use the Power button to select and confirm this option. Then wait for your device to reboot.

Factory reset Android and reinstall OS

Even more so than clearing your cache, doing a factory reset is a radical step that requires backing up any files you need. Still, if you are confident you’re dealing with an attack that you can’t otherwise manage, it’s a tool you’ll want to know how to use.

  1. Open the Settings app.
  2. Type “reset” into the search bar to find the Reset options menu, or locate it via the General Management or System menus, depending on the make/model of your device.
    The System settings page of the Android Settings app, with the "Reset options" button highlighted.
  3. Tap on Erase all data (factory reset).
    The Reset options menu of an Android phone, with the "Erase all data (factory reset)" option highlighted.
  4. Select Erase all data and enter your PIN or password if prompted.
    The Erase all data (factory reset) page of an Android phone, with the "Erase all data" button highlighted.
  5. Confirm the reset and wait for it to finish.

Can you fully prevent phone mirroring?

While there are concrete steps you can take to avoid and detect screen mirroring, there’s no way to stay 100% safe. This is due to the existence of highly sophisticated tools and exploits, some of which lack known countermeasures.

That said, those kinds of attacks are very rare. Only very specific targets are likely to be affected. For most people, phone mirroring is a simpler affair that’s relatively easy to detect. To protect against it, your best bet is to monitor for suspicious activity.

In any case, all users should remain vigilant and aware. Tools like VPNs and anti-malware apps can help you stay safe and enhance privacy across devices, but there are additional things you’ll need to handle yourself in order to stay safe.

Why prevention is stronger than detection

In general, when it comes to cyberattacks like phone mirroring, it’s much better to take preventative measures and avoid becoming a victim in the first place than to worry about detecting and stopping an attack as it happens.

If you wait until an attack has already started to take action, the criminal(s) might have already had enough time to steal your data, copy your credentials, access your accounts, and put your data and identity in jeopardy.

How to prevent unwanted phone mirroring

A list of 10 ways to prevent unauthorized phone mirroring.Since prevention is the smartest strategy for dealing with phone mirroring attacks, let’s now take a look at the best preventative measures you should follow to stay safe.

1. Keep your OS and apps updated

It’s important to keep your device’s operating system and all the mobile apps you use up to date, especially those that could mirror your screen.

This is because updates often bring security patches, bug fixes, and improvements to address vulnerabilities in the app or system code, making it much harder for cybercriminals to infiltrate the system and carry out their attacks.

Whenever you see that updates are available, download and install them immediately to keep your device as safe and secure as possible.

2. Avoid third-party app stores

When downloading mobile apps, it’s always best to stick to the official stores: the Google Play Store on Android and the Apple App Store on iPhone.

These official stores have strict systems in place to review the apps they host and verify their safety before making them available for download. They also regularly remove apps that are deemed suspicious or unsafe.

On unofficial app stores and APK websites, security standards are lower, putting you at greater risk of downloading an unsafe or malicious app.

3. Don’t root or jailbreak your phone

Some mobile users may be tempted to root (Android) or jailbreak (iOS) their mobile devices. This is done in order to bypass some of the core system limitations and gain more control and customization capabilities.

However, it’s risky to jailbreak/root a device. You may not only void the warranty, but you could also brick your device or open it up to unauthorized access and malicious attacks.

Rooting or jailbreaking may disable some of the key security features that keep criminals out. This can make it easier for cybercriminals to use malware or other means to mirror your phone.

4. Use strong passwords and screen locks

To guard against people physically setting up screen mirroring on your device, make sure to set strong passwords and screen lock settings using a complex PIN, password, or biometric authentication.

This applies to apps and platforms you use as well. Protect them with complex passwords and two- or multi-factor authentication (2FA and MFA). That way, even if someone is able to mirror your device, they’ll have a much harder time getting into your accounts or stealing your credentials. For those who need a high level of security, your best option is to use a hardware key like YubiKey.

5. Turn off Bluetooth, Wi-Fi, and casting when not in use

It’s generally considered a bad mobile habit to leave features like Bluetooth, NFC, and screencasting turned on when you’re not actively using them.

Bluetooth is required for some types of mirroring, so turning it off can block these outright while also reducing your overall attack surface. Others rely on both devices sharing a Wi-Fi connection, so you may want to disconnect when you don’t need to access the internet.

