Your choices are to learn how to remove all that, or to hire somebody to clean the network and all the gear, or to replace all that, and to discuss this with a lawyer and/or local law enforcement if that’s an option for you.
Most cases of this are somebody known and with access, or default or weak or otherwise known passwords.
iPhone malware is fairly rare and fairly expensive to acquire and deploy (and iPhone malware absolutely exists, whether jailbroken or otherwise—it’s simply rarely seen), and is unlikely involved here, though iPhone communications can certainly be intercepted, and can be accessed when insecure communications protocols are in use.
If you’re a journalist or dissident or investigative journalist or have access to substantial financial data or to sensitive or classified data, or are on the path to that access, the calculations here do shift.