MDM on personal iPhone - Businesses, unauthorized developer activity HELP!

I am a personal 'User' I have cycled through many hours and days with support. No one knows what is going on. Most likely because I am never able to speak with someone that understands the Enterprise platform. I feel this is happening via my carrier- but Fraud sent me to Tech support. Tech support told me my phone is hacked and to file a police report.

In combination I suspect that MDM is a gateway for an external developer to access my phone via various methods: webkit, Xcode, Apple Store Connect, SDK

I am about 99.99% sure I know why, but that is something that I will not disclose because most likely all of my activity is monitored; despite the very strict privacy settings I try to maintain.


Symptoms:

  1. My apps will sometimes tell me they did not come from the App Store (Maps, FindMyiPhone, etc..)
  2. When I make an attempt to chat with Apple support I receive a message to Use Messages to Connect with Business. When I have my iPhone in LOCKDOWN mode I receive a message that I cannot use Messages for Business when my device is locked down.
  3. I only have one device. However, I am sharing across devices- many times or I have the option to. The choice is not grayed out.
  4. I am unable to perform an Emergency Reset because I am usually sharing something - Notes, Home, Health, Books....
  5. I do not use iCloud Drive due to multiple security concerns. Almost every time that I double check those settings apps show that they are using iCloud Drive. (Game Center, Health or Fitness, Notes, Books, Apple Support, Wallet) While clicking to turn OFF syncing I have had a battle with it changing right back before my eyes. (I have screen recordings)
  6. Game Center will come on even though I have strict Screen Time settings.
  7. I am generally either sharing, or my phone is gathering data from Health; even though that privacy option is supposed to keep that from happening.
  8. Sometimes I am unable to even sign out of my phone due to 'restrictions'.
  9. I have 'Share with Family' sometimes

*Those are only a few symptoms. That is minus the horror I see from the extraction of information I backed up into Kali Linux

As I have mentioned I have spent many many many hours with Support. One Senior Director did spend time Googling the services that show up in my Analytics. I have even uploaded screen shots and documents, but I never heard back.

I REALLY REALLY need help here.

I will add attachments. They won't be nearly the amount I have. I am begging!!!



iPhone 13, iOS 16

Posted on Apr 2, 2023 2:32 PM

Reply
Question marked as Top-ranking reply

Posted on Jul 24, 2023 11:49 AM

Part 3, they have also done Siri searches on community! I was not aware Siri could do such things. My scenarios like health data is just like yours! Same with all, Game Center, iCloud (which I never used before), also frequent views of calendar, photos, notes and more. Plus many scripts under shortcuts. Beware of running these scripts. You can view them by clicking on the ellipse or “…” note that some words may sound innocent, but the actual full coding is usually stored in a cloud (not iCloud). Some of these scripts also allow full remote control. SSH over port 22 was used to access the network, I gather to expand beyond what the MDM could do, such as installation of a hidden key-logger, found in registry of a windows PC.


I would not openly identify who you suspect, it is perfectly legal (from what I understand, but I’m not an attorney) to identify a suspect, but you might be wrong, and you don’t want to damage someone’s reputation (or I don’t). Especially if you once cared for this person. It’s likely someone you were very close to at some point, and they could have had a key to your home.


So read, study, beg for help, hire pros, new equipment and you will be wasting time and money! Although I’ve learned more than I ever wanted to know about Apple security.


Oh, another “hacking event” with Apple seemed to show up as a 44 page document on my iPhone (were they helping me? Not sure. But it was a guy named Hinchy (I think) vs NYC, this guy was selling Spyware under the guise of Parental Control Software, a 44 page document. He was fined $440k in court. And I should add that I can’t delete notes anymore, the options are removed.


Anyway, with so many issues it’s hard to stay focused. The point of the summarized and difficult to find hacking incidents is to provide absolute proof to authorities in hope of getting this to stop.


So, collect data, document, locate hidden apps, (many are free and impossible to remove). Try to provide brief summarized readable by anyone information (you can add details behind that data) by category (email, apps, settings, rogue connections, unwanted changes, if applicable fraud, credit card applications (freeze credit) and so on. Most people don’t read more than the first page! Keep in mind that everything is monitored. Apple must keep data for 10 years, some for 20 even though most reps deny that fact. After you have a reasonable amount of data, provide this info to local authorities. But first find out if the local Sheriffs Department will help, I’ve read they are more likely to help with a subpoena than police. The subpoena will not be accusatory or cause the attacker to get charged, but you could request a restraining order.


