iPhone Hacked

What is CPU OS 14_4 like Mac OS X?

Posted on Feb 16, 2021 8:17 PM

Reply
Question marked as Top-ranking reply

Posted on Feb 16, 2021 8:27 PM

Your post makes no sense. A CPU is a central processing unit, a unit of physical hardware on a computing device. iOS 14.4 is the current operating system (software) for iPhones. MacOS is an operating system for Apple laptop and desktop computers and has nothing to do with iPhones. And Apple has not used the term “OS X” for their Mac operating system since 2016 - it has just been MacOS since then (10.12, Sierra).


So, sorry, but what you posted makes no sense whatsoever. Try reposting. If English is not your native language, post in your native language as someone else here may speak it and can respond in kind.

30 replies
Question marked as Top-ranking reply

Feb 16, 2021 8:27 PM in response to Blue ivy

Your post makes no sense. A CPU is a central processing unit, a unit of physical hardware on a computing device. iOS 14.4 is the current operating system (software) for iPhones. MacOS is an operating system for Apple laptop and desktop computers and has nothing to do with iPhones. And Apple has not used the term “OS X” for their Mac operating system since 2016 - it has just been MacOS since then (10.12, Sierra).


So, sorry, but what you posted makes no sense whatsoever. Try reposting. If English is not your native language, post in your native language as someone else here may speak it and can respond in kind.

Mar 19, 2021 4:03 PM in response to Blue ivy

IP address locations are provided by the network providers, and are rarely tied to the actual user location.


Providing an actual location for an IP address is a Bad Idea as the users will then be subject to problems including harassment and crimes.


And providing accurate locations is more work and more costs. For no good results. And for problems.


So... location data can be off by a state or two. Or more. IP location data is probably best assumed to be within the same country. Beyond that?


The gibberish you posted fromGoogle is what the developers at Google thought was useful for identifying the client.


Google is (mis)detecting your iPhone Safari browser as macOS 10.14.4.


Apple and other most other browser vendors are masking browser details to make user-tracking somewhat more difficult, amd to drag developers off of “browser sniffing” as a solution for customizing websites.


There’s nothing here “hacked”. Nothing even really wrong, either. You logged in, and got a login report from Google. If you got a login report and weren’t trying to log in, that might indicate a problem, or it might be somebody sending a bogus message and phishing you. Bogus email bills for and products some might consider embarrassing or risqué are commonly used to try to acquire users’ Apple ID credentials or other information, for instance. Bogus “you have 54 viruses!” messages are immensely popular right now, too.


TL;DR: nothing to see here, no “hacks”, nothing (really) wrong, just showing some of the usual duct tape and popsicle sticks that’s holding the network together.


Jun 6, 2021 5:08 PM in response to giacoco

giacoco wrote:

When a two-step verification, like Google, gives you a description of the device and location.

It used to be ‘Iphone 11’ or something as simple. I get that it’s the user agent, same result in Safari and Chrome though.

I just noticed it and figured maybe i’m hacked?


Expected and normal. Apple Safari, Google Chrome, and likely other web browsers are all obfuscating browser identity in recent releases (to make tracking harder), and vendors with web apps that are trying to identify the specific device are encountering these changes (whether trying to track users, or while posting these access-related diagnostics).


It showed a different location a t first too but that could be my ISP.


Expected and normal. More precise geolocation costs more money for the ISP to implement and maintain, and that more precise tracking increases the hazards to ISP network users including violent exes, thefts, stalking, and other and potentially worse risks. An IP address is best assumed to be correct if it is geolocated within the same country.


Jun 12, 2021 8:46 AM in response to Not_stupid_just_not_tech_savvy

Not_stupid_just_not_tech_savvy wrote:

I am also wondering if it is bad/odd for my device to show as “CPU iPhone OS 14_4_2 like Max OS X” (picture above-trying to reset google password). I’ve reset my password many times before (terrible memory lol) and haven’t seen my device named that before…


Different device name shown in some two-factor verification messages? Expected and normal. Apple Safari, Google Chrome, and likely other web browsers are all obfuscating browser identity in recent releases (to make tracking harder), and vendors with web apps that are trying to identify the specific device are encountering these changes (whether trying to track users, or while posting these access-related diagnostics).


Different or wrong address shown? Expected and normal. More precise geolocation costs more money for the ISP to implement and maintain, and that more precise tracking increases the hazards to ISP network users including violent exes, thefts, stalking, and other and potentially worse risks. An IP address is best assumed to be correct if it is geolocated within the same country.


