LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Other *NIX Forums > ChromeOS
User Name
Password
ChromeOS This forum is for the discussion of ChromeOS.

Notices


Closed Thread
  Search this Thread
Old 04-14-2020, 06:22 PM   #1
CookieMon
LQ Newbie
 
Registered: Apr 2020
Posts: 3

Rep: Reputation: Disabled
Hacker is configuring Chrome OS on my iPhone


Hi all, I may be way off I’m using this form for this question. I’m a newbie. My Mac and my iPhone has been hacked and the hacker is currently installing chrome OS on my phone. You’re able to control just about everything on both devices and most of my content has been removed from my Mac. I hope that I can stop the The damage from continuing on my iPhone. I noticed today that when I have my iPhone on the cellular activated and my Mac on the able to connect to my Mac somehow. I’ve thought that the activity I see might be fooling me and it’s actually bots so I’ve been scouring files to find out. Any thoughts on removing Chrome or any other advice. I’ve submitted the paperwork to the feds cybercrime agency but I can’t find any in person technical support around me. They’re all busy setting up home offices.
Thank you
 
Old 04-15-2020, 10:56 AM   #2
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 26,671

Rep: Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970
Quote:
Originally Posted by CookieMon View Post
Hi all, I may be way off I’m using this form for this question. I’m a newbie. My Mac and my iPhone has been hacked and the hacker is currently installing chrome OS on my phone. You’re able to control just about everything on both devices and most of my content has been removed from my Mac. I hope that I can stop the The damage from continuing on my iPhone. I noticed today that when I have my iPhone on the cellular activated and my Mac on the able to connect to my Mac somehow. I’ve thought that the activity I see might be fooling me and it’s actually bots so I’ve been scouring files to find out. Any thoughts on removing Chrome or any other advice. I’ve submitted the paperwork to the feds cybercrime agency but I can’t find any in person technical support around me. They’re all busy setting up home offices.
Thank you
Seems to be a trend; another 'newbie' with supposed evidence of cybercrimes, dealing with a 'hacker'.

How about posting whatever actual PROOF you have that someone is doing something, and maybe someone can help you. Otherwise, call Apple, since you have an iPhone and a Mac.
 
1 members found this post helpful.
Old 04-15-2020, 10:56 AM   #3
sevendogsbsd
Senior Member
 
Registered: Sep 2017
Distribution: FreeBSD
Posts: 2,252

Rep: Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011
Impossible: ChromeOS will not run on an iPhone. Also, people are rarely hacked but it is entirely possible you have a virus.
 
1 members found this post helpful.
Old 04-15-2020, 11:03 AM   #4
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 26,671

Rep: Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970
Quote:
Originally Posted by sevendogsbsd View Post
Impossible: ChromeOS will not run on an iPhone. Also, people are rarely hacked but it is entirely possible you have a virus.
Virus? Absolutely possible. But this thread reads like many others in the past two years:
  • Just enough technical words to sound ok, but not make sense in context.
  • The 'proof' isn't somehow available to share, but...
  • ...the 'feds'/cybercrime/police/whatever are 'investigating', but...
  • ...they aren't acting.
Sounds very familiar.
 
2 members found this post helpful.
Old 04-15-2020, 11:04 AM   #5
sevendogsbsd
Senior Member
 
Registered: Sep 2017
Distribution: FreeBSD
Posts: 2,252

Rep: Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011
I was just trying to be helpful - OP is clearly delusional...I have seen these before as well.
 
1 members found this post helpful.
Old 04-15-2020, 11:30 AM   #6
JWJones
Senior Member
 
Registered: Jun 2009
Posts: 1,444

Rep: Reputation: 709Reputation: 709Reputation: 709Reputation: 709Reputation: 709Reputation: 709Reputation: 709
If the post was in fact true, it begs the biggest question of all: why have you not powered off your devices and disconnected from the net at the first sign of attack?
 
2 members found this post helpful.
Old 04-15-2020, 11:44 AM   #7
Samsonite2010
Member
 
Registered: Apr 2015
Distribution: Debian
Posts: 267
Blog Entries: 1

Rep: Reputation: 117Reputation: 117
Quote:
Originally Posted by JWJones View Post
If the post was in fact true, it begs the biggest question of all: why have you not powered off your devices and disconnected from the net at the first sign of attack?
Exactly, power off or disconnect any internet connection. A hacker may have a difficult time without any connectivity, even if they have installed some software. But yeah, don't just leave them doing it (if they really are).
 
Old 04-15-2020, 11:48 AM   #8
sevendogsbsd
Senior Member
 
Registered: Sep 2017
Distribution: FreeBSD
Posts: 2,252

Rep: Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011
There is either a medical or chemical reason for this post. Certainly not an IT issue.
 