And, scan house for active devices, almost all IoT contain no security or very little, my Rokus were compromised! The data was viewable on the router. Check out Wi-Fi connections listed under Wi-Fi. There is a way to view the password on devices that have previously connected, look that up I don’t want to post here! Look for rogue managed hotspot, include that with documentation. Anything that has been brought into your home is likely compromised, even things that were not set up. Smart TVs and sound bars for TVs can be compromised. Go to a public network and look at your email and accounts, view source, I’ve found many pages of creation of a fake email “pass through” page that restricts the view source function on MDM. Keep in mind that public Wi-Fi is generally not safe. But at this point you are already compromised. The MDM uses “web clips” you may have noticed this being used under certain apps, some are valid, some are not. But the MDM does not use Safari to browse, it uses web clips! This enables site blocking, removal of tool bars, and fake pages.


On email, in Apple and other mail, there are automatic deletes, password resets, security vender emails, monitoring alerts, much more! Especially if a premium support option has been added. Look at shortcuts, fake emails can be sent from shortcuts with your email address. Under shortcuts, go to the bottom, type in email or message, one will say send email or message, try sending yourself one, see results. Beware of executing any script, many do much more than what’s stated, search on bottom for ssh, if it’s been used, it will show up. Apple apps provides programs that allow the user to create scripts using several different programming languages. Search on App Store to see this app. It’s not the library, but the one that specifically provides the ability of SSH, CMD, and others.


And realize even if you harden your firewall this can be circumvented with the hotspot, bypassing rules.



Similar questions

160 replies

Nov 8, 2023 9:56 PM in response to JMurphyCO

Hello…did you ever find a solution? I have gone through an iPhone15 (direct from Apple, an IPhone 12. (wiped and reset), a Samsung AOS, a Motorola Pure G, 3 carriers, a windows 10 PC, they have hacked 5 Gmail accounts (also my Apple IDs) and (2) other emails. If that wasn’t bad enough they are spoofing me. They are answering my calls pretending to be me and intercepting outgoing calls and pretending to be tech support for my carrier. I am being served web pages in French. Web pages with errors. I’m also always showing up in New York as my location. They are constantly in my iCloud account doing things like disconnecting my eSim, leaving creepy photos of me. I basically can’t live my life because I’m always trying to get unhacked. My theory that ties all these things together is a Stingray or Dirtbox. They also hacked my ADT panel. I found a known WiFi network that I have never signed into. I never sign into WiFi. Then on my other iPhone I found the same network and D-link. They are constantly using my devices, doing things like downloading music. My PC is terrifying. I think I may have figured out how they exploited it.


Any advice? I can’t trust anything.

Nov 8, 2023 10:10 PM in response to Park3rr

I posted to someone earlier. I 100% think it’s a Stingray or Dirtbox. I don’t even have the energy to go through everything they have destroyed. They have completely stolen my identity and have done things like set up accounts using my name and number. I’m being hacked, spoofed, phished and doxxed. I actually think my Pc is the source of hacked passwords. Did you ever get anywhere with this?

Nov 9, 2023 5:35 PM in response to EllieDolanStl

I guess my last post was deleted. I feel like I have found “my people. I’m compiling all my issues for everyone; FBI, FCC, FTC, local law enforcement. Sorry for all the posts but I feel so much better knowing that I am not alone. See earlier post for how many devices and carriers I have been through. I’m not entirely sure what exploit everyone is taking about but literally can’t function on any of my devices. I realize the implications of what is happening and how companies are going to try to cover this up but I feel obligated to go public. This is the craziest thing I have ever seen. I could definitely use some more explanations of what everyone thinks is going on (in plain English). My last post was asking about everyone’s location. Im asking because I am almost 100% positive that a Stingray or Dirtbox is being used since I am also being spoofed, combined with the this exploits that take over so quickly. I mean I’m spending all my time fighting this. It’s so unbelievable I keep thinking it’s a joke or test or something other than a stalker (which I definitely have). Can someone please reach out to me to explain what they think the exploit is in as plain language as you can. My PC I swear was being used as a mini server. I watched all these people log in an out one night. They used my name and number to set up fake accounts. Seriously, I cant make a call, they pick up, I can’t send an email, they have the password to all of my accounts, I got through to the FCC but only because it was a form. I would like reality back. I want to know who I am taking to is who they say they are. I don’t want to have to guess if someone emailed me and it got deleted. Help!!!

