My iPhone 15 has been cloned

Greetings, Someone who I know hacked into my iPhone, and ultimately cloned it. This can be difficult to believe especially if you’re an iPhone enthusiast. Before I continue, my work is me within the metropolitan community churches and I am a relatively well-known individual within my global religious environment. With that said, the phone number and iCloud associated with my previous account are currently either under his control or I’m hoping that Apple has discontinued the iCloud account. The phone number was ultimately discontinued, although I am unsure if she can maintain use of that phone number

He gained access into my initial iPhone 13 through one of my Gmail accounts. Once inside my iphone he then gained access to my office emails. my local email address was a dream host domain account. my global email address was a Google domain account address

During the initial days in attempting to gain understanding of what was happening, I came to find out that my work email address was being created on a google platform.

I’m under the understanding and assumption that he may be using my old email to contact individuals.


Upon replacing my iPhone 13 with an iPhone 15 Pro, with a completely different phone number and eSIM,

Since I was unable to obtain access to my initial, iCloud, I attempted to obtain access to my individual apps, such as banking and credit card apps only to realize that in doing so, I gave the hacker an open door to my new iPhone. I also noticed that the hacker began to replace my public information with other information. 

I ultimately replaced that new phone with another iPhone 15pro, along with a new eSIM. I also changed out my Wi-Fi, taking myself off the account and putting my roommate on. 

For sometime now, I have had the habit of locking my banking, debit and credit cards, which has made it difficult for anyone to access my account funds.


And because he had managed to remove my information from many of my creditors, and online organizations, such as the DMV, my medical organization, utilities, etc. I found myself having to either call or present myself, physically, in order to get the accounts reinstated.

I also found out that I could not go through the usual online identification process of confirming a code sent via an email or a text since any information on file to validate or confirm an account went directly to an email or a phone number that the hacker had direct access to.

The hacker has not only compromised my previous emails and phone numbers, he also has access to them, and any email received to any previous email accounts and current accounts as well, including any text, he has the ability to access by responding and deleting them.

I have already changed my banking information. And I may have to do the same with my DMV and Social Security, since my attempt to access a new, my DMV account was once again manipulated by the hacker.

The greatest frustrations is attempting to make contact with an actual human person who can assist in the process of changing out my information, keeping in mind that because my phone is cloned, any transaction that I do on my phone he is capable to see and interact as well. Ironically, I’ve had 120 moments when I have attempted a pass change and he is manipulating the information and or canceling it or I am canceling his actions, if I am online at the moment that he is doing

Although I’m not able to see him type, anything, I can see him swipe, and I can see him press, action buttons. I am constantly checking the settings on my phone as he has the ability to change out any setting, that I may put an effect.


For those doubting Thomases, I have seen many apps which give one the ability to clone a phone. I’m not sure how good they are. However, I have yet to see an app that un-clones a phone. Although I am unsure if the hacker and the cloner are the same, I get the impression that they are one in the same only because of certain characteristic interactions that occur that confirm he is one in the same. And because the phone is cloned and all interactions referred back to my current iPhone 15 Pro. I did have the opportunity to note a location in Hacienda Heights California from what I believe is a web browser and yet we all know how efficiently the location can detect our devices

I hope all of this makes sense, I am dictating and texting corrections in the entry.

Peace and blessings, Alejandro E.


[Edited by Moderator]


Posted on Oct 30, 2023 4:44 PM

Reply

Similar questions

19 replies

Oct 31, 2023 9:33 AM in response to ASCUN75

ASCUN75 wrote:

With regard to “and there really isn’t a reason for the miscreant to even perform a Wi-Fi password change with that access;”, You are 100% wrong. It’s basic psychology that most of us learned in high school. These hackers are stalkers and need to show you who is in charge; who has the power.


Yes, and those miscreants do that by communicating with you. They prove their access. They make threats, allusions, whatever. More than a few other miscreants will claim compromises. Compromises that might not or do not exist. If anything, those latter (false) claims are both more costly, and more pernicious. And that's all a civil or criminal matter.


As for this case (and your suggestion around changing the Wi-Fi password to detect compromises), if the miscreant has changed the Wi-Fi password, that is either because of a router security breach (and older and cheaper and down-revision routers can have poor security), or because of a device or credentials breach elsewhere, and that password change shows across all devices. Unless the miscreant has gotten every device associated with that Wi-Fi, that change is very obvious, and there's no need to check it.