I may be losing it, but just want to be sure because I’m resetting all passwords due to weird messages/notifications after recent breakup.


Read this, and also read the checklists linked from this >

https://manuals.info.apple.com/MANUALS/1000/MA1976/en_US/device-and-data-access-when-personal-safety-is-at-risk.pdf


If there’s even a possibility the passwords and passcodes are known, change them. This includes passwords and passcodes on your password reset paths, and the passcode or PUN associated with your cellular plan.


Feb 16, 2021 8:43 PM in response to Blue ivy

Sorry, but I still have no idea what you’re talking about. Your first post was a nonsensical sentence about CPU, iOS and OS X? Now you’re talking about signing into google and something about where you are, or ore not?


What are you doing, what is the issue? Please be detailed and specific or nobody is going to have a clue what is going on and be able to help you.


E.g. are you signing into google from a web browser (Safari ?) or the Google Mail App, or what? Was the message a web pop up, a notification, an error notice in an app?

Apr 5, 2021 8:12 PM in response to Everydayinretro

Pleae start your own thread for your own question, as this doesn’t appear related...


Seems possible that you’ve gotten scammed or phished here, or that your credentials have been exposed.


Any add-on security apps, add-on VPN client apps, or add-in anti-virus apps? Some of those are problematic at best, and variously either unnecessary or counterproductive.


As for passwords and password security, if you’re on iPhone or iPad, check Settings > Passwords for a list of security recommendations around your passwords. Weak passwords and re-used passwords and dompromised passwords are how folks get in trouble with passwords, too.


Here are some Apple documents on security, which can help understand how this works, and how compromises can happen:

Recognize and avoid phishing messages, phony support calls, and other scams - Apple Support

Checklist: If you want to stop sharing with someone whom you previously shared with - Apple Support

Checklist: If you want to make sure no one else can see your location - Apple Support

Checklist: If you want to see if anyone else has access to your device or accounts - Apple Support

Device and Data Access when Personal Safety is At RiskDevice and Data Access when Personal Safety is At Risk

Apr 6, 2021 10:58 AM in response to Everydayinretro

The original post is asking about OS_14_4. I fail to see the connection from that to your reply, beyond both including the words "iPhone hack".


As for a breach such as you've described, those are certainly possible. They're uncommon. Much like compiler bugs, as most programmers eventually learn. Possible. Fairly rare within established environments.


As for credit card replacements, those are routine after various sorts of breaches. An expectation of fraud is built into the current system, and that means new cards on occasion. Stronger authentication is feasible, but the overhead of that security is perceived as reducing aggregate profits.


As for rummaging logs, I've done it. Until a target is known and identified, trolling the logs is a massive effort and for little or no payback. About the only way to deal with logs is automation, and then with known patterns to search for, or with tooling that can search for anomalies. Which is not tooling that is widely available.


As for the image that was previously included, that was gone when I got back to this thread, and the only remnant is an indication the image purportedly contained personal data.


And those links I've posted are how to secure an entire environment, which is as or more important than securing a device. Devices can be breached, yes. It's rare, but it happens and it's certainly possible. It is vastly easier to "breach" or "hack" or "gaslight" the humans in the environment; to phish us, scam us, or otherwise fool us into providing our credentials or our financial information, or to convince us to install problematic apps or to establish problematic network configurations. And cleaning up these messes is larger, but starts with the entire environment; with new and unique passwords, with reinstalling software, and various other steps, depending on the details of the particular breach.


May 4, 2021 9:01 AM in response to MrHoffman

Speaking for myself it has nothing to do with the location, but the fact that the name of the device referenced by Google has changed. As far as I can gather, it’s just the user agent of the browser being used that is showing up differently than in the past and likely doesn’t indicate anything suspicious. Unfortunately, I can’t confirm this with Google because it’s impossible to actually speak to someone there, but if I do I’ll post again to confirm.

Jun 12, 2021 8:38 AM in response to Not_stupid_just_not_tech_savvy

When you visit a website your browser sends an info string to the browser that includes your IP address (so the site can find you), the location of your Internet connection, and a description of the device so the site knows how to format the page. That’s what CPU iPhone OS 14_4_2 like Mac OS X means; it’s the information the browser needs to format the reply. It’s saying that the server can use the same settings it would use for Mac OS X, and it is giving the iOS version because that can also affect the formatting or security requirements.

