MDM on personal iPhone - Businesses, unauthorized developer activity HELP!

I am a personal 'User' I have cycled through many hours and days with support. No one knows what is going on. Most likely because I am never able to speak with someone that understands the Enterprise platform. I feel this is happening via my carrier- but Fraud sent me to Tech support. Tech support told me my phone is hacked and to file a police report.

In combination I suspect that MDM is a gateway for an external developer to access my phone via various methods: webkit, Xcode, Apple Store Connect, SDK

I am about 99.99% sure I know why, but that is something that I will not disclose because most likely all of my activity is monitored; despite the very strict privacy settings I try to maintain.


Symptoms:

  1. My apps will sometimes tell me they did not come from the App Store (Maps, FindMyiPhone, etc..)
  2. When I make an attempt to chat with Apple support I receive a message to Use Messages to Connect with Business. When I have my iPhone in LOCKDOWN mode I receive a message that I cannot use Messages for Business when my device is locked down.
  3. I only have one device. However, I am sharing across devices- many times or I have the option to. The choice is not grayed out.
  4. I am unable to perform an Emergency Reset because I am usually sharing something - Notes, Home, Health, Books....
  5. I do not use iCloud Drive due to multiple security concerns. Almost every time that I double check those settings apps show that they are using iCloud Drive. (Game Center, Health or Fitness, Notes, Books, Apple Support, Wallet) While clicking to turn OFF syncing I have had a battle with it changing right back before my eyes. (I have screen recordings)
  6. Game Center will come on even though I have strict Screen Time settings.
  7. I am generally either sharing, or my phone is gathering data from Health; even though that privacy option is supposed to keep that from happening.
  8. Sometimes I am unable to even sign out of my phone due to 'restrictions'.
  9. I have 'Share with Family' sometimes

*Those are only a few symptoms. That is minus the horror I see from the extraction of information I backed up into Kali Linux

As I have mentioned I have spent many many many hours with Support. One Senior Director did spend time Googling the services that show up in my Analytics. I have even uploaded screen shots and documents, but I never heard back.

I REALLY REALLY need help here.

I will add attachments. They won't be nearly the amount I have. I am begging!!!



iPhone 13, iOS 16

Posted on Apr 2, 2023 2:32 PM

Reply
Question marked as Top-ranking reply

Posted on Jul 24, 2023 11:49 AM

Part 3, they have also done Siri searches on community! I was not aware Siri could do such things. My scenarios like health data is just like yours! Same with all, Game Center, iCloud (which I never used before), also frequent views of calendar, photos, notes and more. Plus many scripts under shortcuts. Beware of running these scripts. You can view them by clicking on the ellipse or “…” note that some words may sound innocent, but the actual full coding is usually stored in a cloud (not iCloud). Some of these scripts also allow full remote control. SSH over port 22 was used to access the network, I gather to expand beyond what the MDM could do, such as installation of a hidden key-logger, found in registry of a windows PC.


I would not openly identify who you suspect, it is perfectly legal (from what I understand, but I’m not an attorney) to identify a suspect, but you might be wrong, and you don’t want to damage someone’s reputation (or I don’t). Especially if you once cared for this person. It’s likely someone you were very close to at some point, and they could have had a key to your home.


So read, study, beg for help, hire pros, new equipment and you will be wasting time and money! Although I’ve learned more than I ever wanted to know about Apple security.


Oh, another “hacking event” with Apple seemed to show up as a 44 page document on my iPhone (were they helping me? Not sure. But it was a guy named Hinchy (I think) vs NYC, this guy was selling Spyware under the guise of Parental Control Software, a 44 page document. He was fined $440k in court. And I should add that I can’t delete notes anymore, the options are removed.


Anyway, with so many issues it’s hard to stay focused. The point of the summarized and difficult to find hacking incidents is to provide absolute proof to authorities in hope of getting this to stop.