When this isn’t possible or ideal, look closely at any notification your phone sends you relating to any of these features. Don’t accept Bluetooth or casting requests if you aren’t trying to pair a device yourself.

6. Monitor active devices and permissions

When you’re using screen mirroring or casting or connected to devices via Bluetooth, make sure to regularly check the list of connected devices and remove any you don’t recognize or no longer use.

It’s also a good idea to monitor app permissions, checking to see which apps have the ability to share your display with another device, as well as those that can access other key features of your phone, like its microphone and camera.

7. Avoid public charging stations

Many public places, such as airports, malls, and cafes, now offer public phone charging stations, where you can connect your phone to a USB outlet to recharge the battery.

These are generally perfectly safe, but there are some concerns. Though evidence is severely lacking, it is theoretically possible that sophisticated tools could be created that would enable malicious actors to use USB connections to spread malware or run exploits.

The threat of this is marginal and often exaggerated, but anyone with specific concerns that they could be targeted may want to avoid public charging stations out of an abundance of caution.

8. Use mobile security software

Antivirus software isn’t just for computers and laptops. It’s also important to install and use anti-malware apps on your mobile devices, like phones and tablets, too.

For best results, purchase a trusted, reputable antivirus app, and make sure to run scans on a regular basis to help you spot and remove any malware or suspicious files that might make their way onto your device.

9. Encrypt your connection

Installing a VPN app, like ExpressVPN, on your mobile device is another helpful way to guard against certain types of cyberattacks, like man-in-the-middle attacks, which could be used to gain access to your device’s screen.

A VPN will encrypt your phone’s internet connection, masking your IP address and location. This serves as an effective defense against certain methods cybercriminals use to track your activity or listen in on your connections.

10. Secure your Wi-Fi with a strong password

Cybercriminals may try to gain access to your home Wi-Fi network in order to launch screen mirroring cyberattacks. A weak password will make the initial stage of many attacks much easier for cybercriminals.

Ensure that your Wi-Fi is protected with a strong and complex password, and avoid using public Wi-Fi where possible. If you do need to connect to a public hotspot, use a VPN for encryption and additional security.

FAQ: Common questions about phone mirroring

How can I tell if someone is mirroring my phone right now?

There’s no surefire way to tell if someone is mirroring your phone, but you may notice changes in performance. Your battery might drain faster than normal, for example, or your phone might get hot or seem to operate more slowly and sluggishly. You might also notice that you’re using more data than normal or see unknown apps appearing on your device.

Can a factory reset stop phone mirroring completely?

Yes, a factory reset should be sufficient to stop any unauthorized phone mirroring, as it will delete any malware on your device and erase all data that criminals could use to gain access. Note, however, that you will also lose all of your other apps and data if you do this, so it’s worth making a backup before you begin.

Is it illegal to mirror someone’s phone without permission?

Laws vary around the world, and because technology is evolving so quickly, many countries don’t have specific laws in place to protect citizens from malicious screen mirroring. However, it’s generally considered a major invasion of privacy to mirror a phone without permission. Given that various laws exist to protect people’s privacy and data security, mirroring attacks are likely considered illegal in many countries.

How do I report unauthorized phone surveillance?

It depends on your location. In the U.S., you can contact your local law enforcement agency or file a report with the Internet Crime Complaint Center or Federal Trade Commission. Other countries around the world will have their own cybersecurity authorities to deal with matters like unauthorized phone surveillance or screen mirroring.

How do I protect someone else’s phone from being mirrored?

You can guide them on ways to prevent phone mirroring on their device, such as making sure to install all available updates, disabling screen mirroring when they don’t need to use it, and using mobile security software to guard against malware.

What’s the difference between phone mirroring and spyware?

Phone mirroring is a built-in feature on many modern devices. It can serve useful purposes like displaying video on a larger screen or accessing a device that’s in another room. It can also be used maliciously. Spyware is a general term for malware designed to steal data from victims or gain access to their devices.

Take the first step to protect yourself online. Try ExpressVPN risk-free.

Get ExpressVPN
Michael Pedley

Michael Pedley

Michael Pedley is a writer at the ExpressVPN Blog. With over 15 years of experience in content creation and digital publishing, he knows how to craft informative, useful content, with thorough research and fact-checking to back it up. He strives to make complex cybersecurity topics accessible and understandable to the broadest audiences. In his spare time, Michael likes writing fiction, reading murder mystery novels, and spending time with his family.

Comments

ExpressVPN is proudly supporting

Get Started