Nowhere in this am I claiming that iOS or iPadOS or macOS cannot be breached. They can be. They are, however, not particularly easy to breach. There are ways to misconfigure iOS and iPadOS and macOS and other platforms too, and ways to phish or spearphish or shoulder-surf credentials, of course—and the results of those attacks are very similar to the vastly more involved and more technical and more expensive compromises. If anything, I expect to be phished or spearphished eventually, too. (I've some experience with social engineering and remediation costs and a rather well known miscreant, they having breached the internal network of an organization I was then affiliated with. Some of them are quite good.)


The original posting in this thread is a rather different case, as they claim to be a high-profile target, and subject to some rather advanced adversaries for whatever reason. And that is why I suggested they obtain tailored security advice for their situation. Which probably isn't going to involve verifying the Wi-Fi password if that's suspected compromised, it's probably replacing the Wi-Fi network and connected hardware for higher risk cases, or involves a factory reset and updating and new passwords and passkeys everywhere.


There are other and vastly easier Wi-Fi attacks here too, not the least of which involves Pineapple or similar, too. (I first met a Pineapple-like Wi-Fi attack a decade or so ago, and in a high-level meeting by major platform vendor, and with that vendor's major customers and their senior management and security folks in attendance, as well as the vendor's president and their own most senior staff. All of the local Wi-Fi traffic was being collected during that meeting, and again during a subsequent presentation, unbeknownst to the platform vendor IT staff.)


But again, (solely) breaching a Wi-Fi network, or changing Wi-Fi network credentials doesn't give the miscreant additional device access, absent some other secondary (and larger) mistake. Most of us are routinely connecting to untrusted Wi-Fi networks, and most of us are not special-casing our own private networks. Which makes that Wi-Fi password network check seemingly rather less beneficial to local security in aggregate.

Oct 30, 2023 10:08 PM in response to ASCUN75

Get tailored assistance from a reputable information security provider with your personal and electronic security, if you believe you are a high profile target. That evaluation needs to be wholistic, too; to consider all aspects of your activities and tooling and risks and requirements.


Yes, cloning is unlikely but certainly possible, but will disrupt your device operations as exactly one cellular device can be active and online at a time, and you will want to discuss that entire issue directly with your carrier.

Oct 30, 2023 5:10 PM in response to My-iPhone-15pro-cloned

You are encountering this "mindset" because your claim that your phone has been 'cloned' is simply wrong. That is simply not possible.


No "hacker" has access to your phone, direct or otherwise. It is simply not possible for anyone to gain access to your accounts remotely through your phone.


No one has gained access to your phone.

You already stated that your gmail account was compromised. It's a simple matter from there for the "hacker" to spread out and access any account you have linked to that email address in any way, especially if you're like many people and have used the same password across multiple online services.


You need to secure your accounts. The phone is not the problem.

Oct 30, 2023 9:20 PM in response to My-iPhone-15pro-cloned

I have learned from personal experience and also from talking with a guy who has a masters in cybersecurity and who works for the U.S. Defense Dept., factory resets do not remove everything. He told me that most companies that do factory resets do not reset the partitions so everything does not get wiped. You need to get the entire windows system removed and a new system installed.


In case this helps you, I want to explain our situation. I believe we were attacked because I blocked unknown devices from our home network that were hogging our bandwidth and buffering our TVs. Because after I did that, the attack began. Sparing you the details except what I think might be helpful, the month after the problems/attack began, I was on my windows laptop looking at the security section and Windows Defender. Everything looked fine. Windows was current. Security and malware protection was current; however, because of the situation I kept looking around and looked under the “Advanced” firewall settings. It was there that I saw the hacker typing all of these rules to turn off updates, bitlocker and other security settings, to log all the IP address’ of every device that connects to the wifi, in addition to other rules.He was also setting up servers and created profiles that were senior to mine. It was all way above my head. He did the same on my boyfriend’s windows computer. We have two Brother printers. A couple of months into this mess, the printers started humming and a printed page stated a warning about not making changes to the configurations. Now, every time my boyfriend prints something the printer hums/processes for a couple of minutes. This did not happen prior to the initial attack.On our Samsung TV something popped up about remotely controlling the TV and we noticed changes on another TV. They also changed the passwords multiple times on our router. Just today when reading up on all of this mess, I learned the attack they used was probably the Krack Attack. I will let you read up on this if you are not familiar with it. Also I have learned that they are probably using Simple Network Management Protocol (SNMP) to manage the activity on our network. What I learned is that usually 2 devices in a network log everything and report back to a network manager. I now believe that when I saw them creating rules and a server in our two laptops, they were setting things up under the SNMP.


I don’t have a complete list yet, but there are security settings on a router that should be made; ports should be closed, dns resolver used, and other security settings that, until you are hacked/attacked, people would not think about. You might want to call the manufacturer of your router and the company that provides your network security and tell them you are being targeted and that you need their advice. I am going to do this as soon as I feel that I have a clean device/phone.