So, collect data, document, locate hidden apps, (many are free and impossible to remove). Try to provide brief summarized readable by anyone information (you can add details behind that data) by category (email, apps, settings, rogue connections, unwanted changes, if applicable fraud, credit card applications (freeze credit) and so on. Most people don’t read more than the first page! Keep in mind that everything is monitored. Apple must keep data for 10 years, some for 20 even though most reps deny that fact. After you have a reasonable amount of data, provide this info to local authorities. But first find out if the local Sheriffs Department will help, I’ve read they are more likely to help with a subpoena than police. The subpoena will not be accusatory or cause the attacker to get charged, but you could request a restraining order.


And, scan house for active devices, almost all IoT contain no security or very little, my Rokus were compromised! The data was viewable on the router. Check out Wi-Fi connections listed under Wi-Fi. There is a way to view the password on devices that have previously connected, look that up I don’t want to post here! Look for rogue managed hotspot, include that with documentation. Anything that has been brought into your home is likely compromised, even things that were not set up. Smart TVs and sound bars for TVs can be compromised. Go to a public network and look at your email and accounts, view source, I’ve found many pages of creation of a fake email “pass through” page that restricts the view source function on MDM. Keep in mind that public Wi-Fi is generally not safe. But at this point you are already compromised. The MDM uses “web clips” you may have noticed this being used under certain apps, some are valid, some are not. But the MDM does not use Safari to browse, it uses web clips! This enables site blocking, removal of tool bars, and fake pages.


On email, in Apple and other mail, there are automatic deletes, password resets, security vender emails, monitoring alerts, much more! Especially if a premium support option has been added. Look at shortcuts, fake emails can be sent from shortcuts with your email address. Under shortcuts, go to the bottom, type in email or message, one will say send email or message, try sending yourself one, see results. Beware of executing any script, many do much more than what’s stated, search on bottom for ssh, if it’s been used, it will show up. Apple apps provides programs that allow the user to create scripts using several different programming languages. Search on App Store to see this app. It’s not the library, but the one that specifically provides the ability of SSH, CMD, and others.


And realize even if you harden your firewall this can be circumvented with the hotspot, bypassing rules.



Similar questions

160 replies

Apr 30, 2023 7:01 AM in response to Community User

You are quite correct, fortunately no one has accused me of being crazy as I’m a psychologist.


I guess what we have to remember is these discussion forums are answered by fellow Apple users and not Apple staff. So we may not find much support.


Whatever this is extremely insidious, my sharing is all disabled on my iPhone yet it is constantly searching for powered and unpowered devices nearby. I can see the data usage does not add up to the user activity. I feel sick to think how long it was on there without knowing and what it has captured of my children as it’s a part of their daily lives too.


It is something akin to the Mac Dirty Cow, although what is done after it is exploited I suppose may vary, there are actions being performed on my devices that I cannot find references to anywhere.

May 25, 2023 7:58 AM in response to Community User

Question, can you see JavaScript and Xcode on a Mac? The MDM spread to Windows with the fraudulent remote access apps, I could see that, but permissions are changed always, MDM on, parental controls on. Another question, I unplugged my router 8 weeks ago, but they are still accessing devices, I’ve seen ppl parked at end of driveway a couple of times when several devices were active but not every time. I’ve seen a lot of data transfers on Roku )not to movie or Roku). I did a scan for active BT, one Roku showed up (I’ve seen many users on there as well), and data transfers from the former Alarm. Idk if Roku is connecting to neighbor? Lots of settings and downloads are put in iCloud with synch to all, but a user can’t do that, unless it’s a MAC option. I’ve had tons of scripts, not always visible on iPad (unless under shortcuts), but visible on a Windows PC (although 7 PCs are compromised). I know the MDM will have to be blocked before entering my house!

Jun 3, 2023 7:56 PM in response to AgentDragonfly

I know a lot of what is happening and have documentation, read through my posts. But the knowledge does not help to remove the MDM. I wish I could help you. I have decades of security experience (now disabled). But even with Corp Security tools, I still could not remove this. I can’t even delete games. And ppl that say you are crazy just don’t understand the complex technology. The MDM tool does not appear to be complicated, but it causes a lot of damage. Please do write to IC3.org, it might help with the antitrust issue with MDM that the DOJ considers to be a high security risk!

