Suspected AI/ML-based cyber attack on all devices

Hello, please i would like to ask you for helping me with cyber attack. It takes almos half year and i am not able to protect by myself. XX factory reset all devices (router, Mac,iPhone):

Sympthoms:

  • services control
  • keaboard control
  • Freezing (apps, web page, system)
  • forwarded to fake webpage
  • Unknown devices, apps


Remeaditiom (unssucessfully)

  • bought Nord VPN
  • bought new router, iPhone
  • bought UniFi gateway


I think that there must be some automation on system level with using AI/ML, Siri. After factory reset are automatically called Bluetooth, microphone, camera via application clip. I have some screens and diagnostic logs (siriSearch, RTC reporting etc. )


SiriSearc tells:

bug_type":"313","timestamp":"2025-02-03 12:57:43.00 -0800","os_version":"iPhone OS 18.3 (22D63)","roots_installed":0,"incident_id":"534B7C1E-5A58-4D70-845E-19CFB4747BB7"}

{"country_code":"CZ","agent":"parsecd\/1 (iPhone13,2; iPhone OS 18.3 22D63) parsecd\/1","user_guid":"4D70E805-9B5E-4730-A15C-C430894E8A08","session_start":1738616256}


[Re-Titled by Moderator]

Posted on Feb 3, 2025 08:57 PM

Reply

Similar questions

4 replies

Feb 3, 2025 09:39 PM in response to Ilidanis

Ilidanis wrote:


I think that there must be some automation on system level with using AI/ML,

If you feel an unauthorized person/app is remotely using, controlling or monitoring your device, then that is possible only if you have done one or more of the following Don'ts...


  1. Don't hand over an iPhone to kids or to a stranger without Enabling Guided Access
  2. Don't share Apple IDs
  3. Don't Jailbreak
  4. Don't share sensitive information pertaining to your device
  5. Don't give in to Phishing
  6. Don't plug in your device in Airports and Public places through third-party cables and trust the device. Beware of Juice Jacking. (Especially in India)
  7. Don't leave your iPhone unlocked and unattended in public places like offices, schools, malls, etc.


If one of the above is true then quickly change the Apple ID Password and Return iPhone settings to their defaults.



Feb 3, 2025 09:41 PM in response to Ilidanis

Ilidanis wrote:

I have some screens and diagnostic logs (siriSearch, RTC reporting etc. )

SiriSearc tells:
bug_type":"313","timestamp":"2025-02-03 12:57:43.00 -0800","os_version":"iPhone OS 18.3 (22D63)","roots_installed":0,"incident_id":"534B7C1E-5A58-4D70-845E-19CFB4747BB7"}
{"country_code":"CZ","agent":"parsecd\/1 (iPhone13,2; iPhone OS 18.3 22D63) parsecd\/1","user_guid":"4D70E805-9B5E-4730-A15C-C430894E8A08","session_start":1738616256}

Keep the iPhone updated to the latest iOS always and never Jailbreak. That's it.


iOS / iPadOS devices cannot be hacked or infected with Virus / Malware / Spyware *** unless you have intentionally downloaded spurious software or unauthorized apps directly from the internet and installed them on your device or/and have Jailbroken


It (Hacking) also depends on how careful you are in sharing sensitive and valuable information pertaining to your iPhone such as Passcode, Password, etc with your friends and family members.


Be judicious when sharing the device's sensitive and valuable information with friends and family members.



**The primary reason for this is Sandboxing. All third-party apps are “sandboxed”, so they are restricted from accessing files stored by other apps or from making changes to the device. Sandboxing is designed to prevent apps from gathering or modifying information stored by other apps.


Security of runtime process in iOS and iPadOS - Apple Support



The sandbox on an iPhone is a security feature that creates a restricted environment for each app to run in isolation from other apps and the operating system. It is a core component of iOS's security architecture and plays a crucial role in making iPhones more secure.



If you doubt the authenticity of the information provided earlier, you have two alternatives:

  1. Report the hacking incident to local law enforcement authorities and actively pursue the case.
  2. Accept the credibility of the information; it is impervious to hacking. Just as some individuals hold unconventional beliefs, such as a flat Earth or moon landing denial, one has the freedom to believe in anything. The choice ultimately rests with you in this open and free world.


Feb 3, 2025 09:41 PM in response to Ilidanis

Ilidanis wrote:


After factory reset are automatically called Bluetooth, microphone, camera via application clip.

Hack or Prank?


It is highly unlikely that skilled hackers would choose to invest their time and resources into monitoring an unknown person's device and making calls. Firstly, hacking requires a certain level of expertise, knowledge, and tools, which can be quite valuable assets. A proficient hacker typically has a specific agenda, such as gaining unauthorized access to sensitive information, financial gain, or advancing their own personal or political interests.


Monitoring your iPhone would not yield any substantial benefits for a hacker. It would be a trivial and unproductive pursuit that lacks any significant value or purpose. Additionally, hacking activities are often motivated by tangible gains, such as financial rewards, access to valuable data, or the ability to manipulate systems for personal or ideological motives. Monitoring someone's device or making calls would not offer any meaningful advantage or serve a legitimate purpose but pranks would.


Moreover, hacking is an inherently risky activity that can have serious legal consequences. Engaging in unauthorized access, surveillance, or invasion of privacy is illegal in most jurisdictions. Skilled hackers typically operate with more calculated precision, targeting high-value entities or systems that present greater opportunities for achieving their objectives. The risks associated with hacking a device would far outweigh any potential benefits, making it an illogical and unprofitable endeavor.


In summary, hackers typically focus their efforts on more lucrative targets that align with their motives and offer substantial rewards. Investing time and resources into monitoring a device would be an inefficient and unproductive use of their skills, knowledge, and tools.


To protect your devices and personal information, it is crucial to follow good security practices such as using strong and unique passwords, keeping your software up to date, being cautious with email attachments and links, and ensuring that your devices have appropriate security measures in place.



On your iPhone, iPad, or iPod touch: Go to Settings > your name > Password & Security.Tap Turn On Two-Factor Authentication. Then tap Continue and follow the onscreen instructions.


Two-factor authentication for Apple ID - Apple Support (IN)



Beware of Phishing!: Be careful and be smart to --> Recognize and avoid phishing messages, phony support calls ...

It (Phishing) may appear as the image given below.




Gain control of your Apple ID

If your Apple ID password has been changed by someone else, reset your password. Go to appleid.apple.com to update any personal or security information that isn't correct or that you don't recognize.27-Mar-2023


If you think your Apple ID has been compromised



Feb 3, 2025 09:44 PM in response to Ilidanis

If you genuinely believe that your device or account has been hacked, it is crucial to take immediate action. Have you reported the hacking incident to local law enforcement? Reporting the issue as soon as possible can help authorities investigate and take necessary action. Additionally, contacting your financial institutions and online service providers can help secure your accounts and prevent any potential financial loss or disruptions to your daily life. Taking swift action will not only protect your personal information but also minimize any long-term impact on your finances and digital security.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Suspected AI/ML-based cyber attack on all devices

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.