Hacker is configuring Chrome OS on my iPhone
Hi all, I may be way off I’m using this form for this question. I’m a newbie. My Mac and my iPhone has been hacked and the hacker is currently installing chrome OS on my phone. You’re able to control just about everything on both devices and most of my content has been removed from my Mac. I hope that I can stop the The damage from continuing on my iPhone. I noticed today that when I have my iPhone on the cellular activated and my Mac on the able to connect to my Mac somehow. I’ve thought that the activity I see might be fooling me and it’s actually bots so I’ve been scouring files to find out. Any thoughts on removing Chrome or any other advice. I’ve submitted the paperwork to the feds cybercrime agency but I can’t find any in person technical support around me. They’re all busy setting up home offices.
Thank you |
Quote:
How about posting whatever actual PROOF you have that someone is doing something, and maybe someone can help you. Otherwise, call Apple, since you have an iPhone and a Mac. |
Impossible: ChromeOS will not run on an iPhone. Also, people are rarely hacked but it is entirely possible you have a virus.
|
Quote:
|
I was just trying to be helpful - OP is clearly delusional...I have seen these before as well.
|
If the post was in fact true, it begs the biggest question of all: why have you not powered off your devices and disconnected from the net at the first sign of attack?
|
Quote:
|
There is either a medical or chemical reason for this post. Certainly not an IT issue.
|
I did not expect to get an ass whooping like that. I’m just asking for some advice. If you don’t believe me then lets pretend it’s a hypothetical question. I’m curious about the requests for por proof. Can you suggest what I can use as proof. If sure the folks at. ic3.gov may want something up front. My calls to the authorities started with a police report from the staties then I was referred to the FBI state office who then asked me to submit the form at that site. As for my reaction in keeping my Mac online... I completely overestimated my ability to find the hacker and remove their ability to get on mac. I did turn off my iPhone immediately and bought androids as well as completely disconnecting my router and and devices with cellular.
I made one mistake. The chrome files I saw were on my Android, not my iPhone. I’ve read through dozens and dozens of files files so if anyone sees anything they recognize I can verify what I’ve seen. One thing that I noticed was that the sometimes used the word “Janus” as a pseudonym for the victim, as well as “client”. I recently read an article while doing research and saw that Janus is also the name of a hacking “program” seen on 2019. I don’t know if that helps. Lastly, when I accessed the root user I saw two files on the desktop, “changes” which contained hundreds of files that corresponded with any file I saw with a “last modified date” in recent days. I also have a copy of Synack’s guide to Malware which looked a bit like a guide for hacker’s but appears to be written for IT security. I have a ton more information if anyone is willing to entertain my request for help. I may have been completely teamed and dismissed but I can’t let that stop me from asking. Please help if you can. |
Your best bet in this case, then, is probably going to be contacting Apple and your cell service provider. You may find some help at a Mac forum such as Mac Power Users.
Honestly, a Linux forum won't be very helpful in your case. Macs are based on BSD rather than Linux. Maybe the macOS sub-forum at unix.com? |
This reads exactly like another member’s posts of exactly the same situation. It’s is utter fallacy. No self respecting hacker does this to an individual; they do it to governments, businesses, etc. OP, this scenario is highly unlikely and is probably indicative of technical issues with your PC and/or phone. Unless you have millions in bitcoin or are the CEO of a corporation and have value to an attacker, your PC and phone are of no consequence and not worth the effort.
|
Quote:
|
Quote:
Quote:
Quote:
Quote:
And how about telling us why these evil hackers have targeted you? Any ideas?? Quote:
Got a Mac/iPhone? Call Apple with this. Got an Android phone? Call your cell-phone provider. They get paid to have their time wasted. |
Have you gone into Apple store and asked for advise?
Or, even, asked this on Mac forums? |
JWJones, I appreciate your first reply. You made a good point in the next. What in the hell would I gain from posting this?
TBOne, Despite your ramblings you seem very interested in my story. That’s an amazingly long response to something you’re apparently very angry about. Maybe you should check that anger out with the professionals sometime. - Before this all happened I was only vaguely familiar with using Terminal and finding hidden folders. I’ve since read a lot and learned more than I ever wanted to so thank you for the compliment. - Why did they target me? The only guess I have is that1) I was an easy target after downloading malware and 2) the malware instruction file I mentioned was my first clue that this is someone practicing on me. At first I would, for example, run a History in the terminal and see a lot of repeating commands while altering something small, as if getting it wrong and trying again. The fact that they left the commands for me to see is a clue that they needed to learn more. Further along the commands got too sophisticated for me to understand. - I began getting blocked from altering settings. For example, in the directory utility I would remove root access to my usernames that didn’t have it before. That ability was removed. Recently I was unable to open many apps or start any advanced startup mode like recovery. Recovery seems to be the answer to a few things but all of the startup functions are bypassed and the Mac is started normally. - The “ton more information I have is verbal at this point since I’m unable to get files out of the Mac. That’s what I meant about that. I can take photos of open files or greyes out settings. My question was meant to find out what file or text or visual would help anyone to understand. - I did submit a form to ic3. I was asking to see what Proof A couple FORUM users asked for. - The magic way in which they connected after WiFi was removed: From what I’ve read it sounds possible to Telnet or SSH in without WiFi. It’s then hypothetically possible to use Bluetooth to get into nearby devices. This is what I think could’ve happened to our cheap Galaxy phones. they got into something with cellular. Before you shout that our devices were it should’ve been off we didn’t think to turn off a few devices such as our watches and iPad. DC901, - Apple was called. And Google and AT&T. The message was about the same. They suggested I go into a store (Not open) and call the police (done). Thanks for the Mac forum suggestion. I’m a bit gunshot now but I’ll check it out. |
All times are GMT -5. The time now is 04:58 AM. |