A real big problem, a hacking problem

My iPhone, SC and the copious phones I've had before that I hacked from inside out as soon as I plug it into the wall. There is already an open Wi-Fi that attaches itself to the phone and get all my details that I am EEI number SSID, and then they enter their own answering card number.

Posted on Nov 1, 2023 1:14 PM

Reply
Question marked as Top-ranking reply

Posted on Nov 1, 2023 1:31 PM

Access points don't attach themselves to Wi-Fi clients. It's the other way around: Wi-Fi clients see advertisements from access points, and then make requests to join Wi-Fi networks.


Your phone will remember Wi-Fi networks that you have joined before, and try to automatically join them again, as a convenience. If you have let it join some network that you don't want to join again (e.g., because they have no / low security), you can go into the phone's settings and tell it to forget those networks.

Similar questions

9 replies
Question marked as Top-ranking reply

Nov 1, 2023 1:31 PM in response to epony225

Access points don't attach themselves to Wi-Fi clients. It's the other way around: Wi-Fi clients see advertisements from access points, and then make requests to join Wi-Fi networks.


Your phone will remember Wi-Fi networks that you have joined before, and try to automatically join them again, as a convenience. If you have let it join some network that you don't want to join again (e.g., because they have no / low security), you can go into the phone's settings and tell it to forget those networks.

Nov 1, 2023 1:35 PM in response to epony225

If your phone auto joins an open Wi-Fi, then you just need to forget that network after it joins.

How to forget a Wi-Fi network on iPhone, iPad, or Mac - Apple Support


A rogue Wifi source cannot capture your IMEI number, but does capture your MAC address after you connect to it and the SSID would just be the name of the WiFi network that you are connected to. Not sure what you mean by "they enter their own answering card number". Also have no idea how plugging it into the wall would have any effect.

Nov 1, 2023 2:03 PM in response to Mac Jim ID

Mac Jim ID wrote:

Also have no idea how plugging it into the wall would have any effect.


Maybe the OP has read reports of "juice jacking".


That's a theoretical attack carried out through USB. The idea is that when you plug your device into some public USB port, in order to charge it from USB power, some malicious device that a criminal installed sends USB data to your computer or phone to "hack" it. (I am guessing that such data might include keyboard and mouse events.)


The attack takes advantage of the fact that a USB connection can carry both power and data. The power is not the threat, unless the power source is defective, or unless, say, it is maliciously designed to deliver 120 VAC to a device expecting 5 V DC. The data – as remote as the odds are – is.


Federal Communications Commission – What is 'Juice Jacking' and Tips to Avoid It


Note that while the attack IS theoretically possible, the FCC says they are not aware of any confirmed instances (outside of demonstrations by cybersecurity experts) of it occurring.

Nov 1, 2023 2:06 PM in response to Mac Jim ID

Mac Jim ID wrote:

A rogue Wifi source cannot capture your IMEI number, but does capture your MAC address after you connect to it and the SSID would just be the name of the WiFi network that you are connected to.

Apple thought of that. The MAC address seen by a Wi-Fi network is a bogus address, randomly generated by the iPhone, and is not the device’s actual MAC address. And each Wi-Fi network the phone connects to gets a different bogus address, so the phone cannot be tracked across networks.


Nov 1, 2023 2:28 PM in response to Lawrence Finch

Lawrence Finch wrote:


Mac Jim ID wrote:

A rogue Wifi source cannot capture your IMEI number, but does capture your MAC address after you connect to it and the SSID would just be the name of the WiFi network that you are connected to.
Apple thought of that. The MAC address seen by a Wi-Fi network is a bogus address, randomly generated by the iPhone, and is not the device’s actual MAC address. And each Wi-Fi network the phone connects to gets a different bogus address, so the phone cannot be tracked across networks.

Is that true even after connecting to a preferred network, as the OP claims their device auto-joins to the WiFi network so I assume it's preferred? The MAC Randomization support article only states while scanning networks that it is randomized and I assume the actual MAC address would be needed by a preferred router for MAC filtering to work. I have not attempted to use MAC filtering on my router, but if it randomized, I assume it would not work then.

Wi-Fi privacy - Apple Support

Nov 1, 2023 7:18 PM in response to Lawrence Finch

Lawrence Finch wrote:

That was the way it worked initially. However, if you go to Settings/Wi-Fi and tap on the i next to the current network name there is a switch “Private Wi-Fi address”. This defaults to ON, and it will continue using the bogus address for connected networks. It will use the same private address for each preferred network, but will not share it between networks. About the only time you should turn this off is for your home network.

Thanks for the info.

Nov 1, 2023 5:34 PM in response to Mac Jim ID

That was the way it worked initially. However, if you go to Settings/Wi-Fi and tap on the i next to the current network name there is a switch “Private Wi-Fi address”. This defaults to ON, and it will continue using the bogus address for connected networks. It will use the same private address for each preferred network, but will not share it between networks. About the only time you should turn this off is for your home network.

Nov 1, 2023 1:44 PM in response to epony225

With respect to SSIDs, most access points broadcast their SSIDs to the world, in the beacon packets that they send out to tell clients that they exist. For a while, there were some people who thought that telling access points to hide SSIDs would improve security … "security through obscurity". It doesn't really improve security. All it really does is to make things less convenient for computer users who then have to know the "hidden" SSID.


What does improve security on Wi-Fi networks is to use an access point that is using WPA2 or WPA3, set up so that only AES encryption (no TKIP encryption) is allowed.


This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

A real big problem, a hacking problem

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.