My iPhone has been hacked

Crash report from my analytics data

any help?

had this issue for 2months now.

its some using an apple developer account with the email ha********y34@icloud.com


app_name":"FedStatsMLHostPlugin","timestamp":"2025-02-10 18:29:03.00 -0500","app_version":"1.0","slice_uuid":"fc98d4e6-3a45-3457-b446-288c330a837b","build_version":"1","platform":2,"bundleID":"com.apple.aiml.mlpt.FedStats.MLHostPlugin","share_with_app_devs":0,"is_first_party":1,"bug_type":"309","os_version":"iPhone OS 18.2 (22C152)","roots_installed":0,"name":"FedStatsMLHostPlugin","incident_id":"CD543212-9016-40A1-B4E9-EE86DAF666E3"}

{

"uptime" : 170000,

"procRole" : "Unspecified",

"version" : 2,

"userID" : 501,

"deployVersion" : 210,

"modelCode" : "iPhone16,2",

"coalitionID" : 2129,

"osVersion" : {

"isEmbedded" : true,

"train" : "iPhone OS 18.2",

"releaseType" : "User",

"build" : "22C152"

},

"captureTime" : "2025-02-10 18:29:02.8193 -0500",

"codeSigningMonitor" : 2,

"incident" : "CD543212-9016-40A1-B4E9-EE86DAF666E3",

"pid" : 5460,

"translated" : false,

"cpuType" : "ARM-64",

"roots_installed" : 0,

"bug_type" : "309",

"procLaunch" : "2025-02-10 18:29:00.6719 -0500",

"procStartAbsTime" : 4260999060237,

"procExitAbsTime" : 4261050363134,

"procName" : "FedStatsMLHostPlugin",

"procPath" : "\/System\/Library\/ExtensionKit\/Extensions\/FedStatsMLHostPlugin.appex\/FedStatsMLHostPlugin",

"bundleInfo" : {"CFBundleShortVersionString":"1.0","CFBundleVersion":"1","CFBundleIdentifier":"com.apple.aiml.mlpt.FedStats.MLHostPlugin"},

"parentProc" : "launchd",

"parentPid" : 1,

"coalitionName" : "com.apple.aiml.mlpt.FedStats.MLHostPlugin",

"crashReporterKey" : "299b619cacfa05aab54f3cd61a9182ba481e5240",

"appleIntelligenceStatus" : {"reasons":["assetIsNotReady","notOptedIn"],"state":"unavailable"},

"wasUnlockedSinceBoot" : 1,


logWritingSignature" : "fdb0ab253ea4191d315695faf9e2243130d13564",

"trialInfo" : {

"rollouts" : [

{

"rolloutId" : "6434420a89ec2e0a7a38bf5a",

"factorPackIds" : {


},

"deploymentId" : 240000011

},

{

"rolloutId" : "65a8173205d942272410674b",

"factorPackIds" : {

"SIRI_HOME_AUTOMATION_SERVER_FLOW_DEPRECATION" : "65d39fa4cb0e2417d11ce5f6"

},

"deploymentId" : 240000001

}

],

"experiments" : [

{

"treatmentId" : "4ca117bb-5bf4-4aca-8bd2-aaddc9a7bcda",

"experimentId" : "66d9e11556f9247c8bf41f49",

"deploymentId" : 400000003



[Edited by Moderator]


iPhone 15 Pro Max, iOS 18

Posted on Feb 13, 2025 1:33 PM

Reply
Question marked as Top-ranking reply

Posted on Mar 24, 2025 9:39 AM

If fear of hacking is an overriding concern in your daily activities, and if your adversaries are immensely well funded, then your sole available option is isolating snd potentially removing all such complex devices from your usage. That might mean switching to a feature phone, or removing the phone and other complex devices entirely.


And to be very clear, an iPhone can be hacked, you can be an immensely valuable target, and nobody here can assist with the security practices and considerations necessary for your particular case, or the forensics involved. That is all quite rare, targeted, and involves immensely expensive tooling.


Worse for your concerns here, detecting mercenary tooling and related activities can be immensely difficult. And proving that an iPhone or any other sufficiently-complex device is not hacked is somewhere between difficult and impossible. And expensive.


Reading telemetry looking for evidence of compromise without some idea of what you’re looking for is also somewhere between difficult, and futile. Particularly given various recent mercenary tooling intentionally deletes logs containing details the malware seeks to mask, meaning there can be nothing to look for, other than looking for nothing.


Mercenary tooling is rare and targeted, based in available reports.


Spyware and stalker ware that involve installing apps onto your iPhone or iPad, or of adversaries accessing unprotected local or iCloud backups are unfortunately more common. And stalking, GPS-based cellular tracking, gaslighting, fraud, abuse, and other activities can be ongoing, and are routinely entirely unrelated to an iPhone. So too can be issues entirely unrelated to IT and device security, such as those that can be related to or caused by medical conditions, for instance. Diagnosing those issues is outside the bailiwick of anybody around here.


As for the telemetry shown here, collecting federated statistics from machine learning activities is a normal and benign part of iPhone activities.


Similar questions

22 replies

May 1, 2025 5:56 AM in response to heghgf

heghgf wrote:

Okaypinnochio, your post was very well worded and on point. EVERY time one of us non-programmer type people comes here and expresses concern about our phones being compromised/duplicated/hacked/etc/etc, a slew of programmer types immediately respond by stating emphatically that our phone has not & could not be comp/dup/hack/etc.


Of course devices can be hacked. Older devices iPhone X and earlier have known exploits; A7 through A11 processors, for one of the more common.


Now we have a two paths of discussion.


Is any particular iPhone remotely hacked? Possible, but probably not. That’s not applicable here, either.


Is an older iPhone subject to local attacks? Yes.


If you are a target of either these, can anybody here help with that? Nope.


I know for a fact my iphone was snatched and a dupe program was installed on it, then 48 hours later my 'missing' phone re-appeared on my bed pillow. Yeah, I looked there for it. Right after i found my phone, I was driving and a text popped into my phone that wascwritten to the person that had snatched, duped and then returned my phone. The kid who sent the msg did not know tgis snatchduper and had no idea his text would be received by me also.
How do i delete this malware off of my phone?
thanks


Given your private space is somehow not private and your gear insecure, given your passcode is known, and your Apple Account is known, and given persistence is trivial with cameras and microphones and more “black bag” operations, you will want to focus on attempts to secure your space and your gear here. This might be locked boxes, adding your own cameras or alarms from simple to advanced, or otherwise.


You’ll want to discuss this with police if that’s an option, and steps to secure your devices while asleep or not under your control, newer devices or simpler devices, switch to eSIM, and to collect evidence of the access i to your private spaces and equipment. And resolve the complete credentials compromise.


None of which is going to happen around here.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

My iPhone has been hacked

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.