Apr 10, 2021 10:46 AM in response to Boardgoosen

Boardgoosen wrote:

It’s like you keep failing to understand the post and then acting as if you’re an expert on something that has absolutely nothing to do with what’s being asked. Maybe just don’t do that.


True.


Here is your report:


Same thing it’s happening to me multiple times. Got off the phone with my phone carrier which is AT&T and it appears as someone has infiltrated my carrier service. They have access to everything, my Facebook, Google, Instagram, literally everything. I’m sorry it’s all I can tell you but it appears someone is doing it to you too. Additionally I change my phone name and that is not it


There’s yet been no direct evidence here of a device hack, no indication of how your report is related to this:


iPhone Hacked
What is CPU OS 14_4 like Mac OS X?


Absent some specific aberrant behaviors and there’s been no details of those posted here as yet, actual iPhone hack are likely only going to show in a forensics evaluation, and most folks aren’t inclined to pay for a forensics investigation. Those investigations aren’t cheap, either. And they require physical device access and passwords, something which isn’t going to be available here.


In what you are reporting here—which can decidedly be a pain to deal with—problems with password exposures, and maybe with hardware issues or signal coverage, maybe a carrier security problem, can also fully explain what has been reported so far.


And problems with passwords including phishing and re-used passwords are how most folks get caught up with “hacks”. I’ve gotten caught by that.


Some other folks do get caught by carrier security lapses; where a carrier provides access to your telephone number to miscreants. Or where SMS two-factor gets intercepted or gets phished.


If you are a target worth the substantial cost of the tooling involved in breaching an iPhone, or are worth the effort of phishing your credentials, or phishing or otherwise gaining access to your carrier, or if you are using SMS two-factor, then you’re still going to need more specialized help, and you’ll need more knowledge of the exploits and the risks of electronic devices and communications, and of resolving the breach. Which is part of what i’ve been linking to, too. And remediation still involves resetting passwords and reviewing security.


As correctly stated in another reply here, details—specific details—matter.


What the symptoms are, what you’ve already tried, what security measures have you established, security is work.


May 4, 2021 8:09 AM in response to 4Dylay

4Dylay wrote:

The same thing showed up on my google myaccount when I signed in from my ipad into google. I am kinda stressed abt why the name is different like that.


So an unexpected geolocation for a login showed up secondary to when you logged in to a service?


Well, that’s to be expected and that’s also a good thing, because it happens once, and it also means that your IP address geolocation data is wrong.


Yes, wrongness here is a good thing.


Why is wrong good? Because a too-correct IP address geolocation opens each of us up for theft or assault or stalking or worse.


So long as the login message happens once, and happens contemporaneously with your login, it’s fine.


My IP geolocations routinely show up in different states.


About all that can be assumed about an IP geolocation is that the country is correct. Past that, errors are routine. And arguably, these errors are good.


If you get a login message when you’re not trying to log in, then verify your credentials. Do be generally suspicious of these login messages too, as faked purchase messages (usually intentionally created for something oft-perceived as embarrassing to the recipient), or for cases such as this fake successful login messages offering a link to a fake “login portal” seeking to capture your (real) credentials.

Apr 5, 2021 7:26 PM in response to Blue ivy

Same thing it’s happening to me multiple times. Got off the phone with my phone carrier which is AT&T and it appears as someone has infiltrated my carrier service. They have access to everything, my Facebook, Google, Instagram, literally everything. I’m sorry it’s all I can tell you but it appears someone is doing it to you too. Additionally I change my phone name and that is not it

Apr 10, 2021 12:16 PM in response to Boardgoosen

Boardgoosen wrote:

Ok I see what you mean, and I apologize for being snappy. It’s very possible the two things are totally unrelated, but seeing as nobody can explain to me why that message is appearing it’s still a matter of some concern. I hope I’m just being paranoid and it’s completely unrelated to the breach that the other poster is experiencing.


What message? A diagnostic or error message, an iMessage or mail message, etc.?


What I’m also suggesting here is to channel some of that paranoia into recognition, understanding, and working to remediate the sorts of threats that we actually face—most of us, that is—rather assuming what amounts to deus ex machina; “a hack”. Do iPhone hacks happen? Absolutely. Watching the forums around here, way more folks get bagged by weak or breached or re-used passwords, phishing and spear-phishing, scam emails, the many lies that pop-ups and other advertisements tell, calendar spam, scam phone calls and many with spoofed caller info, and related schemes designed to separate us from out money or our data or our access. Channeling these (reasonable!) concerns into upgrading your own security.


This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

iPhone Hacked

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.