suzanne3382

Q: Can the iPhone5 be hacked remotely by a hacker?

I work for a technology company and one of our employees shared an incident about her iPhone5 being hacked remotely. The hacker gained access to her device overnight while her phone was unlocked. The hacker watched her baby monitor video feed from the baby monitoring app  (including taking pictures and video from the device), posted about the baby to her FB account, browsed on Safari, including some searches of French books on amazon and Scott Trading sites. When I spoke with the mobile device team, they were not familiar with any iOS security gaps that would allow a hacker to remotely gain control of an iPhone, however, the activities on her device suggest that this is possible.

 

I found some articles from 2009 regarding a SMS virus that allowed hackers to gain remote access to a device, however, our mobile device team is certain that this gap would be closed by now.

 

Is anyone familiar with an existing security gap on the iPhone5? What would you recommend would be the next action for her? She is intending to delete her icloud account, change all her passwords and wipe her device.

iPhone 5, iOS 6.1.1

Posted on Mar 19, 2013 1:23 PM

Close

Q: Can the iPhone5 be hacked remotely by a hacker?

  • All replies
  • Helpful answers

first Previous Page 6 of 12 last Next
  • by tonefox,

    tonefox tonefox Feb 22, 2015 11:51 AM in response to pbunny3
    Level 6 (9,281 points)
    Feb 22, 2015 11:51 AM in response to pbunny3

    Oh yes, your question. Are we allowed to pick just one from your initial foray into these forums?

     

    "I am astonished by the support peoples responses to iphones being hacked. Are you paid to call people idiots and state iphones cannot be hacked?

    power fluctuations caused the browser to open and randomly typed searches of peoples names or existing websites? While sleeping i took pictures and video from baby monitor app? Posted to FB with my butt?

    Really?

    This is how Apple deals with issues it thinks could give a product a bad name?"

     

    I call troll.

  • by pbunny3,

    pbunny3 pbunny3 Feb 22, 2015 12:13 PM in response to tonefox
    Level 1 (0 points)
    Feb 22, 2015 12:13 PM in response to tonefox

    I'm pretty sure I called troll first.

    No one willing to take on answering the question about bad cables and chargers causing the iphone to take pictures and post them on websites?

    I didn't think so.

  • by Lexiepex,

    Lexiepex Lexiepex Feb 22, 2015 12:18 PM in response to Meg St._Clair
    Level 6 (10,497 points)
    Mac OS X
    Feb 22, 2015 12:18 PM in response to Meg St._Clair

    Don't worry Meg, you are great.

    Don't react any more, he is trying to tell everybody how great and important he is. We all know how pathetic he realy is.

  • by Meg St._Clair,

    Meg St._Clair Meg St._Clair Feb 22, 2015 12:24 PM in response to Lexiepex
    Level 9 (59,182 points)
    iPhone
    Feb 22, 2015 12:24 PM in response to Lexiepex

    LexSchellings wrote:

     

    Don't worry Meg, you are great.

    Don't react any more, he is trying to tell everybody how great and important he is. We all know how pathetic he realy is.

     

    Thanks for the support, Lex. I'll be good, I promise.

  • by pbunny3,

    pbunny3 pbunny3 Feb 22, 2015 12:24 PM in response to pbunny3
    Level 1 (0 points)
    Feb 22, 2015 12:24 PM in response to pbunny3

    Just a short read, if you are interested.

    These are the names of the fellows that built the virus and installed it on an intact iphone. Not jailbroken.

    The research was done at the Georgia Institute of Technology

    Billy Lau

    Yeongjin Jang

    Chengyu Song

     

     

    Apple iOS devices are considered by many to be more secure than other mobile offerings. In evaluating this belief, we investigated the extent to which security threats were considered when performing everyday activities such as charging a device. The results were alarming: despite the plethora of defense mechanisms in iOS, we successfully injected arbitrary software into current-generation Apple devices running the latest operating system (OS) software. All users are affected, as our approach requires neither a jailbroken device nor user interaction.

     

     

    In this presentation, we demonstrate how an iOS device can be compromised within one minute of being plugged into a malicious charger. We first examine Apple’s existing security mechanisms to protect against arbitrary software installation, then describe how USB capabilities can be leveraged to bypass these defense mechanisms. To ensure persistence of the resulting infection, we show how an attacker can hide their software in the same way Apple hides its own built-in applications.

  • by pbunny3,

    pbunny3 pbunny3 Feb 22, 2015 12:27 PM in response to pbunny3
    Level 1 (0 points)
    Feb 22, 2015 12:27 PM in response to pbunny3

    wow

    People are asking for help and the responses are not based on any kind of fact.

  • by pbunny3,

    pbunny3 pbunny3 Feb 22, 2015 12:39 PM in response to pbunny3
    Level 1 (0 points)
    Feb 22, 2015 12:39 PM in response to pbunny3

    Try a google search of "Oleg Pliss"

    If you own an iphone in Australia im pretty sure you are aware of the name.

