My iPhone was accessed remotely

Over the last several months, a few seemingly minor incidents triggered me to increase my home network’s security and to start paying attention to the devices connected to my network. However, there has been a sudden

increase in the frequency and severity of events which has led me to investigate the situation more thoroughly. After many hours of research, I am confident that (at the very least) both my laptop and my iPhone have been accessed remotely. For how long, I’m not sure (but if my crazy, narcissistic ex who has a history of spying on me has anything to do with it, probably a long time).


I completely reset all my devices when I first became aware of the remote access to my laptop, which I only just discovered during the last week. Unfortunately, they managed to gain access again so this time, I completely wiped the hard drive on my laptop and re-installed Windows from a recovery drive, and as for my iPhone, I did a complete factory reset, created a brand new Apple ID during set up, and because I believe access was obtained by hacking my network, I did not connect to any wi-fi or Bluetooth device and have only downloaded a VPN, virus protection and private browser. I’m hoping that someone on here could review my Analytics Data since the reset and tell me if anything still looks suspicious or if all looks good now.

Posted on Apr 30, 2023 7:32 AM

Reply
Question marked as Top-ranking reply

Posted on Apr 30, 2023 7:44 AM

Trying to interpret apple diagnostics isn't meant for us mere mortals. Unless you have jailbroken your iPhone, the chances of your phone being accessed remotely are most unlikely. If you have jailbroken your phone, anything is possible and that would be on you and there is no one here who could possibly help you with issues which happen on jailbroken phones.


Otherwise, trying to read diagnostics, which only Apple can do, is an act of futility.


The only other way someone could remotely access your iPhone is if you handed your phone to them and they installed Remote Management Software on the Phone. Go to Settings > VPN & Device Management > If there is a profile there, remove it.


Change your Apple ID Password too, if you are concerned.

Similar questions

28 replies
Question marked as Top-ranking reply

Apr 30, 2023 7:44 AM in response to riaricks

Trying to interpret apple diagnostics isn't meant for us mere mortals. Unless you have jailbroken your iPhone, the chances of your phone being accessed remotely are most unlikely. If you have jailbroken your phone, anything is possible and that would be on you and there is no one here who could possibly help you with issues which happen on jailbroken phones.


Otherwise, trying to read diagnostics, which only Apple can do, is an act of futility.


The only other way someone could remotely access your iPhone is if you handed your phone to them and they installed Remote Management Software on the Phone. Go to Settings > VPN & Device Management > If there is a profile there, remove it.


Change your Apple ID Password too, if you are concerned.

Sep 20, 2023 9:20 AM in response to Community User

Re: JetsamEvent-2023-06-25-224214


This is probably the first indication all is not well.

"csTrustLevel" : 0,


Secondly, these are a few of the other indicators:

"ManagementTestSubscriber"
"betaenrollmentd"
"com.apple.SiriTTSService.TrialPr"
"ManagedSettingsAgent"
"InteractiveLegacyProfilesSubscri"
"LegacyProfilesSubscriber"


Check other logs for a Beta Identifier UUID and if one is not knowingly enrolled in the Apple beta program and have the TestFlight App installed that'll confirm an active Stealth Developer is controlling the device.


Take a screenshot if a Beta Identifier UUID and visit the Apple Store and ask them why it is there when their website clearly states it is only present when you’ve enrolled and have the TF app installed.


Jun 8, 2023 5:40 PM in response to riaricks

I'm sorry to hear about the issues you've been experiencing with your devices. It's always concerning when you believe your privacy has been compromised, especially when it involves personal devices that contain a lot of sensitive information.


I've reviewed the analytics data you've provided and here's what I found:


  1. CommCenterNVMSync: This is related to the communication center of your device syncing with the network. The logs show that these syncs were successful and there was something to sync, which is normal behavior.
  2. CommCenterLTESwitch and CommCenterNrSwitch: These logs indicate switches in your network communication, possibly between different types of networks (like LTE and Nr). This is also normal behavior, especially if you're moving around or if your device is automatically switching to the best available network.
  3. CommCenterBasebandFilePush: This log shows that some files were pushed to your device's baseband, which is the part of your phone that handles communication with the cell network. The reason given is "kBundleChange", which suggests that this was due to some sort of update or change in the network settings.
  4. CommCenterEntitlementRequest and CommCenterEntitlementResponse: These logs are related to your device requesting and receiving entitlements, which are permissions or capabilities granted by your carrier. The logs show various types of entitlement requests and responses, including some with status 6000 (which typically means success) and entitlement status 6100 (which is also typically a success status).


From the data you've provided, I don't see anything that stands out as suspicious. The logs seem to be related to normal network operations and communication between your device and your carrier's network.


However, it's important to note that this is a basic analysis and may not catch more subtle signs of intrusion. If you're still concerned, I would recommend the following steps:


  1. Consult with a cybersecurity professional: They can provide a more thorough analysis and give you personalized advice based on your situation.
  2. Change all passwords: This includes your Apple ID, email accounts, social media, and any other accounts you access from your devices.
  3. Enable two-factor authentication: This adds an extra layer of security to your accounts.
  4. Be cautious with emails and messages: Be wary of any unexpected or suspicious emails or messages, as these can be attempts to gain access to your accounts.
  5. Keep your devices updated: Regularly update your devices to ensure you have the latest security patches.


