"Your iPad has been hacked" Pop-Up Notification

I was trying to download a book online. I've downloaded tons of books from this website and it never showed anything until today. While trying to download the book, I received this pop-up notification and got scared for a second but tried to leave the website and could, meaning it was not an original pop-up from Apple that doesn't let you do anything until you've clicked "Ok". The thing is that, although I did not do anything that the pop-up asked me to do, I accidentally clicked the "Ok" from that notification. Now my question is, am I still getting hacked because I clicked the "Ok" button from that notification? (The photo is not mine though, this is from another user, I just wanted to show which "Ok" button I was talking about, you know... to get a better answer)


iPad Pro

Posted on Mar 8, 2023 8:04 AM

Reply
Question marked as Top-ranking reply

Posted on Mar 8, 2023 8:14 AM

Scam.


Providing your iPad has been kept up-to-date with system software updates, you should not be overly concerned for your iPad being directly compromised. Most alerts that you may see are pop-up messages from websites - these being designed to scare the unwary into giving away sensitive information - or to fool you into doing something that you shouldn’t.


Due to the system architecture of iOS/iPadOS, unless jailbroken, your iPad is not susceptible to traditional malware infection per-se. However, as with all computer systems, there are still vulnerabilities and exploits to which you remain vulnerable. For older devices, no longer benefiting from regular security updates, the risk of an unpatched vulnerability being exploited increases. Regardless of the installed version of iPadOS, there are useful mitigations that can be used to significantly reduce your expose to risk.


Be wary of an often repeated myth that Apple devices are immune to malware; those that perpetuate this fallacy, perhaps with good intention, do not necessarily comprehend the broader threat landscape. Apple expend considerable resources in developing and issuing regular software security updates and patches for its products; if the myth had any substance, this would not be necessary.


The majority of threats to which you will be invariably exposed will surface via web pages or embedded links within email. These browser-based attacks can be largely and successfully mitigated by installing a good Content and Ad-blocking product. One of the very best and most respected within the Apple App Store - designed for iPad, iPhone and Mac - is 1Blocker for Safari.

https://apps.apple.com/gb/app/1blocker-for-safari/id1365531024


1Blocker is highly configurable - and crucially does not rely upon an external proxy-service of dubious provenance, often utilised by so-called AntiVirus products intended for iOS/iPadOS. Instead, all processing by 1Blocker takes place on your device - and contrary to expectations, Safari will run faster and more efficiently.


Unwanted content is not simply filtered after download (a technique used by basic/inferior products), but instead undesirable embedded content blocked form download. 1Blocker has also recently introduced its new “Firewall” functions - that are explicitly designed to block “trackers”. Being implemented at the network-layer, this additional protection works across all Apps. Recent updates to 1Blocker has introduced additional network extensions, extending protection to other Apps.


A further measure to improve protection is to use a security focussed DNS Service in preference to automatic DNS settings. This can either be set on a per-device basis in Settings, or can be set-up on your home Router - and in so doing extends the benefit of this specific protection to other devices on your local network. I recommend using one of the following DNS services - for which IPv4 and IPv6 server addresses are listed:


Quad9 (recommended)


9.9.9.9

149.112.112.112

2620:fe::fe

2620:fe::9



OpenDNS


208.67.222.222

208.67.220.220

2620:119:35::35

2620:119:53::53


Cloudflare


1.1.1.1

1.0.0.1

2606:4700:4700::1111

2606:4700:4700::1001



Use of the above DNS services will help to shield you from “known bad” websites and URLs - and when used alongside 1Blocker, or other Content Blocker provides defense in depth.


There are advanced techniques to further “harden” iOS/iPadOS (such as using DoH, DoT and DNSSEC). Apple has recently introduced its new Private Relay to its iCloud+ subscribers - in part employing ODoH (a variant of DoH) as an element of this new functionality.


I hope this information and insight proves to be helpful. 

3 replies
Question marked as Top-ranking reply

Mar 8, 2023 8:14 AM in response to cherrypie7

Scam.


Providing your iPad has been kept up-to-date with system software updates, you should not be overly concerned for your iPad being directly compromised. Most alerts that you may see are pop-up messages from websites - these being designed to scare the unwary into giving away sensitive information - or to fool you into doing something that you shouldn’t.


Due to the system architecture of iOS/iPadOS, unless jailbroken, your iPad is not susceptible to traditional malware infection per-se. However, as with all computer systems, there are still vulnerabilities and exploits to which you remain vulnerable. For older devices, no longer benefiting from regular security updates, the risk of an unpatched vulnerability being exploited increases. Regardless of the installed version of iPadOS, there are useful mitigations that can be used to significantly reduce your expose to risk.


Be wary of an often repeated myth that Apple devices are immune to malware; those that perpetuate this fallacy, perhaps with good intention, do not necessarily comprehend the broader threat landscape. Apple expend considerable resources in developing and issuing regular software security updates and patches for its products; if the myth had any substance, this would not be necessary.


The majority of threats to which you will be invariably exposed will surface via web pages or embedded links within email. These browser-based attacks can be largely and successfully mitigated by installing a good Content and Ad-blocking product. One of the very best and most respected within the Apple App Store - designed for iPad, iPhone and Mac - is 1Blocker for Safari.

https://apps.apple.com/gb/app/1blocker-for-safari/id1365531024


1Blocker is highly configurable - and crucially does not rely upon an external proxy-service of dubious provenance, often utilised by so-called AntiVirus products intended for iOS/iPadOS. Instead, all processing by 1Blocker takes place on your device - and contrary to expectations, Safari will run faster and more efficiently.


Unwanted content is not simply filtered after download (a technique used by basic/inferior products), but instead undesirable embedded content blocked form download. 1Blocker has also recently introduced its new “Firewall” functions - that are explicitly designed to block “trackers”. Being implemented at the network-layer, this additional protection works across all Apps. Recent updates to 1Blocker has introduced additional network extensions, extending protection to other Apps.


A further measure to improve protection is to use a security focussed DNS Service in preference to automatic DNS settings. This can either be set on a per-device basis in Settings, or can be set-up on your home Router - and in so doing extends the benefit of this specific protection to other devices on your local network. I recommend using one of the following DNS services - for which IPv4 and IPv6 server addresses are listed:


Quad9 (recommended)


9.9.9.9

149.112.112.112

2620:fe::fe

2620:fe::9



OpenDNS


208.67.222.222

208.67.220.220

2620:119:35::35

2620:119:53::53


Cloudflare


1.1.1.1

1.0.0.1

2606:4700:4700::1111

2606:4700:4700::1001



Use of the above DNS services will help to shield you from “known bad” websites and URLs - and when used alongside 1Blocker, or other Content Blocker provides defense in depth.


There are advanced techniques to further “harden” iOS/iPadOS (such as using DoH, DoT and DNSSEC). Apple has recently introduced its new Private Relay to its iCloud+ subscribers - in part employing ODoH (a variant of DoH) as an element of this new functionality.


I hope this information and insight proves to be helpful. 

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

"Your iPad has been hacked" Pop-Up Notification

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.