How to stop my iPhone from being hacked?

Anyone else been hacked and their phone is mirrored to another device and they have 100% complete access to everything in your phone 24/7? I’ve been dealing with it for a year now. All the 2 factor authentication, encrypted bologna, Face ID, means absolutely nothing when your screen is mirrored to your crazy ex. Wondering what others have done to finally rid the phone of this ridiculous attack of privacy and sanity?


[Re-Titled by Moderator]

iPhone 14 Plus, iOS 17

Posted on Oct 11, 2023 12:50 AM

Reply
Question marked as Top-ranking reply

Posted on Dec 18, 2023 7:49 PM

That's not really possible. The other person would need to know your Apple ID credentials, device passcode, and have access to your device. Then, they would need to jailbreak your device and install some kind of software. If you believe that to be the case, which is improbable, factory reset your device.

28 replies
Question marked as Top-ranking reply

Dec 18, 2023 7:49 PM in response to Lost4nowgr8

That's not really possible. The other person would need to know your Apple ID credentials, device passcode, and have access to your device. Then, they would need to jailbreak your device and install some kind of software. If you believe that to be the case, which is improbable, factory reset your device.

Jun 8, 2024 3:52 PM in response to Betrayedbysomeoneclose

Betrayedbysomeoneclose wrote:

How do I reset my phone even has my ps connecting to the ppl involved I have went thru just as many sadly enough I believe is a home phone and nothing connected to u


No computer:


Safety Check:


Contact with a victim support organization from a safe phone elsewhere, if that’s an option for you.


Dec 18, 2023 8:10 PM in response to I_see_green_elephants

If what you report here is as claimed (and I’ll reserve judgement), then you are being targeted with exploit tooling worth multiple millions of dollars, and with individual exploit chains worth millions, and tooling more commonly used for espionage, and for access to those people and organizations of interest to governments and government agencies.


Accordingly, your entire current approach here will seemingly be less than successful, if what you write here is what has happened in this case.


You really need to rethink your entire approach here given your reported massive value to your attackers, and you will absolutely need digital forensics and a detailed review of your entire approach to your own security.


And to what data you maintain, and with what communications equipment you have with, too.


Based in what you’re reporting, you’re far beyond the help that can be offered here. Or by anybody absent digital forensics, device access, and a detailed discussion with you. (That review is also not going to be cheap.)


And as this has reportedly been ongoing for a year, whatever the issue here—whether the involvement of very expensive exploit tooling, or maybe the issue here is something else entirely—it’s just not going to change with this posting, or with your current approach.

Jun 27, 2024 10:23 AM in response to Jamzy4567

Jamzy4567 wrote:

Bro how can we stop it I’m being hacked by my brother and I don’t know what to do

Options:

  1. Fix your security. Passwords and passcodes. Personal Safety User Guide - Apple Support including running safety check, and potentially also disable Face ID if there’s the possibility of a face match.
  2. Involve parents or police. In many legal jurisdictions, unauthorized access is considered a crime.
  3. Get rid of that equipment you are unable or unwilling to secure.
  4. Actively discourage the misbehavior, though I definitely do not recommend “going kinetic” here.
  5. If you have the resources and are of legal age, leave.

Dec 18, 2023 9:16 PM in response to I_see_green_elephants

I_see_green_elephants wrote:

Well, you make some very valid points but sometimes we can’t see the Forrest for the trees. If there’s a way in, there’s a way out my friend. Was simply hoping to hear from more with the same problem as it’s not quite as uncommon as what most think. But I fully get your reserve and doubtful judgement as I’ve heard it from many until they see it for them selves.


Based on available information, it is uncommon, and targeted. Very much so.


And without intending offense, consider how your approach here will be interpreted.


You lack evidence. If you had evidence, this thread would be very different.


In various of these threads, I’ve looked through piles and piles of screenshots of, well, nothing, and found, well, nothing. Others have looked, too.


As for differentiating your case, you’re unlikely to get somebody to perform a security review and digital forensics (for free). Not without initially providing them with some convincing evidence; some indication of a technical compromise. And not without device-level access. Lots of people want free forensics help. Effectively unlimited numbers of folks. Which means you get to learn more about your own case and your own situation and forensics and evidence, and how to present that to others.


I’m aware of vanishingly few around here that actually have been exploited, out of all of the posted reports.

