Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Sim Bugs

So recently I discovered all the various ways one can be hacked and spied on. is there any way to check my devices Sim information to determine if it has been bugged? I know that they can be bugged through various ways such as reciting a call or text, etc. but is there an actual indicator that one can find in the device to show if it has been? I was hacked a few months back and did find a profile in my phone but I thought I had gotten rid of it by resting my device. there seems to still be issues with my device so perhaps it was not effective in riding my device of the hacker completely. I do believe it is my ex boyfriend though so I would like to know if there is a way to get to the bottom of who created the profile that was installed on my phone. I have the info from screenshots I took before resting. Any ideas?

iPhone X, iOS 12

Posted on Mar 20, 2019 6:47 AM

Reply
Question marked as Best answer

Unless the device left your control there is no way it was hacked.

Posted on Mar 20, 2019 6:48 AM

7 replies

Mar 20, 2019 7:10 AM in response to QuickTimeKirk

although that was true at one time, these days it is much much easier. my phone had an actual profile installed on my device and I was able to see what the other side was doing for the most part. it was in fact hacked and that was confirmed by apple support and other IT connections I had at the time. I am simply wondering if apple has a way to pull up a Sim ID and determine if there is anything I can not see. in this every changing and ever growing world or electronics, I am not sure what is a stupid question anymore; anything is possible.


The information I do have from the time when my phone was invaded has led me to believe that there was a large amount of information that was copied and saved to an external cloud of some sort and I would like to be able to track it if I can.


Mar 20, 2019 3:20 PM in response to KiltedTim

I appreciate your reply but I did in fact have a profile on my phone, NO ONE had access to my phone and I DO NOT have a company owned phone. This goes against everything that we Know to be true about hacking or something/someone’s ability to see what is in your phone.


If all you mentioned is still true to this date, who do I contact to find out what exactly is going on with my phone and I still don’t know what a “SIM bug” is or how it can infect or be added to a phones SIM CARD. I ha e read various articles explaining that a phone can receive the bug simply by answering a call or opening a text message that is secretly encrypted with the “bug commands.” What are your thoughts on this?

Mar 20, 2019 3:29 PM in response to jesses-girl

However I have thought that perhaps I was the culprit that unknowingly installed whatever gave permission for my phone to be accessed. How would I go about finding that information or coding in and email, text, etc? Can I view the raw messages from my emails opened at that time and see the info? If so what exactly would I be looking for? I have gotten pretty familiar with the coding language with all this going on since September and my brother is also a computer coder so that helps. Or is there even a specific coding or language that I would be able to look for? I’m nit sure how complexed this can get in finding out how, who or what.

Mar 20, 2019 3:51 PM in response to jesses-girl

If there was a profile on your iPhone it was either from your work email, another Exchange email server, a VPN, your cell provider, or an app that YOU downloaded and placed on your iPhone. What was the name of this profile.


An iPhone cannot be hacked through a SIM card, it does not store any information on it. What you "know" about hacking iPhones is not backed up by anything factual. I don't know what "raw messages" are. You cannot get anything from a call or an incoming text. What language have you become familiar with?


You can do a spotlight search for Cydia to see is someone has jailbroken your iPhone but if you didn't do so and no one else had unfettered access to your iPhone as well as the passcode, Apple ID and password they would not have been able to do this.

Mar 20, 2019 4:14 PM in response to jesses-girl

I appreciate your reply but I did in fact have a profile on my phone, NO ONE had access to my phone and I DO NOT have a company owned phone. This goes against everything that we Know to be true about hacking or something/someone’s ability to see what is in your phone.

I never said you didn't have a profile on your phone. I'm sure you did. You installed it. Whether you remember doing so or realized you were doing so is another matter entirely. I see it every day. Users come to me because something isn't working right and it turns out they clicked on an ad to get weather alerts or some such nonsense and ended up installing a profile on their device. That is not "hacking". That's getting a gullible individual to install something malicious. There isa big difference.

If all you mentioned is still true to this date, who do I contact to find out what exactly is going on with my phone and I still don’t know what a “SIM bug” is or how it can infect or be added to a phones SIM CARD. I ha e read various articles explaining that a phone can receive the bug simply by answering a call or opening a text message that is secretly encrypted with the “bug commands.” What are your thoughts on this?

I have NO IDEA what you're talking about in reference to a "SIM bug". That is a completely meaningless term.

Android phones have been found to be vulnerable to exploits that took advantages of security weaknesses in the Android OS. In several cases, Android devices could be compromised simply by receiving a malicious SMS message. The recipient didn't even have to open or look at the message. Android was so weak that simply receiving it was enough to expose everything on the phone to the attacker.


iOS has not been shown to suffer any such weaknesses and those weaknesses that have been discovered have been quickly patched.


Every app in the app store is rigorously vetted. There are no legitimate sources for apps outside of Apple's walled garden. that's one of the reasons that iOS is so secure.


When you install a profile, you are granting permission to the issuer of the profile to access information on and about your device. That is why you should NEVER do so without knowing exactly what you're doing.

Corporate management systems often use profiles to control company owned devices. The can monitor location, forcibly install and remove apps, and much more. When you install a profile, you are granting the issuer those kind of permissions.

Sim Bugs

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.