A few other security things I have learned that I will share in case it can help: (1) your Apple ID email should only be used for your Apple ID, nothing else (2) turn off Bluetooth, WiFi AND auto joining of WiFi managed networks (3)turn off your router when not using it(4) use a hardware security key (for example a Yubi key) for any and all accounts that support them (5) Proton is a popular email for security (6) put your tvs, cameras, smart devices, etc on a separate ssd from your computers and cell phones. These devices are easily hacked. (7) Browsers have different features. Learn what they are. A couple of security sites advised to reserve one browser specifically for financial needs(8) Don’t let anybody on your WiFi. Before I understood the situation, I went to my sister’s house and got on her WiFi. The next time I went there she was so frustrated because she was getting locked out of her accounts, which is what they doing to me (9) On your iPhone, regularly delete your Safari history and data. I also close the pages. At least once a day (I do it much more than that), reboot your iPhone. I read an article published by John’s Hopkins. They did a study and learned that iPhones greatest protection is after a reboot.


Good luck



Oct 30, 2023 4:56 PM in response to KiltedTim

I appreciate your response and this is the mindset that I am encountering from the apple employees.

It is is not a matter of one or more of my online accounts being compromised. Almost every account that I have an app for he has gained access to. My information no longer exists within the actual app, and the only way for me to gain access to the account is to find an actual customer service personnel who can locate my account. I have also come to find out that I cannot reinstate that app on my iPhone since doing so gives the hacker direct access. This has happened with the DMV, my medical care facility, my banking facility, and almost every creditor with whom I have an app on my phone.

If it’s a matter of changing out the eSIM and phone number, then I can try that again.

Oct 31, 2023 6:29 AM in response to My-iPhone-15pro-cloned

I did forget to mention one thing: an easy way to learn if the hacker has taken over your entire network is to remove one of your devices from the WiFi (I used a tv). When you are putting the device back on the network, delete any password that is auto populated and then type in the password that you know is correct. If the password is not accepted, you know that he is controlling your router.


Yes, the first 5-6 months I was majorly stressed out knowing that I was under attack, losing control over everything, unable to escape, not knowing how to protect myself, getting attitude and/or disbelief from those I contacted for help, and realizing I was on my own-that nobody could help me. While I have learned a lot online and by analyzing the behavior of my phone, I have also learned how much I don’t know.


Oct 31, 2023 8:19 AM in response to ASCUN75

ASCUN75 wrote:

I did forget to mention one thing: an easy way to learn if the hacker has taken over your entire network is to remove one of your devices from the WiFi (I used a tv). When you are putting the device back on the network, delete any password that is auto populated and then type in the password that you know is correct. If the password is not accepted, you know that he is controlling your router.


None of that is particularly what I would suggest. Wi-Fi router security can certainly be dicy (particularly when cheaper and/or down-revision), but a router password change is spectacularly obvious across all devices.


If the miscreant has sufficient access to suppress that by also changing passwords across all devices, iCloud Keychain and all devices’ security are also all catastrophically breached (password re-use?), and there really isn’t a reason for the miscreant to even perform a Wi-Fi password change with that access; they already have that and likely other passwords. And that problem and that breach is vastly larger and far more pernicious than having the Wi-Fi password.


Pragmatically, having the Wi-Fi password still doesn’t gain particular access into individual , as devices are routinely connected to potentially hostile networks. This absent configuration errors, or mistakes such as active passwords written in locally- and open-accessible files on local file servers or such.


Wi-Fi is also an afterthought to somebody with the capabilities to access cellular network protected data—the cloned SIM and such, or SS7 attacks as have been employed on occasion—as part of an espionage-grade attack. A miscreant with that access likely also has the Wi-Fi password, if they care to have it.


Oct 31, 2023 8:39 AM in response to MrHoffman

With regard to “and there really isn’t a reason for the miscreant to even perform a Wi-Fi password change with that access;”, You are 100% wrong. It’s basic psychology that most of us learned in high school. These hackers are stalkers and need to show you who is in charge; who has the power.


As the original poster stated, he will change something only to have it changed back. That has been my experience as well as others that have posted on this forum. Yes, some is driven by malware or a bot but some of this activity is controlled by an individual. I believe that person is called the bit “herder” but I could be wrong.


To the original poster, everything I have read advised not to sync devices.


To the naysayers, enjoy your online privacy while you still have it. Hopefully you will never lose it, but I believe the tide is turning and you are going to start seeing more and more postings regarding account and device takeovers.


Have a great day.

