Juice Jacking

There’s tons of articles on the awareness and how to prevent juice jacking but what do you do if you’ve already been a victim of it? Is the target device infected forever or is there still a way to save it and give it a “refresh” by having it cleaned from all malware and unwanted software?

iPhone 11, iOS 16

Posted on Oct 21, 2022 9:19 AM

Reply
Question marked as Top-ranking reply

Posted on Oct 24, 2022 2:10 PM

MajorBoogie27,


Thank you for this additional information.


If you feel that your device has already been compromised, you can restore your iPhone to factory settings and avoid reinstalling from a backup. This would set your device up as brand new without any of your previous data. Restore your iPhone, iPad, or iPod to factory settings - Apple Support


You can also take actions for a possible compromise of your Apple ID: If you think your Apple ID has been compromised - Apple Support


Also, make sure you've reviewed the link we shared above if you haven't already: Use the built-in security and privacy protections of iPhone - Apple Support


It might also be a case where you could check in with local law enforcement.


Best regards.


4 replies
Question marked as Top-ranking reply

Oct 24, 2022 2:10 PM in response to MajorBoogie27

MajorBoogie27,


Thank you for this additional information.


If you feel that your device has already been compromised, you can restore your iPhone to factory settings and avoid reinstalling from a backup. This would set your device up as brand new without any of your previous data. Restore your iPhone, iPad, or iPod to factory settings - Apple Support


You can also take actions for a possible compromise of your Apple ID: If you think your Apple ID has been compromised - Apple Support


Also, make sure you've reviewed the link we shared above if you haven't already: Use the built-in security and privacy protections of iPhone - Apple Support


It might also be a case where you could check in with local law enforcement.


Best regards.


Oct 23, 2022 11:21 AM in response to MajorBoogie27

Hello MajorBoogie27,


We want to confirm some details, so we can better assist you.


1. To start, can you let us know if you have specific concerns about your device? If so, please let us know more about the issues or concerns you have, so we can help.


2. If you'd like to learn more about the built-in security and privacy protections of iPhone, please check out this link, as it has some great information and should be helpful: Use the built-in security and privacy protections of iPhone


Use the built-in security and privacy protections of iPhone

iPhone is designed to protect your data and your privacy. Built-in security features help prevent anyone but you from accessing the data on your iPhone and in iCloud. Built-in privacy features minimize how much of your information is available to anyone but you, and you can adjust what information is shared and where you share it.

To take maximum advantage of the security and privacy features built into iPhone, follow these practices.

Protect access to your iPhone

• Set a strong passcode: Setting a passcode to unlock iPhone is the most important thing you can do to safeguard your device.

• Use Face ID or Touch ID: Face ID (supported models) or Touch ID (supported models) provides a secure and convenient way to unlock your iPhone, authorize purchases and payments, and sign in to many third-party apps. See Set up Face ID on iPhone or Set up Touch ID on iPhone.

• Turn on Find My iPhone: Find My helps you find your iPhone if it’s lost or stolen and prevents anyone else from activating or using your iPhone if it’s missing.

• Control what features are available without unlocking your iPhone: Disallow or allow access to some commonly used features, such as Control Center and USB connections, when your device is locked.


Take care!

Oct 24, 2022 1:27 PM in response to Brittany1416

Hello Brittany1416,


Thank you for replying. It’s been long confirmed that I have been targeted by my ex-wife with my mobile devices being the most sought after resource to gain access to. She’s hired a “revenge for hire” service that have extremely trained professionals who have rigged every charge block I have to juice jack my data. One example of what they’ve been able to do is while my device was plugged into power, I was participating in an auto auction. As I patiently awaited for a specific vehicle to bid on my account began waiting until they last call of random vehicles and then place a bid in which the bid successfully won as the high bidder. At this point, $500 automatically I’d deducted from my account as a deposit.

After calling the auction and waiting for a call back from their management, I continued to listen in for the vehicle I was waiting for. A now second vehicle has received a phantom bid by me and again wins. After happening once already I made sure not to have any fingers lingering anywhere near the screen so I became suspicious at this point. I figured there’s a glitch and management will return my money and apologize for it. Before they could call me (which was only 10-15 minutes later), I had now bid and won a total of 3 vehicles! Once, maybe me. Twice, unlikely me. Three times, definitely not me and something’s up! This is when I realized I was plugged into power and once unplugged is when I appeared to regain sole control of my iPhone screen.

There’s been several other occasions that have confirmed there to be a device breach and unfortunately I have not been successful in preventing it whatsoever.

Can you or anyone else help with security suggestions?

But the way, the auction group ended up charging me only $500 instead of the initial $1500 in deposits and I still had to purchase one of the three vehicles. Costing me only $10,000 instead of the closer to $35,000 it could’ve been.

Oct 26, 2022 6:35 AM in response to ryane77

Thank you Ryan for responding. I really do wish local law enforcement was a reliable resource willing to serve and protect its citizens but unfortunately I’ve learned a harsh lesson in which for a few unlucky citizens in probably every major city in America, in you’ve been selected for unauthorized case studies to be conducted on you and mobile monitoring is considered needed, then your local law enforcing agency will be notified. At that point, you become a Lone Ranger and must sought out support from elsewhere. And in this case, you have no clue how supportive it feels to just have one other person show an ounce of interest in providing a bit of help. So thank you to those that have replied and if any additional replies come to mind, please share as I’m sure it’ll be helpful to the others in a similar situation and also want their civil liberties returned along with simple relief.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Juice Jacking

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.