Hacking a system is usually accomplished by sending faulty files, such as illegal email or any corrupt file that entices the user to click on it and know who's hacking my phone. Hackers frequently get access to a cell phone for personal gain or to extort the owner.