Tell me that I haven’t been Hacked

Just curious what you all make of this…


{"id":322161,"name":"JavaScriptCore libpas scavenger","threadState":{"x":[{"value":260},{"value":0},{"value":390144},{"value":0},{"value":0},{"value":160},{"value":0},{"value":4999104},{"value":6105394840},{"value":0},{"value":0},{"value":2},{"value":2},{"value":0},{"value":0},{"value":0},{"value":305},{"value":8455601360},{"value":0},{"value":4664551488},{"value":4664551552},{"value":6105395424},{"value":4999104},{"value":0},{"value":390144},{"value":391169},{"value":391424},{"value":6105395424},{"value":8308150272,"symbolLocation":1096,"symbol":"_MergedGlobals"}],"flavor":"ARM_THREAD_STATE64","lr":{"value":8883572632},"cpsr":{"value":1610616832},"fp":{"value":6105394960},"sp":{"value":6105394816},"esr":{"value":1442840704,"description":" Address size fault"},"pc":{"value":7920590992},"far":{"value":0}},"frames":[{"imageOffset":28816,"symbol":"__psynch_cvwait","symbolLocation":8,"imageIndex":43},{"imageOffset":16280,"symbol":"_pthread_cond_wait","symbolLocation":1204,"imageIndex":44},{"imageOffset":1033760,"symbol":"scavenger_thread_main","symbolLocation":1328,"imageIndex":54},{"imageOffset":6096,"symbol":"_pthread_start","symbolLocation":136,"imageIndex":44},{"imageOffset":5248,"symbol":"thread_start","symbolLocation":8,"imageIndex":44}]}],


  "usedImages" : [


  {


    "source" : "P",


    "arch" : "arm64",


    "base" : 4363190272,


    "size" : 1081344,


    "uuid" : "0b819e07-9a5b-3ce4-b8bc-062d51634495",


    "path" : "\/private\/var\/containers\/Bundle\/Application\/6359660A-DBBE-434F-A9BF-C34D2A0C4187\/Runner.app\/Runner",


    "name" : "Runner"


  },


  {


    "source" : "P",


    "arch" : "arm64",


    "base" : 4364746752,


    "size" : 65536,


    "uuid" : "96d1c95e-3baf-39cb-aef6-f89815d5a57f",


    "path" : "\/private\/var\/containers\/Bundle\/Application\/6359660A-DBBE-434F-A9BF-C34D2A0C4187\/Runner.app\/Frameworks\/FBLPromises.framework\/FBLPromises",


    "name" : "FBLPromises"


iPhone 14, iOS 18

Posted on Apr 25, 2025 12:55 PM

Reply
Question marked as Top-ranking reply

Posted on Apr 25, 2025 1:13 PM

Enlighten us…

Similar questions

46 replies

Apr 25, 2025 1:29 PM in response to hackerkiller

hackerkiller wrote:

My previous post has a bit more context to the background. Those of you that would fire off a quick “your phone isn’t hacked” never explain how you are so sure of that fact. Don’t be dismissive spread the absolute wealth of knowledge you possess. I’m claiming one thing, you’re claiming another. I’ve proffered evidence, why not counter with evidence to corroborate your opinion?


I’m sorry but you haven’t offered any evidence which support your claims of being hacked.


If you feel like someone needs to examine the analytics, take the device to an Apple Store where someone who knows what they’re doing can review them.

Apr 26, 2025 7:34 AM in response to hackerkiller

hackerkiller wrote:

Extremely complex and expensive. You should see the payroll for the personnel, it’s crazy…


When last i checked, a fully-remote no-interaction exploit with persistence was worth somewhere around one to two million dollars, maybe more. Highest valuation I’ve seen offered was USD$2.5 million.


Seashell was a 2022-era security issue (CVE-2022-26766) that was fixed in iOS and iPadOS 15.6 and later.


https://blog.entysec.com/posts/seashell-ios-malware/


Beyond the exploits, post-exploitation frameworks are an interesting side topic, whether discussing an exploited printer or PC or Mac or iPhone or Linux or otherwise. Most any of those will establish a network connection with a command and control server, and will preferably take steps to avoid detection. There’s a chunk specific to the target platform and the vulnerability (the JBIG2 weird machine was an amazing piece of work), some specific to avoiding detection or blocks, and the rest of these is fairly generic network communications code. But any of these tools need access into the device.


As for Seashell, that access was plugged at 15.6.


And I’m unclear why Seashell is relevant to your reported issues, given you’re undoubtedly not running a version vulnerable to that. And if you are a target for somebody with the inventory of exploits that are still effective, you[re well outside of what assistance can be offered by a forum; without direct device access, forensics access, and a discussion of your personal situation and risks and exposures and related details likely inappropriate for posting around here.

Apr 25, 2025 1:19 PM in response to hackerkiller

My previous post has a bit more context to the background. Those of you that would fire off a quick “your phone isn’t hacked” never explain how you are so sure of that fact. Don’t be dismissive spread the absolute wealth of knowledge you possess. I’m claiming one thing, you’re claiming another. I’ve proffered evidence, why not counter with evidence to corroborate your opinion?