2 members found this post helpful.
Old 04-15-2020, 05:04 PM   #9
CookieMon
LQ Newbie
 
Registered: Apr 2020
Posts: 3

Original Poster
Rep: Reputation: Disabled
I did not expect to get an ass whooping like that. I’m just asking for some advice. If you don’t believe me then lets pretend it’s a hypothetical question. I’m curious about the requests for por proof. Can you suggest what I can use as proof. If sure the folks at. ic3.gov may want something up front. My calls to the authorities started with a police report from the staties then I was referred to the FBI state office who then asked me to submit the form at that site. As for my reaction in keeping my Mac online... I completely overestimated my ability to find the hacker and remove their ability to get on mac. I did turn off my iPhone immediately and bought androids as well as completely disconnecting my router and and devices with cellular.
I made one mistake. The chrome files I saw were on my Android, not my iPhone.
I’ve read through dozens and dozens of files files so if anyone sees anything they recognize I can verify what I’ve seen. One thing that I noticed was that the sometimes used the word “Janus” as a pseudonym for the victim, as well as “client”. I recently read an article while doing research and saw that Janus is also the name of a hacking “program” seen on 2019. I don’t know if that helps. Lastly, when I accessed the root user I saw two files on the desktop, “changes” which contained hundreds of files that corresponded with any file I saw with a “last modified date” in recent days. I also have a copy of Synack’s guide to Malware which looked a bit like a guide for hacker’s but appears to be written for IT security. I have a ton more information if anyone is willing to entertain my request for help.
I may have been completely teamed and dismissed but I can’t let that stop me from asking.
Please help if you can.
 
Old 04-15-2020, 07:58 PM   #10
JWJones
Senior Member
 
Registered: Jun 2009
Posts: 1,444

Rep: Reputation: 709Reputation: 709Reputation: 709Reputation: 709Reputation: 709Reputation: 709Reputation: 709
Your best bet in this case, then, is probably going to be contacting Apple and your cell service provider. You may find some help at a Mac forum such as Mac Power Users.

Honestly, a Linux forum won't be very helpful in your case. Macs are based on BSD rather than Linux. Maybe the macOS sub-forum at unix.com?

Last edited by JWJones; 04-15-2020 at 08:00 PM.
 
Old 04-15-2020, 09:20 PM   #11
sevendogsbsd
Senior Member
 
Registered: Sep 2017
Distribution: FreeBSD
Posts: 2,252

Rep: Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011Reputation: 1011
This reads exactly like another member’s posts of exactly the same situation. It’s is utter fallacy. No self respecting hacker does this to an individual; they do it to governments, businesses, etc. OP, this scenario is highly unlikely and is probably indicative of technical issues with your PC and/or phone. Unless you have millions in bitcoin or are the CEO of a corporation and have value to an attacker, your PC and phone are of no consequence and not worth the effort.

Last edited by sevendogsbsd; 04-16-2020 at 07:20 AM.
 
1 members found this post helpful.
Old 04-15-2020, 09:31 PM   #12
JWJones
Senior Member
 
Registered: Jun 2009
Posts: 1,444

Rep: Reputation: 709Reputation: 709Reputation: 709Reputation: 709Reputation: 709Reputation: 709Reputation: 709
Quote:
Originally Posted by sevendogsbsd View Post
This reads exactly like another member’s posts of exactly the same situation. It’s is utter fallacy. No self respecting hacker does this to an individual; they do it to governments, businesses, etc. OP, seek professional help.
Yeah, seems pretty unlikely. Not sure what the point is, in that case. What do they hope to gain? (The OP, not the alleged hacker.)
 
Old 04-16-2020, 07:58 AM   #13
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 26,671

Rep: Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970
Quote:
Originally Posted by CookieMon View Post
I did not expect to get an ass whooping like that. I’m just asking for some advice. If you don’t believe me then lets pretend it’s a hypothetical question.
You're right...we DON'T believe you, so trying to go the 'hypothetical' route isn't going to help.
Quote:
I’m curious about the requests for por proof. Can you suggest what I can use as proof. If sure the folks at. ic3.gov may want something up front. My calls to the authorities started with a police report from the staties then I was referred to the FBI state office who then asked me to submit the form at that site.
Sorry, what??? You STARTED this thread by stating the FACT that you had been hacked, and that you've already put the paperwork in to the 'cybercrimes unit'. Now you're asking what you should do to submit the form??? Which is it?
Quote:
As for my reaction in keeping my Mac online... I completely overestimated my ability to find the hacker and remove their ability to get on mac. I did turn off my iPhone immediately and bought androids as well as completely disconnecting my router and and devices with cellular.
...yet posted that they 'installed' ChromeOS on your iPhone, and 'forgot' the fact that you bought MULTIPLE Android phones??? And yet these magic hackers are able to 'hack' you even when you're disconnected??
Quote:
I made one mistake. The chrome files I saw were on my Android, not my iPhone. I’ve read through dozens and dozens of files files so if anyone sees anything they recognize I can verify what I’ve seen. One thing that I noticed was that the sometimes used the word “Janus” as a pseudonym for the victim, as well as “client”. I recently read an article while doing research and saw that Janus is also the name of a hacking “program” seen on 2019. I don’t know if that helps. Lastly, when I accessed the root user I saw two files on the desktop, “changes” which contained hundreds of files that corresponded with any file I saw with a “last modified date” in recent days. I also have a copy of Synack’s guide to Malware which looked a bit like a guide for hacker’s but appears to be written for IT security. I have a ton more information if anyone is willing to entertain my request for help.
Right...the 'hackers' are going to choose a vaguely sinister nickname for you, and (not only that), are going to LEAVE TRACES that someone can find and track back. Funny, for a 'newbie', you seem to know an awful lot about low level software and hacking. And weren't you asking at the beginning of this rant that you didn't know what could be used as proof?? Now you say you have 'a ton more information'??

