LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   ChromeOS (https://www.linuxquestions.org/questions/chromeos-130/)
-   -   Hacker is configuring Chrome OS on my iPhone (https://www.linuxquestions.org/questions/chromeos-130/hacker-is-configuring-chrome-os-on-my-iphone-4175673240/)

CookieMon 04-14-2020 06:22 PM

Hacker is configuring Chrome OS on my iPhone
 
Hi all, I may be way off I’m using this form for this question. I’m a newbie. My Mac and my iPhone has been hacked and the hacker is currently installing chrome OS on my phone. You’re able to control just about everything on both devices and most of my content has been removed from my Mac. I hope that I can stop the The damage from continuing on my iPhone. I noticed today that when I have my iPhone on the cellular activated and my Mac on the able to connect to my Mac somehow. I’ve thought that the activity I see might be fooling me and it’s actually bots so I’ve been scouring files to find out. Any thoughts on removing Chrome or any other advice. I’ve submitted the paperwork to the feds cybercrime agency but I can’t find any in person technical support around me. They’re all busy setting up home offices.
Thank you

TB0ne 04-15-2020 10:56 AM

Quote:

Originally Posted by CookieMon (Post 6111749)
Hi all, I may be way off I’m using this form for this question. I’m a newbie. My Mac and my iPhone has been hacked and the hacker is currently installing chrome OS on my phone. You’re able to control just about everything on both devices and most of my content has been removed from my Mac. I hope that I can stop the The damage from continuing on my iPhone. I noticed today that when I have my iPhone on the cellular activated and my Mac on the able to connect to my Mac somehow. I’ve thought that the activity I see might be fooling me and it’s actually bots so I’ve been scouring files to find out. Any thoughts on removing Chrome or any other advice. I’ve submitted the paperwork to the feds cybercrime agency but I can’t find any in person technical support around me. They’re all busy setting up home offices.
Thank you

Seems to be a trend; another 'newbie' with supposed evidence of cybercrimes, dealing with a 'hacker'.

How about posting whatever actual PROOF you have that someone is doing something, and maybe someone can help you. Otherwise, call Apple, since you have an iPhone and a Mac.

sevendogsbsd 04-15-2020 10:56 AM

Impossible: ChromeOS will not run on an iPhone. Also, people are rarely hacked but it is entirely possible you have a virus.

TB0ne 04-15-2020 11:03 AM

Quote:

Originally Posted by sevendogsbsd (Post 6112005)
Impossible: ChromeOS will not run on an iPhone. Also, people are rarely hacked but it is entirely possible you have a virus.

Virus? Absolutely possible. But this thread reads like many others in the past two years:
  • Just enough technical words to sound ok, but not make sense in context.
  • The 'proof' isn't somehow available to share, but...
  • ...the 'feds'/cybercrime/police/whatever are 'investigating', but...
  • ...they aren't acting.
Sounds very familiar.

sevendogsbsd 04-15-2020 11:04 AM

I was just trying to be helpful - OP is clearly delusional...I have seen these before as well.

JWJones 04-15-2020 11:30 AM

If the post was in fact true, it begs the biggest question of all: why have you not powered off your devices and disconnected from the net at the first sign of attack?

Samsonite2010 04-15-2020 11:44 AM

Quote:

Originally Posted by JWJones (Post 6112021)
If the post was in fact true, it begs the biggest question of all: why have you not powered off your devices and disconnected from the net at the first sign of attack?

Exactly, power off or disconnect any internet connection. A hacker may have a difficult time without any connectivity, even if they have installed some software. But yeah, don't just leave them doing it (if they really are).

sevendogsbsd 04-15-2020 11:48 AM

There is either a medical or chemical reason for this post. Certainly not an IT issue.

CookieMon 04-15-2020 05:04 PM

I did not expect to get an ass whooping like that. I’m just asking for some advice. If you don’t believe me then lets pretend it’s a hypothetical question. I’m curious about the requests for por proof. Can you suggest what I can use as proof. If sure the folks at. ic3.gov may want something up front. My calls to the authorities started with a police report from the staties then I was referred to the FBI state office who then asked me to submit the form at that site. As for my reaction in keeping my Mac online... I completely overestimated my ability to find the hacker and remove their ability to get on mac. I did turn off my iPhone immediately and bought androids as well as completely disconnecting my router and and devices with cellular.
I made one mistake. The chrome files I saw were on my Android, not my iPhone.
I’ve read through dozens and dozens of files files so if anyone sees anything they recognize I can verify what I’ve seen. One thing that I noticed was that the sometimes used the word “Janus” as a pseudonym for the victim, as well as “client”. I recently read an article while doing research and saw that Janus is also the name of a hacking “program” seen on 2019. I don’t know if that helps. Lastly, when I accessed the root user I saw two files on the desktop, “changes” which contained hundreds of files that corresponded with any file I saw with a “last modified date” in recent days. I also have a copy of Synack’s guide to Malware which looked a bit like a guide for hacker’s but appears to be written for IT security. I have a ton more information if anyone is willing to entertain my request for help.
I may have been completely teamed and dismissed but I can’t let that stop me from asking.
Please help if you can.

JWJones 04-15-2020 07:58 PM

Your best bet in this case, then, is probably going to be contacting Apple and your cell service provider. You may find some help at a Mac forum such as Mac Power Users.