Oct 30, 2023 5:29 PM in response to KiltedTim

Thank you for your response. I understand where you’re coming from. I would tend to believe you, if at any given time when I am making changes to passwords, and if doing so from my phone, which I am no longer doing so, I can see that he is interacting with my iPhone in real time

The last time I attempted to change my Apple ID password, it was a nightmare, as I was able to start on a computer, but I had to finish on my iPhone.

having access to my phone, his interactions appeared to mirror my phone in real time.

I will begin to make changes to my accounts using my computer, which I am sure he has no access to since I reset that to factory settings last week.


Thank you for your concern and for your response. I believe they are direct me towards a different mindset.


Peace and blessings, Alejandro.


Oct 30, 2023 8:09 PM in response to My-iPhone-15pro-cloned

Hi, this is not difficult to believe as I have been dealing with a hacker/malware for almost 1 year. They have taken control over all of our devices. This is my 3rd iPhone this year in addition to cheap phones from Walmart and a Pixel 14 pro. I finally stopped running and have spent countless hours learning this phone, analyzing its behavior, and have spent countless hours reading up on cyber security.


I wish I could be of some help, but all I can do is empathize, although so far your situation is so much worse than mine …. And I thought mine was horrible. Try to ignore the harsh postings and cold feedback you receive from people. They have not walked in your shoes and are TOTALLY CLUELESS about the state of cyber security in today’s world. They have no knowledge of the fact that Apple’s security patches within the past 12 months and before patched vulnerabilities that gave an attacker kernel privileges. Safari, iMessage, Find My are a few of the apps that were being used to get kernel privileges. A person does not need to click on a link, respond to a phone call or text to get attacked. All that is needed to open themselves up to be hacked/attacked is to have a device online. And they NO CLUE that there are no businesses or organizations available to help people who are being cyber stalked. The feedback that I received from county and state law enforcement was a joke. They also have no clue.


I wish you the best.



Oct 30, 2023 9:01 PM in response to ASCUN75

I appreciate your response and I’m sorry you’re going through such a horrible experience. and for a year!! Oh geez, I don’t even know how you managed to keep it together.


It brings me comfort though, knowing that others are out there who are victims of cyber crimes yet refuse to stay victims.


Like you, the hacker - cloner managed to get into my “smart” tv through my internet cable provider app, which I accessed through my kindle reader. I didn’t think he’d have access to my reader, and before I knew it, and before my very eyes, I saw the app being manipulated and compromised. He reset the password, bgan removing my devices and reset them. It was this incident that convinced me to erase and reset my phone to factory standards. I even erased the eSIM before the Apple representative walked me through that step.


When I returned that evening from work, I turned on my television only to find that the settings had been reset to zero. I had to reset my television to factory settings, and then found out that all of apps connected to my tv such as Netflix, YouTube, Amazon prime, etc had also been compromised.


I know you know the feeling of trying to get control of an app and everything that needs to be verified leaves right back to the hacker.


Well, at this point, I’m just venting. I guess it does me some good.


I appreciate the time you’ve taken, and I will pray that you will find a resolve to your situation Peace and blessings, Alejandro.



Oct 30, 2023 10:22 PM in response to MrHoffman

Thank you for this information. It’s definitely helpful. All these responses are giving me a guided direction towards a possible resolve.

And ironically, the guy who hacked and in my my mind’s perception, cloned my phone, stated that he knew who I was, and believed, for I am not sure how he came to his conclusions, that I was a very important, influential person with a lot of money. I’m sure he was upset when he realized how influential I am not and how much money I have not.

I guess that ****** him off even more.


Peace and blessings, Alejandro.

Jan 26, 2024 3:38 AM in response to ASCUN75

Well, I never thought anything even close to being as devistating as war could possibly happen to me but here I am, an iPhone13 down, a Xiaomi Redmi Note 10T, 5 laptops, 9 HDDs, now a 5 Day old iPhone 15Pro (a Grand I Borrowed) with a new esim, number, mac & IPs, got the 1st hit in the Parking lot of AT&T where I spent 4Hrs on their phone just to get the New 15 to take an esim!

They wouldn't accept it back so now that I am certain I cannot trust it I have an expensive door stopper. I've Never quit a single thing in my Life, a former US Marine but I'm so sick of the games I will have to soon before anyone else thinks I'm just another crazy vet who rotated home, lost my family then went nuts however, y'all have given me some much needed strength knowing I'm not fully alone or a fruit & nut cake! I'll fight it until,.... I cannot anymore.

Y'all have a blessed day I've been up all night playing hacker war resetting, new #, esim, passwords, etc. I'm done for now. Stay safe & well protected! CJ

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

My iPhone 15 has been cloned

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.