How do I check my iPhone for spyware/malware
How do I check my iPhone for spyware/malware
iPhone 12
How do I check my iPhone for spyware/malware
iPhone 12
You don't.
There is no known malware that can affect an iPhone.
There's no way to install spyware, unless someone had physical access to your unlicked iPhone with a computer for an extended period of time.
There are no apps that check for these things, since due to the nature of iOS, there's no way for them to scan outside of the their own designated app area. iOS is sandboxes, that means apps cannot access areas outside of their own app sandbox.
If you explain what issue you are experiencing, someone may be able to an advise, but it's almost certainly not malware or spyware.
That's a big false. They do NOT need to access ur phone physically. There is multiple companies you can check. for example spyx. So If you are talking something based on the FACTS! please talk it right.
I can't believe we are paying thousands of dollars to new iPhone and someone can track this thousands of dollars iPhone with a demo? Is that a joke ?
Apple has to publish a program can detect `` spy softwares `` they are invisible in your phone, you can't see, you can't check with your own effort.
Apple has to make a program can detect this their IOS softwares to make it safe.
Otherwise Im going to back to 2000 and use a phone that has no internet connection only for talk. Alo to Alo that's very much all.
This is a serious problem. It doesn't matter if you are worth it to ur information think about your kid, your wife, your relations uncle, brother. What about if someone really hates you and want to destroy ur life with a demo spy Software. This is crazy. Apple is a big company if they can't make this phones safe. Im out.
Good luck to everyone who is looking for a help !!!
Im trying to reach someone who is facing with this issue.
1) If someone doing this to you from your company, friend or someone close to your home. Make sure getting a new wifi network and manage it to `` Guest Mode`` so If they reach out ur phone they would probably reached ur Wi-Fi network as well.
2) Don't use same Apple ID or backup from iCloud or anything. It would probably re effect your new iPhone.
3) Calm down and take a deep breath, make a search about the programs not the malwares. This piece of s*** spy programs. They are not malwares.
4) If there is any relatives in your home with old iPhone or android probably they are affected by the same person bcs same Wi fi network.
5) If you can't do anything about it sell ur iPhone and don't use any smart phone, buy a phone with no any internet connection. If there is a internet in a device, its not safe.
Btw these spy programs now doesn't require any physical touch, reaching, You can't see with ur own eyes like settings or photos app. Completely invisible in your phone. Anyone can track your phone by sending a link. It can be by sms, e-mail. You name it.
Stay safe. Missing old 2000s...
Will “xLSx123x” please reply to me? I have had the same issues since March 2023. In fact, there is a key logger logging my text as I write this. I have done inumerable things to right the situation, just as you did, with the same resilts. It is so frustrating, I’m tempted to just throw the phone—an iPhone 14 Pro Max—away. IF I can access it. I can’t even use my phone number. When I call out to ANY customer service line, I get this “help desk” with the same people who try to deter me from what I am attempting to achieve and who never have answers for me. I cannot call, for example, my own father or even 911.
Please get back yo me.
katherine
[Edited by Moderator]
Regarding the spyware subject, I see that my credentials are naught because I have offered no advisory details. I will outline my formerly proffered advice, including both technical and life advice, in order to help someone feel more in control of his or her privacy, as follows:
1) Come to terms with the sad fact that in a greed-based, market-competitive society, nothing is ever free. Even the air that we breathe comes with a cost. If you need to reach out for support or help of any kind, individuals MAY help you, but organizations exist through their own profit, so you may be further disenfranchised as a result of any help you receive.
2) My technical advice is to beware when using a gmail account as an Apple id. Possibly there is a glitch in Apple software (whereby your iPhone will MANIFEST an icloud account by default for email—as one “Apple Support” person explained), or you have been targeted (less believable, but true) by a focus group who is studying, for example, people’s vulnerability to predatory entities offering “deals” or loans through marketing techniques (I am extending the benefit of the doubt, here). If one person in the latter group has physical access to your phone for a few minutes, he/she may create an alias of your gmail Apple id to gain access in order to essentially clone another device via your alias icloud email account, providing a separate sign-in to your account, and eventually gaining total access to all of your data. Which leads to…
3) Keep your device away from other people and do not let anyone EVER use it.