Jun 30, 2023 10:06 AM in response to Community User

To Pia, I received info in my inbox sent by you, but attempting to use the link to your post was blocked, it included the wording “can lshow you a screen shot where the Mac “. I’d read that you must have a Mac to install this, I have no MAC. But I’ve received attacks and such from a MAC, web iCloud access with a Mac and more. I’ve lost a lot of $ due to equipment destruction, hiring ppl, software and much more, a lot of fraud, including Apple apps that were purchased then hidden. I also read that purchases only show on the device used to purchase, but sometimes I see these purchases, and some are free. When I searched on your name, only the above post showed up. I should mention the app is hidden. At one point, I decided to download the App, it was the only app I’ve seen to date that included a hide or hidden button on the shortcut. When I downloaded, it said I had to contact the administrator [of the Apple Configurator or MDM] to view anything. I have the usual symptoms of MDM plus many more at this point, lots of JavaScript on websites, 87 JS under shortcuts in one day. Getting new everything has not helped. I completely disconnected my Internet weeks ago, but they are using a rogue Wi-Fi router. I’ve found 3 other routers, but not this one. It turns on Bluetooth then the router, all devices have been compromised. Resetting network made no difference. Turning off settings, no difference as they get turned back on. Only my iPhones have connectivity. A lot of data transfers in the background, and my devices had data offloaded to a cloud service, about 9 were installed. Simple settings, like only use the current number for messages does not work, they are broadcast across devices. Also, I recently found out that ppl were coming in my home when I’m not here. Ok, I don’t recall the last time I went to iTunes, I used to avoid all apps on phones, at least no third party apps. The other thing, the beta site, I’ll have to try to find that. But there is no MDM under VPN settings, there is a link to work or school but the Apple ID does not work there. Must you have a Mac to view this information? It’s been a long time since I’ve used one. And I don’t recall, but it seems like you can’t search MDM on IOS, found many entries on Windows PCs, 1,000+. Then strangely enough, if I start out with a new PC or reformatted device, settings are changed within 3 minutes, permissions, accounts deleted, restricted to C drive, restricted on everything I look at! All with no Wi-Fi network (except the rogue). Same thing happens in router/firewall. When I reset, or buy another they jump in, change admin password and throw me out. This app is one of many that were installed and hidden, like 2 remote access apps, a screen recorder (which I can view but without any controls), it even created and mailed a link of the recording to me and company (someone else?).


I”m certain I’ll have to get rid of all equipment again, but the MDM scans for all devices, phones, PCs, iPads, IoT, everything.


ok, did your actions get rid of this? Must I get a MAC computer? There have been many attacks on Apple lately, one called VastFlux and it used JavaScript, 11 million phones! Plus, 1,700 apps on the App Store were infected, even viewing the ad for these apps caused infection, dubbed the largest attack in history. More on Human Security, point is, I think the flood gate is open. Antivirus has been no help on the iPhones.


I have to remove the MDM, I even asked if I could install it on a new set of devices, but was told “NO” because I’m not a company! This is not a third party app, it indicates it was developed by Apple.


so, would getting a MAC work or help? Are the MAC devices able to be protected with AV? Can you see installed files? I’m seeing something new now, attempts to install a “WebKit” which some sites indicate has been compromised, but this activity is not very visible. Could I use an iPad to view anything? We have public places where you can go and use computers, but no MACs, and you can’t install anything. I’m going to look for the beta site. Thanks so much for your info. This has been going on for 2 years now.



Jul 11, 2023 2:02 PM in response to gravityfed

More to gravityfed:

I guess you must get rid of everything that could have Wi-Fi, Bluetooth or mobile access, possibly DECT, but not sure. Getting just new Apple devices won’t help. So, router, modem, printers, PC, Apple, any old devices, all light bulbs, connected cameras, TV sets of vulnerable, Wi-Fi headsets, much more. more. Other devices as well. Idk if you put “smart” devices in the guest network would help if already compromised. And keep in mind, if you configure your smart device using something that resides in your regular 2-5 ghz router, you just crossed over.


