You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

iMac coding on iPhone

someone i know used their iMac OS X to gain access to my iPhone SE and now i cant get them out of my phone they have access to all my stuff even iCloud. I want to take (anything they have copied or saved from my phone) back. I believe based on findings in my system analytics that the individual has used an iMac to write codes and or apps which they then remotely launched the writings on my iPhone. I have reset my phone 3 times and yet the intrusive jerk is still in my phone as if he/she has made my phone part of their device. With google I found three devices logged into my account and the my phones device name had changed from “iPhone iOS”to “cpu iOS like iMac OS X” I know that apple hasn’t used OS X since 2016 and anyone with at least some computer knowledge knows “cpu” is a laptop. Does anyone know how to remove this person and the coding that has been inflicted upon my phone. At the very least does anyone know how to have the person responsible arrested and charged as they so desperately deserve. Please help me with any information you can.


Thanks everyone


[Edited by Moderator]

Posted on Aug 12, 2021 4:54 PM

Reply
Question marked as Top-ranking reply

Posted on Aug 12, 2021 6:04 PM

Work your way through this document:

Device and Data Access when Personal Safety is At Risk


This includes the previous compromised Apple ID info, and rather more. You will be changing ALL passwords, your cellular carrier PIN, ALL email account passwords, social media passwords, everything. And verifying your list of trusted devices, your Apple ID trusted info, all if it. And verifying what’s installed, or starting over.


As for the “cpu iOS like iMac OS”, that’s probably normal, if you’re rummaging logs or looking at something trying to interpret the being-deprecated browser agent strings.

4 replies
Question marked as Top-ranking reply

Aug 12, 2021 6:04 PM in response to Wes1984

Work your way through this document:

Device and Data Access when Personal Safety is At Risk


This includes the previous compromised Apple ID info, and rather more. You will be changing ALL passwords, your cellular carrier PIN, ALL email account passwords, social media passwords, everything. And verifying your list of trusted devices, your Apple ID trusted info, all if it. And verifying what’s installed, or starting over.


As for the “cpu iOS like iMac OS”, that’s probably normal, if you’re rummaging logs or looking at something trying to interpret the being-deprecated browser agent strings.

Aug 12, 2021 9:23 PM in response to MrHoffman

Thank you so much I will start on that right now but just so I know for sure the “cpu iOS like iMac is x” is new and first showed up July 23, 2021 before that date it has always been iPhone iOS that is also the date one of the unknown devices first had activities according to my google account log. I have been fighting this individual off my iPhone for some time and usually using codes *#002# or *#21# would disable the attack and I also could count on putting phone in airplane mode to disrupt the intrusion. That has been an ongoing issue and extremely difficult to get Apple or T-Mobile to understand what was going on. I’m 99% sure the attack is about my media photos and videos and the individual is taking them and selling them on porn sights (don’t ask) but that’s entirely very possible and the main conclusion I come to when trying to understand why this aggressive intrusion is happening which all began last Halloween. Do you know of a way to seek and destroy any media he might have used to profit from and can I make him pay me all the money he has pocketed from the sale of said media? I was recently told about raspberry, any suggestions on rather this would help or at least prevent further attacks?

Aug 13, 2021 7:30 AM in response to Wes1984

Logs are utterly useless, until and unless you know what compromise-related details you are looking for. Lots of work looking, and for little or no results. App developers routinely write all sorts of stuff into logs. Messages that are often seemingly ominous, ill-reviewed, misspelt, scary, or just plain wrong, but routinely benign. While it might make sense to the developer, nobody else reviewed it.


Upgrade your security, as described in the linked article. That usually involves new and more robust and unique passwords, enabling two-factor, verifying and changing passwords, possibly reloading a device that has been out of your control, keeping the device and apps updated to current. Pretty much nobody recommends looking at logs.


A data breach is unfortunately much like pollution. Once it leaks out, and doesn’t ever all get cleaned up.


iMac coding on iPhone

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.