  • by Lexiepex,

    Lexiepex Lexiepex Feb 22, 2015 1:00 PM in response to Meg St._Clair
    Level 6 (10,497 points)
    Mac OS X
    Feb 22, 2015 1:00 PM in response to Meg St._Clair

    Meg, i would like to point you to an iphone 3g problem, please look at it:

    https://discussions.apple.com/message/27711252?ac_cid=tw123456#27711252

    thanks,

    Lex

  • by Meg St._Clair,

    Meg St._Clair Meg St._Clair Feb 22, 2015 1:03 PM in response to Lexiepex
    Level 9 (59,182 points)
    iPhone
    Feb 22, 2015 1:03 PM in response to Lexiepex

    LexSchellings wrote:

     

    Meg, i would like to point you to an iphone 3g problem, please look at it:

    https://discussions.apple.com/message/27711252?ac_cid=tw123456#27711252

    thanks,

    Lex

    Will do.

  • by Csound1,

    Csound1 Csound1 Feb 23, 2015 12:13 PM in response to pbunny3
    Level 9 (50,786 points)
    Desktops
    Feb 23, 2015 12:13 PM in response to pbunny3

    pbunny3 wrote:

     

    I'm pretty sure I called troll first.

    Yes, and you got that wrong, as well as everything else so far.

  • by zzdsf,

    zzdsf zzdsf May 17, 2015 6:42 PM in response to .jef
    Level 1 (0 points)
    May 17, 2015 6:42 PM in response to .jef

    This is the exact same situation with me!!!! I truly do not understand, it is frustrating me so much that I might just switch to android.. Had my iPhone 6 replaced with the same problems again and the same thing is still going on..

  • by mommarogers,

    mommarogers mommarogers Jun 25, 2015 11:27 AM in response to zzdsf
    Level 1 (0 points)
    Jun 25, 2015 11:27 AM in response to zzdsf

    Wow, I'm glad to know it's not only us finding this issue. I will try to abbreviate as it's a long involved story.

     

    We discovered my daughter's Facebook and Instagram was being hacked by her boyfriend.  He became an ex immediately for this and many other reasons. In the aftermath of that she blocked him on her new, non-jailbroke iPhone 5.  A short time later he suddenly started imessaging her again.  When she went to her blocked list, he was unblocked and several of her friends were blocked.  She changed it all and within a short time it happened again.  Then she started to notice a few other strange happenings on her phone..such as her email address getting changed. Then he mistakenly referred to some texts that she had sent to her friends regarding all that was happening. Initially when it was just Facebook, Instagram and the texting we assumed that he had downloaded a key logger on her phone.  But when things were getting changed remotely.....

     

    I should say that while this was happening she was visiting at home with us and the ex was in a city two hours from us. 

     

    I called our service provider hoping they could help give us some direction on the best way to figure this all out and reset the phone and get rid of the key logger.  While I was talking to them and was logged into her Apple ID online and looking at Find My Iphone, another iphone 5 kept popping online under her account.  The next time it did it I clicked Lost Iphone and waited.  A short time later I got an email from Apple giving me an address of that phone.  It ended up being the ex-boyfriends address in a city 2 hours from where we were. I also clicked erase iPhone the next time it came online.

     

    Scary stuff!  We took the phone to an Apple store and they showed me how to reset to factory to remove the key logger.  We hope!  We also changed to password to that apple ID and created a brand new for her to use that he knows nothing about.  We hope!  We also had to change all her passwords for everything in her phone and her iPad and did a factory reset on her iPad just in case he had that one done also.

     

    Nobody will ever convince me that iPhones cannot be hacked!  I have seen it with my own eyes!  There are some seriously psychotic people in this world!

  • by Meg St._Clair,

    Meg St._Clair Meg St._Clair Jun 25, 2015 4:09 PM in response to mommarogers
    Level 9 (59,182 points)
    iPhone
    Jun 25, 2015 4:09 PM in response to mommarogers

    It's highly unlikely that he downloaded a key logger as such a thing is not possible on an unjailbroken devices. What's far more likely is that, as with the Instagram and Facebook accounts, he figured out your daughter's Apple ID and password. That would explain everything you describe.

     

    Help your daughter change her Apple ID password to something that the ex is unlikely to figure out.

  • by mommarogers,

    mommarogers mommarogers Jun 25, 2015 4:28 PM in response to Meg St._Clair
    Level 1 (0 points)
    Jun 25, 2015 4:28 PM in response to Meg St._Clair

    OH there was a keylogger alright. In the days prior, she was locked out of her Facebook and changed her password three times. She only logged in again on her phone and used very difficult password combinations each time she changed it. Keep in mind that he was never near her phone in that time as he lived two hours from our house.

     

    As I stated, we created a new Apple ID with a new password and also changed the password on the old one.

  • by Meg St._Clair,

    Meg St._Clair Meg St._Clair Jun 25, 2015 4:38 PM in response to mommarogers
    Level 9 (59,182 points)
    iPhone
    Jun 25, 2015 4:38 PM in response to mommarogers

    mommarogers wrote:

     

    OH there was a keylogger alright. In the days prior, she was locked out of her Facebook and changed her password three times. She only logged in again on her phone and used very difficult password combinations each time she changed it. Keep in mind that he was never near her phone in that time as he lived two hours from our house.

     

    As I stated, we created a new Apple ID with a new password and also changed the password on the old one.

    What you're suggesting is simply not possible. There are no key loggers that can be installed on an unjailbroken iPhone, especially not remotely. If the ex was never near the phone, he could not have hacked it. Most people's idea of "difficult to guess" passcodes aren't really.

     

    However, all that matters is that the issue is resolved.

first Previous Page 6 of 12 last Next