Remember, security is a continuous process and it's important to stay vigilant. I hope this information helps, and I wish you the best of luck in resolving this issue.


Best,


nexusnode

Jun 26, 2023 8:21 AM in response to gravityfed

gravityfed wrote:

Hello false alarm, not true actually, the ability exists to send a message through iMessage even if it’s not enabled.
As for millions dollars that is also not true.


Look up the current exploit offers. Offers for the sorts of exploits that people discuss in these threads are up two two million US dollars (iOS full-chain with persistence, zero click). Apple too offers bounties. If you’re worth that much to your adversaries, you will want to seek security advice and seek device forensics tailored to your particular situation. That’s not likely going to be available via forum postings.


For those here with issues ongoing for six months or more, or for years, those situations will not be addressed around here. There won’t be any new or different suggestions offered around here; things that haven’t already been encountered, been experienced, or been suggested and then locally implemented or rejected as appropriate.


If the local network configuration or local computer configuration is problematic, there will be stability and connectivity issues independent of any purported security issues. I’ve worked with a few folks that were making changes themselves and then forgot those changes, and they thought they were hacked. And I’m aware of folks that were targeted with some very expensive exploits.


Searching telemetry logs for evidence of exploitation is looking for needles in ever-increasing numbers of haystacks, and without knowing if there are any needles in any of the haystacks, nor what the needles even look like.

May 19, 2023 8:53 PM in response to riaricks


commCenter is a system service responsible for managing various aspects of cellular communication, including cellular data, voice calls, and text messages. It handles network selection, signal strength monitoring, call setup, and data transfer tasks. It's a normal process of iOS; however, it can be maliciously edited if security measures have been circumvented, so you are right to investigate it, as I am doing the same with my iPhone.


If you've done a complete reinstall, your recovery partition or the firmware may have been compromised, so reinstalls are a waste of time. Even if you buy another phone, the same will likely happen again. I've used different accounts on new devices, and the same happens before long, though lockdown mode helps somewhat.


A new update is available, but within a few minutes of installing it, an AppStore app acting in kernel mode caused a disk write crash, a tactic to gain escalated privileges, bypass security measures, or execute malicious actions, so the merry-go-round continues.

Jun 25, 2023 8:28 PM in response to Community User

With the ISP router set to bridged mode and with no other router configured to process NAT and DHCP and related services, your network configuration is incorrect. That will have repercussions throughout all connected devices. Instability, crashes, weird errors, a flaky or invalid network configuration will cause endemic issues.


Log files and telemetry are filled with ominous-worded and cryptic and utterly benign messages, and are best left to Apple, and to app developers for their own app-specific log entries.

Apr 21, 2024 7:22 PM in response to briar132

Me as well, spent thousands on their products as they tell me I'm crazy. Send logs to citizen lab in Toronto. Some truths I was educated on I wish I was not told. I'll say one thing Apple hates letting RAM sit unused. Let your mind wonder from there. Print logs immediately and send on different device., Ive had saved logs greyed out and changed within hours. Microsoft is no different. Set trap with a separate device using unknown data source and kali. Control the beginning and end of your own server traffic and you will catch man in the middle eating apple pie!!

May 28, 2023 7:39 PM in response to fern138

I am 100% confident no one is remotely accessing your phone. What you are describing would require multiple zero-day vulnerabilities which are hoarded and used in state-sponsored attacks. These are worth millions of dollars each.


Modern iPhones are very locked down. It is simply unrealistic that someone is remotely hacking your phone unless you are a high-value target.

Apr 30, 2023 7:37 AM in response to riaricks

timestamp: 1682852473511

isAnonymous: true

deviceConfigId: 7422

investigationId: 0

model: "iPhone13,2"

softwareBuild: "20E252"

firmwareVersion: "iBoot-8422.100.650"

basebandVersion: "3.55.02"

buildtype: "User"

tz_offset: -25200

metric_file_type: 1

metriclogs {

triggerTime: 1682852468495

triggerId: 7143424

profileId: 394

multitouchBootEvents {

timestamp: 1682852459661

version: 1363

}

}

metriclogs {

triggerTime: 1682852468495

triggerId: 7143425

profileId: 395

multitouchHardwareStatus {

timestamp: 1682852459665

}

}

metriclogs {

triggerTime: 1682812800000

triggerId: 827739

profileId: 142

cellularUim5gSuciProtectionScheme {

timestamp: 1682812800000

sim_type: SIM_TYPE_PSIM

suci_conceal_scheme: SUCI_CONCEAL_SCHEME_PROFILE_A_ECIES

suci_conceal_type: SUCI_CONCEAL_USIM

hplmn: [3 bytes] 03 02 16

pri_enables_nr5g_sa: 0

pri_enables_non_null_suci_requirement_for_nr5g_sa_enablement: 1

}

}

metriclogs {

triggerTime: 1682812800000

triggerId: 524449

profileId: 211

commCenterSimTrayEvent {

timestamp: 1682812800000

inserted: true

has_sim: true

}

}

metriclogs {

triggerTime: 1682812800000

triggerId: 524503

profileId: 163

commCenterCarrierBundle {

timestamp: 1682812800000

bundle {

bundle_type: 1

matching_bundle_name: "302610"