4) Pay attention to red flags and know that your observations are yours, which makes them valid. Nothing observed by you is ever wrong or crazy. If anyone denies this, that person is telling you that your experiences are not valid. THAT, alone, is a red flag. That person should not be trusted.
5) Try to always be learning to understand the shifting nature of the hierarchy of the corporate world and learn about outsourcing and third party limitations and responsibilities under the umbrella of the outsourcing corporation. Read small print, read anything you sign, take your time to ask questions.
Good luck.
My ex-partner was accessing my iPhone XR for over a year before I realised what was going on. However that’s only because he WANTED me to know that he was keeping a very close eye on me.
He fairly certain he had access to my microphone and camera feeds because on more than one occasion he’s known exactly what I’ve been doing when I’ve been having ‘private guy time’ and other things he could only know from my camera or microphone. I’m uncertain whether he can screenshot or view my screen, however he definitely has access to my passwords because I was regularly losing access to my email, Spotify and everything else when the passwords were no longer valid and the recovery emails got changed.
He deleted all my photos from my iCloud, which then synced to all my devices. Before that though my photos and videos ended up on his laptop. I dunno whether iCloud web allows direct downloading of media like this, however my trusted devices list was consistently showing two iPhones so he had an iPhone logged into my Apple ID anyway. He has sent messages to my family and friends pretending to be me however that could’ve been via a cloned SIM card or just by using my iMessage.
Two of the strangest things were when I’d have a message from him on my iPhone Lock Screen, however when I’d go to Messages there would be no trace of ir. Another one I can’t get my head around is when I’d be typing a search term into Google and as I was typing the letters would be getting deleted, as though I had a backspace key with a mind of its own.
After many factory resets and using new Apple IDs it was all still going on so the iPhone is an expensive paperweight now and I got an Android instead. He did it to that as well, however a factory reset did seem to solve it cos there’s been no weird stuff happening since. Ended up getting myself a new iPhone anyway just in case and I use the android for things like apps that aren’t available on the iOS App Store or for filming stuff cos it has a bigger screen and better camera etc.
Absolute same here! For over a year. Every phone, device, tv, blink cameras, Alexa’s, Apple Watches, tablets. I have same managed device, the Apache thing, apple developer account I never made, my iPhone is newer so no sim in phone but the sim kept being transferred to another device, I also have the AAA root that I can’t remove bc it’s greyed out, as well as the Linux Ubuntu or Linux Debian, something linux. There’s so much code. Unknown files. Different time zones. There is NOTHING I can do to remove it. I think it sniffs Bluetooth or travels over the internet to every nearby device and infecting it. I also think I know the culprit (my bf) but can’t be 1000% sure I didn’t just get virus or hacked. My phone provider is Xfinity and their reps said they think someone took my phone and used usb to download this. I also believe the calls and texts are not only recorded but can be somewhat controlled by whoever is doing this. Also I think my bf jailbroke my phone without my knowledge. When I go to my modem or router settings page there is an ip address added for a remote access. Do you think this is someone you know personally? Or do you think someone hacked/virus that you do not know. Ps usbs can be used to install Linux
[Edited by Moderator]
i feel your pain all the way around. Total time dealing with this so far is three years give or take…. Nobody believes you, people start treating you like you actually crazy and need to be rehabilitated, dedicated, or incarcerated. You are not alone in being the recipient of strange “cyber-attacks” without having an obvious reason as to why you were chosen for such a prestigious gift. Maybe we all have something in common that we are as yet unaware of. Maybe we should all link up and chat? I’m sick of fighting an unknown enemy blind. I’m ready to scrounge up some glasses
Brp30 wrote:
Absolute same here! For over a year. Every phone, device, tv, blink cameras, Alexa’s, Apple Watches, tablets. I have same managed device, the Apache thing, apple developer account I never made, my iPhone is newer so no sim in phone but the sim kept being transferred to another device, I also have the AAA root that I can’t remove bc it’s greyed out, as well as the Linux Ubuntu or Linux Debian, something linux. There’s so much code. Unknown files. Different time zones. There is NOTHING I can do to remove it. I think it sniffs Bluetooth or travels over the internet to every nearby device and infecting it. I also think I know the culprit (my bf) but can’t be 1000% sure I didn’t just get virus or hacked. My phone provider is Xfinity and their reps said they think someone took my phone and used usb to download this. I also believe the calls and texts are not only recorded but can be somewhat controlled by whoever is doing this. Also I think my bf jailbroke my phone without my knowledge. When I go to my modem or router settings page there is an ip address added for a remote access. Do you think this is someone you know personally? Or do you think someone hacked/virus that you do not know. Ps usbs can be used to install Linux
[Edited by Moderator]
What you report happening would necessarily involves either physical access to and reconfiguration of ~everything (which would normally have been resolved by a reset, but for your “There is NOTHING I can do to remove it” indicates firmware or hardware persistence or remote re-exploitation), or involves exploit tooling for multiple platforms (“Every phone, device, tv, blink cameras, Alexa’s, Apple Watches, tablets”).
