I apologize for the delay.
Yes, unfortunately I have seen this type of compromise. It has, and continues to be happening to me since July 2022.
I definitely could write a book on this.
When this first began no one thought it was true and that it was impossible.
It is like believing in ghosts, except more people believe in ghosts.
I now spend 100% of my time researching everything.
It began with learning about Kerberos, federation, enterprise, MDM, etc... then reading how easy-ish it is to laterally move through a person's life.
I do not feel that takes too much sophistication. I mean, yes, and no.
Once you acquire Kerberos, etc... on one account it only makes sense that a determined hacker would not need to struggle too much.
I said from the beginning that nothing is impossible.
I believe that Verizon is a player because I had questionable features on my line that no one would give me a straight answer about.
Many of my support chats were suddenly disconnected.
The last support call I had with them was supposed to be with the fraud department. However, after 2 hours (two of many many before) I was told that I would have to speak with fraud.
I thought I was. The guy on the phone gave me the number to fraud which was the number I dialed.
Previous support directed me to contact law enforcement. That is ZERO help. Local law enforcement has ZERO clue how to handle 'hacking'.
When my phone was disconnected, without consent, and I had to visit a Verizon store. The manager could/would not confirm if I had always been speaking with a Verizon representative any of the times I called.
Verizon executives have said they will look at me account. After doing so they state there is no fraudulent activity and that they do not assist with hacking.
I am also told that without a court order they will not release my phone and text details due to proprietary concerns.
This was more than just iPhone, a Samsung phone was also involved.
Moving on to one of my recent iPhones.
I had 1st party apps - Find my iPhone, Maps, Notes, Health, Home. All saying they did not come from the app store.
I am unable to perform an Emergency Reset on my phone because I am sharing such features.
I have no other devices and I have uninstalled those apps.
On that note. I am always 'sharing across devices'. I have NO other devices.
I have screenshots, recordings, analytics, backups, etc...
I am not able to receive copies of my support cases. My last phone call with Apple ended with being told that if someone is this determined there is nothing they can really do.
I begged to have an engineer look at my phone, but was told that engineer will not look at my phone. I only asked because the lady at the Apple store told me to be persistent with that request.
Symptoms (only a few):
* Sharing devices
* Apps that did not come from the App store
* Waking up to no passcode set on my phone
* Various contact's information has been changed
* 'Focus' has turned on disallowing communication to anyone aside from 'favorites'. I found that out when I tried to call someone, but was not able to.
* My screentime settings are extremely strict.
I do NOT allow any Game Center activity, but not only do I find that I am connected to Game Center, but my ID is unknown. Additionally, it will sync with iCloud.
I do not have any any any Home devices, but on the list of things you can access without your passcode I am unable to remove the option for Home control.
My privacy selection is to not share Health information, but I still do. The steps the motion, etc... are listed as information on my device.
I can check my privacy settings to change that, which reflect that I already do not share that.
Those are only a very few things I can say.
As I mentioned previously I could write an entire book.
I am 100% sure that I qualify and am capable of working in the cybersecurity industry.
I do not know all the answers, but I learn more of them everyday.
From active directory control, to malicious code, to accessibility settings, to hardware (Bluetooth, etc..), to cellular towers and wireless (same-ish) and more.
I study all of it.
Every setting you can imagine can be worked and is already way ahead of security updates. Security updates are after the fact.
I have and continue to spend my time analyzing and learning.
I have found 'invisible' code when I was running Linux.
I am sorry this is happening.
I am only throwing a few things out there.
I hope that it is helpful.