resolved_bundle_name: "Bell_ca.bundle"

carrier_plist_name: "device+carrier+302610+D53g+54.0.1.plist"

bundle_version: "54.0.1"

is_embedded: true

imsi_prefix: "3026100"

subs_id: 0

}

}

}

metriclogs {

triggerTime: 1682812800000

triggerId: 524449

profileId: 211

commCenterSimTrayEvent {

timestamp: 1682812800000

inserted: true

has_sim: true

}

}

metriclogs {

triggerTime: 1682812800000

triggerId: 827739

profileId: 142

cellularUim5gSuciProtectionScheme {

timestamp: 1682812800000

sim_type: SIM_TYPE_PSIM

suci_conceal_scheme: SUCI_CONCEAL_SCHEME_PROFILE_A_ECIES

suci_conceal_type: SUCI_CONCEAL_USIM

hplmn: [3 bytes] 03 02 16

pri_enables_nr5g_sa: 0

pri_enables_non_null_suci_requirement_for_nr5g_sa_enablement: 1

}

}

metriclogs {

triggerTime: 1682848800000

triggerId: 2686989

profileId: 426

}

metriclogs {

triggerTime: 1682848800000

triggerId: 2686987

profileId: 428

}

metriclogs {

triggerTime: 1682848800000

triggerId: 3473412

profileId: 411

cFNetworkTaskMetrics {

timestamp: 1682848800000

activityUUID: "8AA142E7-A649-439C-B522-785DB9E0539C"

didCompleteWithError: 3538

numberOfRetries: 0

numberOfRedirects: 0

error: -999

underlyingError: 0

underlyingErrorDomain: 0

taskType: DATA_TASK

isBackground: false

transactionMetrics {

networkProtocolName: HTTP_1_1

networkLoadType: NSURLSessionTaskMetricsResourceFetchTypeNetworkLoad

reusedConnection: false

isRedirected: false

requestStart: 209

requestEnd: 209

responseStart: 291

responseEnd: 0

totalBytesWritten: 516

totalBytesRead: 2488975

connectionUUID: "E4700B0B-42D8-4FBC-9239-3CCD43003FEB"

apsRelayAttempted: false

apsRelaySucceeded: false

http3Status: NOT_ENABLED

}

schedulingTier: USER_INITIATED

}

}

metriclogs {

triggerTime: 1682848800000

triggerId: 2686990

profileId: 427

}

metriclogs {

triggerTime: 1682848800000

triggerId: 3473412

profileId: 411

cFNetworkTaskMetrics {

timestamp: 1682848800000

activityUUID: "8AA142E7-A649-439C-B522-785DB9E0539C"

didCompleteWithError: 3538

numberOfRetries: 0

numberOfRedirects: 0

error: -999

underlyingError: 0

underlyingErrorDomain: 0

taskType: DATA_TASK

isBackground: true

transactionMetrics {

networkProtocolName: HTTP_1_1

networkLoadType: NSURLSessionTaskMetricsResourceFetchTypeNetworkLoad

reusedConnection: false

isRedirected: false

requestStart: 209

requestEnd: 209

responseStart: 291

responseEnd: 0

totalBytesWritten: 516

totalBytesRead: 2488975

connectionUUID: "E4700B0B-42D8-4FBC-9239-3CCD43003FEB"

apsRelayAttempted: false

apsRelaySucceeded: false

http3Status: NOT_ENABLED

}

schedulingTier: USER_INITIATED

}

}

Jun 8, 2023 5:24 PM in response to fern138

Same here. Been thru it all so many times at apples useless, patronizing, and, frustratingly time wasteful, advice. Causing me to repurchase almost everything multiple times w each new apple id &/or device. I’m on my 7th iphone in 2 years. Ipad pro seems to be discretely managed and saw network alerts its up to no good from a wifi router. Why does apple’s snobbery have to include blatant ignorance of actual, factual, goings on?!

Jun 25, 2023 5:29 PM in response to MrHoffman

Hi @MrHoffman.


I have being facing serious security issues for the last 30 days in all our family's devices. Not like being paranoid, but my two MacBook Pro were compromised to the point of having impossible to remove partitions where they are booting from, so I can't even achieve a new system install from the apple server or bootable units. My iPhone is having a similar issue, not even after factory reset to iOS 16.5.1 about 24 hrs ago, it doesn't stop behaving weird, like options turned on and off, a just created iCloud email not working, even with the right Apple ID logged, and all logs I collected from terminal on the laptops and my iPhone, have the same path architecture, names, etc. if you could check the log attached, I would be eternally grateful.


This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

My iPhone was accessed remotely

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.