There are many things that I can’t remember how to do (if I ever knew), like securing remote access with 801.x, ppl get in my network within minutes. Firewall rules get over written in seconds. It seems very extreme. I was in Info Security for many years, never saw anything like this. And, you need a corp email/domain to read white papers about security tools! I’ve looked at the referenced logs you mentioned “The presence of beta identifier strings in logs” but what does that mean? I’ve seen installations of things, some worked some did not. But could you give me a sample of what I’d look for with “identifier strings”. I know that the shorter JavaScripts store most data in the cloud, but have no

idea how to view what is actually being done, unless it’s standard Apple Stuff. I know simple words can mean something very bad? Have you reported to IC3 dot org? They have a major issue with the MDM, search on that and Antitrust. I hope they lock this stuff down.

Jul 11, 2023 2:31 PM in response to AgentDragonfly

You only own 1 device? No Windows or android? Oh, it says Linux? Search on file system for MDM. Those apps are likely fake! Search on 13 million iPhones compromised (2015?). It involved many fake apps. It’s likely someone you know with a MAC computer. I think the initial install must be done with physical access. You can’t get rid of it. But it also gets on everything!

Jul 12, 2023 7:41 PM in response to AgentDragonfly

I have been going through this type of situation for 2 years 8 apple ids 3 carriers

3 brand new apple devices and one Mac Pro all infected the same way . I have tried everything once I put my name and dob in device it’s a dead ringer I cannot stop sharing with note or home. But I’m sure if all the users with the same problem can get help because as consumers we have rights

Jul 19, 2023 8:52 PM in response to gravityfed

I’ve found several hidden devices. If it’s the Hidden MDM, it does geo fencing and scans your network for any new devices. It appears they can get into network once MDM is installed, it sends a beacon and it searches for serial numbers. Contact IC3.gov as they (gov) are trying to get rid of the MDM due to security issues! Also, Apple keeps a record of all devices that access your devices, although you will likely need a subpoena. I’ve read a sheriff can issue one. You will need supporting documentation.

Jul 24, 2023 9:51 AM in response to GSS_544

You can’t get rid of it unless you get a subpoena. Be very specific on data you need (they keep it for 10 years). It is likely the person you suspect. The MDM has a “geo fence”, or designated area that basically is used to scan the area around your house. Anything new automatically gets scanned and installed. There have been many reported cases of this same issue! Look at any “hidden” apps downloaded since it started, I didn’t know you could hide apps! You will likely see the Configurator. Or MDM, plus several other apps, such as remote access. I had to get help from Apple to view hidden apps. Apple also provides scripting tools, so SSH (used for remote access) CMD and so on can be purchased in the App Store. They say you must be a company or school to purchase this? It goes by the serial number which is also the Wi-Fi address, so unless the person/installer removes it, it will come back! Most of the script is stored in the cloud. You can see some of the scripts under shortcuts (JavaScript). I’m not an expert with coding, but like you, I gave it a try. It’s been two years now, and things get worse as time goes by. They even used Siri to search communities for posts.



Jul 24, 2023 10:01 AM in response to T3ddy19

T3ddy19 wrote:

You can’t get rid of it unless you get a subpoena.

How does a request for documents (or a request for someone to appear in court) remove anything from your phone?


It goes by the serial number which is also the Wi-Fi address,

Device serial numbers are not WiFi addresses.

They even used Siri to search communities for posts.

Siri does not have that capability.


Jul 24, 2023 3:17 PM in response to IdrisSeabright

It does not remove it from your iphone. A subpoena tells you who/what/when/where. Based on state, you might be able to get a subpoena from the sheriffs dept, or DIY, I don’t recall saying court? It’s not taking someone to court. You could get a restraining order (and request removal). The details would show who installed it.


I was also not aware Siri could do such things, I tried it myself with no results, but the search showed in history? And, Siri does provide web searches, since it was done, yes it can if you have the skill. But I’m not interested in Siri.


But the MDM and compromise has also done many things previously thought impossible.


I’ve already been told considerable information. I’ve not researched Siri or how it conducts web searches, but have received web sites when I tried it. But I’m really not interested in learning how to do web searches using Siri, I’m trying to remove the MDM.


what helpful info have you provided on how to remove the MDM? I thought you requested help, as others have.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

MDM on personal iPhone - Businesses, unauthorized developer activity HELP!

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.