RedTiff wrote:
So you are confirming that it can be hacked and you had to take it to an Apple Store to get this resolved?
That sequence of postings includes, unfortunately, little about what happened with the device, what happened at Apple and what (if anything) was found or resolved, and what then happened that led to a return visit.
I do not expect the posting in these “hacked” threads will detect and post any forensic evidence indicating compromises, however. I’ve looked at many posted images containing mundane and benign log chatter misunderstood, as have others. Adversaries prefer to avoid exposing their exceedingly expensive exploits widely too, less those vulnerabilities be identified and mitigated.
I an aware of (exceedingly few) people around the communities (or elsewhere) that have been targeted, and in the cases I’ve encountered, the motivation of an adversary had used for targeting was unfortunate but all too clear.
In another case, the issue found was utterly unrelated to the iPhone and to what had been reported. The hardware and firmware and software and passwords were all fine.
Can an iPhone be targeted? Yes. Exceedingly rarely, but possible. Is exploitation common? No. Not at all common.
If someone has repeated the same remediation dozens of times however, either the remediation is not working, or there is another issue or path yet determined and yet unresolved, or there is something else happening entirely. And little (none?) of that is feasibly researched or resolved around here in an anonymous forum, nor even can it be. Not without background and forensic access and other details, and the time and effort and access involved.
Complicating all of these discussions, it is difficult if not impossible to prove a negative; that a device is not compromised.