Honestly, a Linux forum won't be very helpful in your case. Macs are based on BSD rather than Linux. Maybe the macOS sub-forum at unix.com?

sevendogsbsd 04-15-2020 09:20 PM

This reads exactly like another member’s posts of exactly the same situation. It’s is utter fallacy. No self respecting hacker does this to an individual; they do it to governments, businesses, etc. OP, this scenario is highly unlikely and is probably indicative of technical issues with your PC and/or phone. Unless you have millions in bitcoin or are the CEO of a corporation and have value to an attacker, your PC and phone are of no consequence and not worth the effort.

JWJones 04-15-2020 09:31 PM

Quote:

Originally Posted by sevendogsbsd (Post 6112231)
This reads exactly like another member’s posts of exactly the same situation. It’s is utter fallacy. No self respecting hacker does this to an individual; they do it to governments, businesses, etc. OP, seek professional help.

Yeah, seems pretty unlikely. Not sure what the point is, in that case. What do they hope to gain? (The OP, not the alleged hacker.)

TB0ne 04-16-2020 07:58 AM

Quote:

Originally Posted by CookieMon (Post 6112150)
I did not expect to get an ass whooping like that. I’m just asking for some advice. If you don’t believe me then lets pretend it’s a hypothetical question.

You're right...we DON'T believe you, so trying to go the 'hypothetical' route isn't going to help.
Quote:

I’m curious about the requests for por proof. Can you suggest what I can use as proof. If sure the folks at. ic3.gov may want something up front. My calls to the authorities started with a police report from the staties then I was referred to the FBI state office who then asked me to submit the form at that site.
Sorry, what??? You STARTED this thread by stating the FACT that you had been hacked, and that you've already put the paperwork in to the 'cybercrimes unit'. Now you're asking what you should do to submit the form??? Which is it?
Quote:

As for my reaction in keeping my Mac online... I completely overestimated my ability to find the hacker and remove their ability to get on mac. I did turn off my iPhone immediately and bought androids as well as completely disconnecting my router and and devices with cellular.
...yet posted that they 'installed' ChromeOS on your iPhone, and 'forgot' the fact that you bought MULTIPLE Android phones??? And yet these magic hackers are able to 'hack' you even when you're disconnected??
Quote:

I made one mistake. The chrome files I saw were on my Android, not my iPhone. I’ve read through dozens and dozens of files files so if anyone sees anything they recognize I can verify what I’ve seen. One thing that I noticed was that the sometimes used the word “Janus” as a pseudonym for the victim, as well as “client”. I recently read an article while doing research and saw that Janus is also the name of a hacking “program” seen on 2019. I don’t know if that helps. Lastly, when I accessed the root user I saw two files on the desktop, “changes” which contained hundreds of files that corresponded with any file I saw with a “last modified date” in recent days. I also have a copy of Synack’s guide to Malware which looked a bit like a guide for hacker’s but appears to be written for IT security. I have a ton more information if anyone is willing to entertain my request for help.
Right...the 'hackers' are going to choose a vaguely sinister nickname for you, and (not only that), are going to LEAVE TRACES that someone can find and track back. Funny, for a 'newbie', you seem to know an awful lot about low level software and hacking. And weren't you asking at the beginning of this rant that you didn't know what could be used as proof?? Now you say you have 'a ton more information'??

And how about telling us why these evil hackers have targeted you? Any ideas??
Quote:

I may have been completely teamed and dismissed but I can’t let that stop me from asking. Please help if you can.
The kind of help you need will not come from a technical forum.

Got a Mac/iPhone? Call Apple with this. Got an Android phone? Call your cell-phone provider. They get paid to have their time wasted.

dc.901 04-16-2020 08:23 AM

Have you gone into Apple store and asked for advise?
Or, even, asked this on Mac forums?

CookieMon 04-16-2020 07:23 PM

JWJones, I appreciate your first reply. You made a good point in the next. What in the hell would I gain from posting this?

TBOne, Despite your ramblings you seem very interested in my story. That’s an amazingly long response to something you’re apparently very angry about. Maybe you should check that anger out with the professionals sometime.
- Before this all happened I was only vaguely familiar with using Terminal and finding hidden folders. I’ve since read a lot and learned more than I ever wanted to so thank you for the compliment.
- Why did they target me? The only guess I have is that1) I was an easy target after downloading malware and 2) the malware instruction file I mentioned was my first clue that this is someone practicing on me. At first I would, for example, run a History in the terminal and see a lot of repeating commands while altering something small, as if getting it wrong and trying again. The fact that they left the commands for me to see is a clue that they needed to learn more. Further along the commands got too sophisticated for me to understand.
- I began getting blocked from altering settings. For example, in the directory utility I would remove root access to my usernames that didn’t have it before. That ability was removed. Recently I was unable to open many apps or start any advanced startup mode like recovery. Recovery seems to be the answer to a few things but all of the startup functions are bypassed and the Mac is started normally.
- The “ton more information I have is verbal at this point since I’m unable to get files out of the Mac. That’s what I meant about that. I can take photos of open files or greyes out settings. My question was meant to find out what file or text or visual would help anyone to understand.
- I did submit a form to ic3. I was asking to see what Proof A couple FORUM users asked for.
- The magic way in which they connected after WiFi was removed: From what I’ve read it sounds possible to Telnet or SSH in without WiFi. It’s then hypothetically possible to use Bluetooth to get into nearby devices. This is what I think could’ve happened to our cheap Galaxy phones. they got into something with cellular. Before you shout that our devices were it should’ve been off we didn’t think to turn off a few devices such as our watches and iPad.

DC901, - Apple was called. And Google and AT&T. The message was about the same. They suggested I go into a store (Not open) and call the police (done).
Thanks for the Mac forum suggestion. I’m a bit gunshot now but I’ll check it out.


All times are GMT -5. The time now is 04:58 AM.