Message & Location Request Ghost text

A message and location request was sent to my friend, except I did not send the location request nor did I send the sexually suggestive message. When I contacted Apple support, they led me through resetting my network settings, and eventually my whole phone reset, but could not tell me where the location request or message originated. it was not from my MacBook, it could only have been from my phone. I tried to see if maybe I accidentally sent a location request, kind of like a butt dial, but there was no way I did that, nor did I type a message and forget about it and then send it! I don’t know how to resolve this, I thought about just getting rid of my phone in case I was hacked.🤷🏻‍♂️

Help me!


iPhone 14, iOS 17

Posted on Mar 18, 2024 7:44 PM

Reply

Similar questions

1 reply

Mar 19, 2024 1:05 AM in response to tonaso

Hack or Prank?


It is highly unlikely that skilled hackers would choose to invest their time and resources into monitoring an unknown person's device and send a location request and send sexually suggestive messages. Firstly, hacking requires a certain level of expertise, knowledge, and tools, which can be quite valuable assets. A proficient hacker typically has a specific agenda, such as gaining unauthorized access to sensitive information, financial gain, or advancing their own personal or political interests.


Monitoring your iPhone would not yield any substantial benefits for a hacker. It would be a trivial and unproductive pursuit that lacks any significant value or purpose. Additionally, hacking activities are often motivated by tangible gains, such as financial rewards, access to valuable data, or the ability to manipulate systems for personal or ideological motives. Monitoring someone's device to send a location request and send sexually suggestive messages would not offer any meaningful advantage or serve a legitimate purpose but pranks would.


Moreover, hacking is an inherently risky activity that can have serious legal consequences. Engaging in unauthorized access, surveillance, or invasion of privacy is illegal in most jurisdictions. Skilled hackers typically operate with more calculated precision, targeting high-value entities or systems that present greater opportunities for achieving their objectives. The risks associated with hacking a device would far outweigh any potential benefits, making it an illogical and unprofitable endeavor.


In summary, hackers typically focus their efforts on more lucrative targets that align with their motives and offer substantial rewards. Investing time and resources into monitoring a device to send a location request and send sexually suggestive messages would be an inefficient and unproductive use of their skills, knowledge, and tools.


To protect your devices and personal information, it is crucial to follow good security practices such as using strong and unique passwords, keeping your software up to date, being cautious with email attachments and links, and ensuring that your devices have appropriate security measures in place.



On your iPhone, iPad, or iPod touch: Go to Settings > your name > Password & Security.Tap Turn On Two-Factor Authentication. Then tap Continue and follow the onscreen instructions.


Two-factor authentication for Apple ID - Apple Support (IN)



Beware of Phishing!: Be careful and be smart to --> Recognize and avoid phishing messages, phony support calls ...

It (Phishing) may appear as the image given below.




Gain control of your Apple ID

If your Apple ID password has been changed by someone else, reset your password. Go to appleid.apple.com to update any personal or security information that isn't correct or that you don't recognize.27-Mar-2023


If you think your Apple ID has been compromised



This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Message & Location Request Ghost text

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.