Nov 17, 2023 6:48 AM in response to AgentDragonfly

Omg I’ve been going through this for 5 years there is so many of us with the exact problems, every phone laptop MacBook router cctv gaming console

multiple ids sims esims Carriers internet providers

im not sure if a combination of stingray and Iot or separate

but have now found iot core version os on my home version pc just to get the mdm privilege so looks like I’ll be searching for a clean device to dfu my 14 pro for a few days peace.


I’ve only replied to add a me too in hopes someone figures it out,

or at least 1 more to add backup for a support call to lose 2 hrs of your life you won’t get back

I’ve lost more than a day over the 5 years and the last 1 was to go to the police, who directed me to a cyber tech for concrete proof ($800/hr was the best quote I got)


Nov 18, 2023 10:52 PM in response to shoeluvr13

You know, that is very condescending of you and quite unhelpful.


I have a pretty solid understanding of Tech as Exec in charge of a corporate technology and you don’t even need to be…

How about you explain this?

  • my WiFi connected stove, fridge, door bell, vacuum robot, etc. they run up between 10 and 20 GB traffic (each!) every month.
  • my router seems to to a DNS spoofing to Russia and back
  • As soon as I enter my house, my ipad and IPhone ask for my google account credentials (with WiFi off)
  • bluetooth devices show up that are in the drawer since months or years and not connected (HomePod, Apple Watch) and… not just show as device visible they show as device connected.
  • Game Center switched on again out of nowhere.
  • Apps suddenly synching to iCloud that had been set not to sync
  • same device suddenly showing twice in screen time

…. I could go for quite some time.

had this identified ca. September 2020


forget about finding someone to help. It‘s either totally targeted and most others are paraonid (like i could be too, right?) or it‘s too toxic too make known - for Society as we live and know the world not possible to digest. Panic, unrest, etc.


Dec 6, 2023 11:38 AM in response to Desperatelyneedhelp11

Continued...


To be perfectly honest, you do sound a bit paranoid and are drawing any number of wrong conclusions based on your observations of and lack of technical knowledge of various things but this is normal and an expected response to legitimate concerns that you have based on what you yourself have witnessed. It'd be useless to attempt to go back and align your experiences with the exact reality of what occurred and verify everything as being legitimate or not-relevant/mistaken as you are surely wrong about a certain percentage of what you believe you are witnessing possibly thanks to ordinary human paranoia. Almost everyone making similar claims has however observed something that is genuinely malicious but again it'd be fruitless to attempt to go back in time and pinpoint what exactly you've witnessed. I believe you though that there are nefarious forces at work causing your distress.


I myself have encountered things that at the time were difficult to understand and caused me noticeable distress. I just quickly learned to limit the extent to which I allowed any of that information to affect me.


You can waste hours days weeks months years trying to figure it all out...and if you do who has really won? It isn't you. You can't win. There is a battle going on every millisecond between the good and bad entities that comprise the internet. The problem the good guys can't destroy the bad guys since vulnerability is inherent to communication. You can't really have security and connectivity. When you allow for two endpoints to communicate you are decreasing security in some way to allow it. Just like being a part of society exposes you to the risk of biological viruses but people still want to live in big cities. They don't choose to hide under rocks or behind masks for all time.


You can win by taking back your time the ability of these things to phase you and rob you of your time and well being. However you do that, but let me tell you it isn't by reporting your findings to the FBI. If they wanted or needed your information, you'd know. Until then, don't waste your precious time..it's a finite resource. Let go of the belief that you are entitled to some level of security that would ensure privacy. They notions were sold to you as a very effect marketing campaign, but they never actually existed. At least not in the form you believed in, even though so many are so convinced they are tangible things..as if they're so real you can hold them in their hand.

Jun 1, 2024 9:50 AM in response to AgentDragonfly

I have the same thing for 3 yrs whether it’s a android or apple and factory reset doesn’t work so tired of ppl saying apple can’t be hacked and we have no business looking at system logs I don’t understand everything but I do know how to copy and paste


3 times I factory reset my phone and there are calls and messages still on phone camera light on when I’m not using my phone settings change cant open camera or certain apps says there are restrictions


[Edited by Moderator]

Jan 16, 2024 5:40 AM in response to AgentDragonfly

Also, look into AWS Snowball. It’s a device used to mirror your phone and control it. It’s produced by Amazon. I found this out after talking to Coinbase and they sent me a follow up email with Snowball Phone in the subject. It uses Wickr as well.


I called Coinbase and asked they said they could not talk about it because it was internal Coinbase information… Super sketchy.

Feb 17, 2024 7:56 AM in response to AgentDragonfly

I was hacked and the police told me to get a new phone. So I bought a brand new iphone, brand new internet connection. I created a brand new Apple ID and was unable to access my 2 factor ID/Apple security key within hours of bringing the home.

Hours With Apple support, including an escalation supervisor and 10 months later I have no control over my personally digital identity.

It is upsetting & frustrating.

I’ve tried to fix it on my own and it’s just a loop of password resets and bogus captchas.

I am beginning to think it’s more so related to my house than the actual phone


Do any of you know of a digital identification management software company that is reliable?


[Edited by Moderator]

Feb 26, 2024 11:03 AM in response to AgentDragonfly

I’m trying to follow you but I can’t press the follow button it’s erased out and I can’t like your post either.


I’m have been going through this for a year. Everything is hacked. I have nothing. My bank watched for a month and believes me. I got an iPad luckily but it immediately got hacked as soon as I set it up. I have had a lot of information. I am sick of being looked at like I’m a crazy person. I really like to get a hold of everybody that said this happened to . I know where to talk safely I know how to figure out a lot of things but I really like to talk to some other people this is ****. ****. ****. I can’t even type without being harassed. I’m going to look And see if I can find any of this group.


I have an iPad 10 completely up-to-date I have touch ID I haven’t bothered in ambling anything besides two factor but it always gets deleted anyways. A lot of good the iCloud email address does because they won’t give it back to me . Recovery days I never get an email to say I’ve proven it’s me it doesn’t take a genius I’ve had account for over over over 10 years but the hackers get to spend more time in my business than I do. The thing

I hate the most, stealing and copying my Stories and letters and blogs participation, rough drafts, short stories.

my contact list.

I have impeccable credentials or had, I don’t know what’s going on my social accounts I can’t even imagine.


I don’t know what kind of delusional world that some of these moderators live in but you only need to go listen to the Washington Post podcast the very same thing happened to a Washington Post journalist, it’s all documented . The fact what this is. yes, very sadly , because I love apple products but I can use them very well right now , they have done it isn’t even hacking. It’s outright theft.



Feb 26, 2024 11:22 AM in response to achoo274

I apologise for my spelling mistakes I didn’t have time to do spellcheck I’ve got that blue recording microphone that’s supposed to be dictation. I’m pretty sure it’s a whisper product made by chat gpt. I saw a little symbol on it earlier year last year. I saw the same symbol over at the chat GPT site. The bast-rds keylogger. I don’t bother calling Apple anymore. Sometimes it but most the time it’s not.

Do you know that they mimic logging into my bank? Spoofed and made it look like a bank.

My friend that had this happened to her she says it’s not a bank it’s not a bank usually she doubts me , So I don’t believe anything anymore.


This just isn’t right. I feel pretty alone. The people in town here that this happened to have lost contact with them because my phone got stolen from the bottom level huge group.


I don’t think people understand the fact that it takes six times longer to do anything but that you’re doing something it undoes other things.


2023 I was supposed to go to school, while dealing with my health crisis.


there is no Apple Store here, I have no second device, I have got it cyber cleaned. I had to pay to get it cybercleaned. I’ve changed my Sim card I’ve begged my cell phone provider to help, I’m said to them ; do not think it’s weird that I have 78 GB used of my data and I have the toggle off?

This is theft. Worse. I’ve been saying what this is for over here and I was never talking about any of the stuff before.

This was zero day. I did nothing. I thought I had but I since spoke to the party I thought was the culprit because they have been cloned/ overlays relentlessly.

Even when the advertise doesn’t see.



But they’re all through the Wi-Fi. I got locked out of my phone, I couldn’t call anybody.

I have a landline now I’ll see how long this lasts.


I reported it.


Feb 26, 2024 1:57 PM in response to celliott147

Nothing. But on my Mac air I’ve run the commands (lmsk??? sfltool dumpbtm ps xawww | grep.. ?? I forget) and found MDM (force time and date etc) and there are install logs for random stuff, a little above my head, in the system info, so two cheers for Settings.app. It gets worse since I’ve tried to hire outside help because they always muddle things up with their own stuff instead of just looking into the machine. (I’m suspicious of them now sad:( since I have experienced so many DDOS attacks…)


btw what happens when you got to activity monitor and look for controlCenter>Wifi>network or whatever. Do you have 3, maybe 4 processes running like ControlCenter>WiFi, and (CC>WiFi) and ((WiFi)) and (((WiFi))) & ((((CC>network>wifi)))) etc ?

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

MDM on personal iPhone - Businesses, unauthorized developer activity HELP!

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.