Apr 25, 2025 1:41 PM in response to H1290

I have. Their advice was to seek law enforcement, which I have already done. My local LE’s self admittedly don’t have the capabilities to handle this according to them, and not sure if you’ve ever tried to contact the FBI, but short of camping in front of the JEH building in DC it’s rather daunting. I’m not trying to ruffle everyone’s feathers here, I’m trying to get someone on the development side to EXPLAIN why I’m not hacked or explain why I am and what realistic options I have to mitigate. To date not one person has been able to do so. Telling me that I’m not experiencing what I’m experiencing because I can’t read the information is not a satisfactory explanation.

Apr 25, 2025 2:00 PM in response to Jeff Donald

Thank you for your non dismissive response Sir. I don’t disagree with what you’re saying, this is actually what I was hoping for. Do you as a former store manager happen to know whether these particular programs or processes are genuine and supplied by Apple? That would be an excellent start to trying to figure it out. From the meager knowledge I have specifically about Apple it didn’t appear to me that they were native to the out of the box iPhone, hence the inquiry in this forum. Most programs malicious or not can be sourced on GitHub it seems; so it’s baffling to me that not one person can explain what exactly we are looking at here when I know that there is a wealth of knowledge in the community.

Apr 25, 2025 2:18 PM in response to lobsterghost1

Maybe I am, maybe I’m not? Just because the analytics are useless to you doesn’t make them useless as a whole. Why is it so difficult to pass on the conversation and keep it moving if this isn’t your area of expertise; if you’ve nothing meaningful to add? I like to solve my own problems, and hopefully learn something about the topic in the process. If I wanted to drop the device off and pay someone to figure it out for me then I would do so, but that’s not me. Why is that so troubling for you to digest? Clearly you have nothing to add to this particular thread so just help someone else and enjoy your weekend man. Too easy…

Apr 25, 2025 2:26 PM in response to hackerkiller

hackerkiller wrote:

Maybe I am, maybe I’m not? Just because the analytics are useless to you doesn’t make them useless as a whole. Why is it so difficult to pass on the conversation and keep it moving if this isn’t your area of expertise; if you’ve nothing meaningful to add? I like to solve my own problems, and hopefully learn something about the topic in the process. If I wanted to drop the device off and pay someone to figure it out for me then I would do so, but that’s not me. Why is that so troubling for you to digest? Clearly you have nothing to add to this particular thread so just help someone else and enjoy your weekend man. Too easy…

Because not ONE person here, NOT even a former Store Manager has the tools to read the Analytics, which is still the ONLY thing you've provided, which you claim as your proof of being hacked. We're now on the second page of this thread, yet you've provided nothing but useless analytics.

Apr 25, 2025 2:34 PM in response to Jeff Donald

Solidity or Ubuntu as well or am I mistaken? I believe the person/people are using the latter. And you are 100% correct about the context, what’s pasted is roughly the last 1/4 of the entire analytic file. I’ve a lot of intel but I’m just trying to squeeze in as much info as possible in as little space…Thanks for sharing your knowledge, I appreciate it!

Apr 25, 2025 2:39 PM in response to hackerkiller

Every member of the community has something to contribute. Just because you have an agenda that the poster doesn’t agree with doesn’t mean they have nothing to contribute. After all these are communities.


So, what is the agenda? If it’s just edification, spend some money and start taking computer science courses at a university. There are many online programs that offer degrees, if you’re not near a university.


If you’re looking for definitive proof of hacking, you’re barking up the wrong tree. Those that have the tools and knowledge to provide the answers you seek do not participate here. Apple is not in the business of checking devices for proof of hacking. You’re not going to find the experts you require here in the communities, at Apple Support or in Apple Retail Stores.


Best of luck with your mission.

Apr 25, 2025 3:06 PM in response to hackerkiller

hackerkiller wrote:

It’s possible it’s just what Jeff said it was. I’m open to other possibilities when other possibilities are proffered. You didn’t care to elaborate or didn’t know what to add of value. Surely that jar has some cookies in it, and I’m more than open to hearing other possibilities if you have something to offer.

We can't elaborate on anything until you tell us what's actually wrong. Put aside the analytics for now.


What is happening with your phone that has led you to believe you have been hacked? What are you seeing with your own eyes?

Apr 25, 2025 3:10 PM in response to Servant of Cats

Phones been in lockdown mode and it has been somewhat beneficial, along with screen time restrictions and blocking some websites. I’m clearly not as worried about the security as I am learning about what is happening and if possible, why. I feel no need to doxx myself to anyone here, as imho it shouldn’t matter who I am or what I’m worth. It should matter that I’m a customer and belong to the community. I’ll also say this for what it’s worth-a personal vendetta is often done out of spite, and to the detriment of the perpetrator; not necessarily for a particular gain other than seeing the victim be a victim. Not saying I’m sure this is the case, but it’s what it feels like. I appreciate the humor and the response…

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Tell me that I haven’t been Hacked

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.