And how about telling us why these evil hackers have targeted you? Any ideas??
Quote:
I may have been completely teamed and dismissed but I can’t let that stop me from asking. Please help if you can.
The kind of help you need will not come from a technical forum.

Got a Mac/iPhone? Call Apple with this. Got an Android phone? Call your cell-phone provider. They get paid to have their time wasted.

Last edited by TB0ne; 04-16-2020 at 08:00 AM.
 
1 members found this post helpful.
Old 04-16-2020, 08:23 AM   #14
dc.901
Senior Member
 
Registered: Aug 2018
Location: Atlanta, GA - USA
Distribution: CentOS/RHEL, openSuSE/SLES, Ubuntu
Posts: 1,005

Rep: Reputation: 370Reputation: 370Reputation: 370Reputation: 370
Have you gone into Apple store and asked for advise?
Or, even, asked this on Mac forums?
 
Old 04-16-2020, 07:23 PM   #15
CookieMon
LQ Newbie
 
Registered: Apr 2020
Posts: 3

Original Poster
Rep: Reputation: Disabled
JWJones, I appreciate your first reply. You made a good point in the next. What in the hell would I gain from posting this?

TBOne, Despite your ramblings you seem very interested in my story. That’s an amazingly long response to something you’re apparently very angry about. Maybe you should check that anger out with the professionals sometime.
- Before this all happened I was only vaguely familiar with using Terminal and finding hidden folders. I’ve since read a lot and learned more than I ever wanted to so thank you for the compliment.
- Why did they target me? The only guess I have is that1) I was an easy target after downloading malware and 2) the malware instruction file I mentioned was my first clue that this is someone practicing on me. At first I would, for example, run a History in the terminal and see a lot of repeating commands while altering something small, as if getting it wrong and trying again. The fact that they left the commands for me to see is a clue that they needed to learn more. Further along the commands got too sophisticated for me to understand.
- I began getting blocked from altering settings. For example, in the directory utility I would remove root access to my usernames that didn’t have it before. That ability was removed. Recently I was unable to open many apps or start any advanced startup mode like recovery. Recovery seems to be the answer to a few things but all of the startup functions are bypassed and the Mac is started normally.
- The “ton more information I have is verbal at this point since I’m unable to get files out of the Mac. That’s what I meant about that. I can take photos of open files or greyes out settings. My question was meant to find out what file or text or visual would help anyone to understand.
- I did submit a form to ic3. I was asking to see what Proof A couple FORUM users asked for.
- The magic way in which they connected after WiFi was removed: From what I’ve read it sounds possible to Telnet or SSH in without WiFi. It’s then hypothetically possible to use Bluetooth to get into nearby devices. This is what I think could’ve happened to our cheap Galaxy phones. they got into something with cellular. Before you shout that our devices were it should’ve been off we didn’t think to turn off a few devices such as our watches and iPad.

DC901, - Apple was called. And Google and AT&T. The message was about the same. They suggested I go into a store (Not open) and call the police (done).
Thanks for the Mac forum suggestion. I’m a bit gunshot now but I’ll check it out.
 
  


Closed Thread



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Famous iPhone and PS3 Hacker Made an Ubuntu-Powered Self-Driving Car LXer Syndicated Linux News 0 12-17-2015 11:51 AM
LXer: Open Source History: Tracing the Origins of Hacker Culture and the Hacker Ethic LXer Syndicated Linux News 0 04-29-2015 08:40 PM
LXer: Hacker group claims to have cracked Apple's iPhone 5S fingerprint scanner LXer Syndicated Linux News 1 09-24-2013 12:11 PM

LinuxQuestions.org > Forums > Other *NIX Forums > ChromeOS

All times are GMT -5. The time now is 11:28 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration