How block remote access, and remove who control my devices?

Well, this is my first entry. Anyone who thinks it's imagination and has unshakable faith that no one hacks apple, can leave. Who knows how this is actually possible, common, and harmful, please I need help.

I have many details but nobody wants to know about long texts. In short:


A few months ago I found some strange things on my iphone 6, because it was old I thought it was normal, planned obsolescence, a gift from Apple. But it got serious.


What happens directly at this moment is: My Iphone and MacBook Pro are monitored and controlled remotely. I myself took a while to believe until I discovered the existence of assistive control. Logic, Xcode and many other Apple apps that easily mirror your device.


Oh but doesn't that mean they're using it? I don't know if these, but inside the Mac I found, doing a long search, several servers, mapping files and dns hijacking, and later I realized that I was browsing a limited phishing network. I'm not even sure this post is going to the right place. After all, the icloud itself here, repeats the login screen and after being logged in it says that it is not.


I watched icons on the iPhone move out of screen space, which makes sense with what I found out later with assistive control, it looks like my iPhone and Mac screen, is a piece of something bigger, that only that piece shows for me.


It's no use for me to turn off wifi and bluetooth, right after they are on. It's no use configuring anything, which they change soon after, and many times the screen I think I'm configuring is fictitious.


Yes, all my data was exposed. icloud, documents, my iphone insists on keeping facetime and imessage and game center on. although nothing appears to me.


Yes, I clicked on links sent by people I thought I knew, a serious mistake nowadays, where voices and faces serve to produce anything. And on one of those days, when I was blackmailed, a real blow, the iphone automatically reset and reinstalled the system, only different. AppStore doesn't look real. By the way, curiously I discovered that the last purchase in the app store was in 2021, after that they all appear as Itunes Store.


Yep, my Mac too, watched delete folders, move files, clearly remote controlled. I don't understand why bluetooth forces file exchange if I don't even use it, and some things can be used to mislead.


I formatted it, changed the hd, it didn't help. It looks like my network is compromised.


In conclusion, what do I do? Does anyone know if have a way to solve it? Or should I put all my Apple equipment in the trash? Because of the insecurity of this brand that boasts of not being hackable?


Apple support doesn't work, but can be phishing. Apple help line it's a legend, no one answers.


I know that my equipment is not new, and I intend to change it soon, but that is not a reason for Apple to give carte blanche to scammers within its own system. Yes i have files to prove. No i cant send here, they are saved externally and it is not safe to connect to my devices.


I already registered with the police, but Brazil, you know how it is.


Is there anyone here with the knowledge and skill to help me put an end to this? Please, contact me.


MacBook Pro 15″, macOS 10.13

Posted on Apr 11, 2023 8:29 PM

Reply

Similar questions

2 replies

Apr 13, 2023 4:55 AM in response to Romeroh379

“. . . What should I do . . ?”


Based on what you’ve provided I would guess your AppleID has been comprised in some way? In which case change your AppleID password asap or better still stop using it altogether and create a new one instead. Sign in with it on your devices after signing out of the old one. I’m offering this advice/insight based on two assumptions:


1 - the devices you mention are yours alone, belong to no-one else and you’re the only person that has access to them.

2 - the network (Wi-Fi and/or Wired) you regularly use is your own private home network that only you and no-one else uses.


If the answer to either/both of the above is no then someone else (probably someone you know) knows your password and has the time and opportunity to use your devices either in your presence or not.


One thing I can tell you is if you format the hard drive and install the standard OS and add nothing else then you won’t see the type of behaviour you describe provided of course it’s only you and your network.


Probably not what you want to hear but it’s the best I can do given the context of your post. Good luck.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

How block remote access, and remove who control my devices?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.