Dec 19, 2023 3:42 AM in response to I_see_green_elephants

No way, “my guy”! Except you haven’t considered the very possibility that it was in fact possible that my husband was the opposing force and allowed access to my device physically when I would have never thought. I have had to deal with this likely for a decade in certain ways - but precisely this situation for a year and it has taken a lot of imagination and intuitively thinking ahead to just try and catch up. Be careful…they are always 10 steps ahead. Almost like you and I have been through the EXACT same complex invasion of life and wellbeing. Sorry to hear “my dude”…I’m still learning of more loss and mourning everything I ever worked for. Prayers for you and yours as you travel the real “boulevard of broken dreams” (thought maybe based on your name you may like Green Day). I have over time collected plenty of insight through evidence and an insightful, innovative guided approach when evidence or resources were available.

Dec 19, 2023 9:14 AM in response to Lost4nowgr8

Hello.


This is quite trivial: all you have to do is change the time zone in your phone.


For all the other stuff, do you seriously have concrete evidence your husband is running some crazy device security compromising operation? I see these posts very rarely. If you truly are compromised, quit dragging this on and change your credentials and your phone.


If you want to get to the end of this, do some digging. Try to get to the bottom of this. If your husband truly has the capability to run such an operation then he knows how to cover his tracks. This is quite a wild goose chase.


Regards,

mdp1101

Dec 18, 2023 7:45 PM in response to Itsjustme313

Unfortunately it’s not remaining this simplistic. What if not only the entity is not only able to obtain entry to your Apple ID but also potentially cloning your devices information and recreating in so many locations also using screen mirroring that there is no way to move faster as one person, to change passwords when they can see what buttons are pushed or better yet alter settings for their device without me being able to see their information because it’s a clone of the device I have?

Dec 18, 2023 7:52 PM in response to I_see_green_elephants

Going through the exact same thing. Multiple devices (this is the 5th time). What I have gathered is that my devices precise identifiers are reached and cloned somehow? It’s pinging my devices copied ID and likely although I am unable to see it, pinging satellites all over the globe so that it becomes nearly impossible to locate the source of the problem. I can’t get into my old email, phone number or anything of the like. It has become impossible as they can change settings as if they are me as well so how does one regain ownership of their own identity? Tech has advanced quickly, which is amazing…unfortunately the ones who needed it took advantage and has moved faster than the general public leaving our security and cyber safety at risk as the securing features are not as advanced as some of the AI currently on the market. When collaborating between human intelligence in this regard and AI, it’s seemed unstoppable and left me with a complete and total loss in life of everything I ever worked for due to identity fraud.


Dec 18, 2023 7:55 PM in response to muguy

When forced, even those you love and the closest people in your life, get desperate and will take desperate measures. No matter how many times I reset, it continues to happen. Once it happened once, this has happened continuously through 5 other devices. I’m baffled…not sure how to just negotiate peace and end the suffering. My credit shot, career lost, marriage ended, friends don’t understand, family doesn’t believe me. 😖🤯🫠😭

Dec 18, 2023 8:34 PM in response to Lost4nowgr8

Well I hate to break it to ya my guy but it is very possible and true. Cause I’ve been dealing with my lovely ex in my phone for over a year now and apple can’t even figure out how she’s doing it. But, I’ve talked to tons of other people that are going thru the same thing with these high end hackers that don’t need your Apple ID, or passwords or passcodes. All they need is your phone number my friend and send you a text message and you don’t even have to open the **** thing, it hits your device and you’re screwed. I’ve proven it to Apple a hundred times and everyone in between so ya might as well take all the stuff you think you know and start over cause I will promise you there’s people all over the world going thru the same crap I am and NOBODY knows how to rid the device from it. This program is the only one that has transferred from a Samsung straight to this new iPhone 14 when I bought it thinking no way possible this could happen. She’s never had access to my device and I’ve changed my Apple ID and passwords a thousand times to no avail oh and she doesn’t show up in anything what so ever. I can’t fully explain it as I’m no tech guru but I’ve learned a lot in the last year and spoke to a lot of people and I’ll guanrtee you this……nothing is unhackable. Someone or something will always find a way.

Dec 18, 2023 8:46 PM in response to MrHoffman

Well, you make some very valid points but sometimes we can’t see the Forrest for the trees. If there’s a way in, there’s a way out my friend. Was simply hoping to hear from more with the same problem as it’s not quite as uncommon as what most think. But I fully get your reserve and doubtful judgement as I’ve heard it from many until they see it for them selves.

Dec 19, 2023 3:45 AM in response to muguy

I would love to, and if the “green elephants” visualizing guy can relate….if too much is disclosed I know I fear the safety of myself and family members…if the bad guy knows everything I used to store in my phone and able to view all that data as if they were me…they know too much and could absolutely add injury to insult, if you will. There has been no safe, or effective way to resolve any of this.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

How to stop my iPhone from being hacked?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.