The exploit tooling involved for what is reported is worth multiple millions of dollars in aggregate. The iPhone and iPad access reported here involves exploits worth more than a million dollars each.
Which in aggregate makes you an exceedingly valuable target for an exceedingly wealthy entity.
Which makes this case exceedingly far outside the scope of what anybody here can assist with.
Not without substantial technical skills, direct access to your personal info and equipment, and pragmatically not without assisting you in learning how to segment your information and how to operate in an exceedingly hostile environment. None of which will be free.
Or none of this happened of course, and the concerns here are based on misinterpreting mundane and benign details of the various platforms involved. That’ll still be a substantial effort to research and explain each area and each detail and each telemetry entry and each log entry, and well past what can be offered here. That all likely involving an explanation of public key cryptography, and some basics of forensics and of distributed authentication and distributed security, too.
And complicating all this, it’s ~impossible to prove a negative; that your gear hasn’t somehow been exploited.
XLSx123x-
I have experienced what you describe also. I have had someone in my cloud for over a year. I’m in the process of completely deleting a cloud account. If you’re not watching everything done on phone is synced..password, literally everything. So it’s impossible to get rid of them without deleting the email address completely
Jareddddd wrote:
What did you do about this? This is happening to me right now.
”This” being a security breach across multiple devices, across multiple unrelated platforms and services, and the breach(es) persisting or being reintroduced after device and password resets and related steps?
If so…
That scale and scope puts your report here well outside what anybody here can assist with, as what you report would require you to be targeted by immensely rich entities using espionage-level tooling.
This exactly the same as what I’m going through; no matter what I do, they thwart me !! They can halt my phone and WiFi & cellular data !!!see every key stroke and access bank accounts. They know when I leave my home and come in to steal stuff.
Git a new iPhone and it was not set up. When I went to set it up, someone had locked it with a passcode; I didn’t do that. They’re ruining my life !!
Check whether you location gets shared when you start driving… if you don’t drive settings will remain to their set values… if you try to disable location sharing a generic message saying “can’t connect to server” will pop up…
I detected a firmware level VM that was installed making my is settings useless through automatic patch updates… Disable automatic patch updates and restore your phone to original software after wiping out is and firmware using a cable connected to a trusted laptop at Apple Store. Do not do this over WiFi/iTunes downloading OS etc… Patches, App updates and links on text messages are source of these install mechanisms… stingray type devices can pretend to be cell tower and push updates, compromising whole iOS.
Don’t install lot of apps. There is a similar VM for Macs that disables only run trusted kernel binaries and all future ways to connect to laptop to wipe firmware clean.. only way to get rid of this is to replace laptop.
Stingray needs imsi and cell number, use Google voice as general phone number.
Dont remain signed in to cloud or store your passwords on keychain… Your phone passcode can decrypt your cloud data… so change passcode often and assume that “man in the middle” and “man on the inside” attacks are possible.
That sounds like an issue with Twitter. Nothing to do with your iPhone.
If your Twitter account is missing, you will need to contact Twitter Support for help with it.
I’m so happy to read this. For the past two years I have been doubting my own experience and you just described it exactly. Glad im not crazy. Sucks that it ruined my life.
How do I check for spyware on my phone
How do I check my iPhone for spyware/malware