Tell me that I haven’t been Hacked

Just curious what you all make of this…


{"id":322161,"name":"JavaScriptCore libpas scavenger","threadState":{"x":[{"value":260},{"value":0},{"value":390144},{"value":0},{"value":0},{"value":160},{"value":0},{"value":4999104},{"value":6105394840},{"value":0},{"value":0},{"value":2},{"value":2},{"value":0},{"value":0},{"value":0},{"value":305},{"value":8455601360},{"value":0},{"value":4664551488},{"value":4664551552},{"value":6105395424},{"value":4999104},{"value":0},{"value":390144},{"value":391169},{"value":391424},{"value":6105395424},{"value":8308150272,"symbolLocation":1096,"symbol":"_MergedGlobals"}],"flavor":"ARM_THREAD_STATE64","lr":{"value":8883572632},"cpsr":{"value":1610616832},"fp":{"value":6105394960},"sp":{"value":6105394816},"esr":{"value":1442840704,"description":" Address size fault"},"pc":{"value":7920590992},"far":{"value":0}},"frames":[{"imageOffset":28816,"symbol":"__psynch_cvwait","symbolLocation":8,"imageIndex":43},{"imageOffset":16280,"symbol":"_pthread_cond_wait","symbolLocation":1204,"imageIndex":44},{"imageOffset":1033760,"symbol":"scavenger_thread_main","symbolLocation":1328,"imageIndex":54},{"imageOffset":6096,"symbol":"_pthread_start","symbolLocation":136,"imageIndex":44},{"imageOffset":5248,"symbol":"thread_start","symbolLocation":8,"imageIndex":44}]}],


  "usedImages" : [


  {


    "source" : "P",


    "arch" : "arm64",


    "base" : 4363190272,


    "size" : 1081344,


    "uuid" : "0b819e07-9a5b-3ce4-b8bc-062d51634495",


    "path" : "\/private\/var\/containers\/Bundle\/Application\/6359660A-DBBE-434F-A9BF-C34D2A0C4187\/Runner.app\/Runner",


    "name" : "Runner"


  },


  {


    "source" : "P",


    "arch" : "arm64",


    "base" : 4364746752,


    "size" : 65536,


    "uuid" : "96d1c95e-3baf-39cb-aef6-f89815d5a57f",


    "path" : "\/private\/var\/containers\/Bundle\/Application\/6359660A-DBBE-434F-A9BF-C34D2A0C4187\/Runner.app\/Frameworks\/FBLPromises.framework\/FBLPromises",


    "name" : "FBLPromises"


iPhone 14, iOS 18

Posted on Apr 25, 2025 12:55 PM

Reply
Question marked as Top-ranking reply

Posted on Apr 25, 2025 1:13 PM

Enlighten us…

Similar questions

46 replies

Apr 25, 2025 3:34 PM in response to IdrisSeabright

I had written a lengthy post which I discussed at length with a Mr. Hoffman a few weeks ago that described the symptoms of what I’m experiencing. For some reason in the last 30 mins or so it is no longer in my subscriptions so I apologize for the shortness… it feels as if I’m either being remotely accessed or emulated if you will. This has been happening since mid February on both android and Apple platforms. The party responsible is clearly someone who has a high level of knowledge in both operating systems, and is not in a rush to get rich. This is someone who is scamming for a living and understands small moves over time generate the types of responses garnered. No one would doubt me if I came in with an accounting from the FDIC of my reimbursements and a cyber expert report. I’m not a victim and I’ve already secured my assets as well as they are going to be secured. What I am after is knowledge, i couldn’t care less about being “validated” by the Apple communities. If it’s something else I’m fine with that, but educate me and tell me what it is. Don’t tell me it’s not possible because it is until proven otherwise. And yes, that goes both ways I understand that…

Apr 27, 2025 7:54 AM in response to hackerkiller

hackerkiller wrote:

It’s possible it’s just what Jeff said it was. I’m open to other possibilities when other possibilities are proffered. You didn’t care to elaborate or didn’t know what to add of value. Surely that jar has some cookies in it, and I’m more than open to hearing other possibilities if you have something to offer.


I don't believe you're open to hearing anything at all. At this point,


Why? Because you haven't bothered to describe a technical problem or issue at all. All you've done is post meaningless analytics and complain that you're being told you have not been hacked, demanding evidence or documentation that proves that. We can't prove a negative. You have provided NO evidence at all that you were hacked or compromised in any way. Until you have something concrete, please just stop. This is going nowhere.



[Edited by Moderator]

Apr 26, 2025 6:33 PM in response to MrHoffman

Thanks for the reply Mr. H. I disagree with your assessment of the cost to gain access to someone’s device, most illegal hacking originates in areas that are not nearly as capable of sustaining such a treasury, usually by actors not that influential. That said, if it’s your day job and you’re robbing from Peter to pay Paul so to speak, I guess the cost is a moot point. The post was simply an example that there is non cost, readily available tools and information available right from the device.


Thanks for providing the additional information I’ll read up on the 2 links provided. This is the type of info I’m looking for, not necessarily to tell me how to fix, but to better understand what is happening, how it got there etc., without paying if possible. It’s interesting to me and not an area I’m super knowledgeable on.


2 questions if you’ll indulge me-

  1. Is it out of the realm of possibility that the Seashell or any shell program for that matter could be modified for use on the current iteration of os?
  2. Would it work if it gained access to your local network and then infiltrated the specific device from there?

Thanks

Apr 26, 2025 7:32 PM in response to hackerkiller

1: That source code can be re-used and adapted, is neither new nor noteworthy. That is the foundation of GitHub, among other services. Specific exploits can sometimes be re-used and adapted, but usually not. The rest of the code involved, and as was previously commented, can be generic communications and post-exploitation frameworks.


2: Your own previous reports here have indicated Android was originally involved, and not Apple platforms, so clearly you have some experience and an example of your second question; of pivoting to different targets.


Again, you believe yourself subject to immensely valuable exploit tooling, have already taken steps to reset and recover and harden your environment and settings, have had these issues persist for quite some time, and are still reporting security issues. That’s the sort of situation that is not going to get solved around a discussion forum.

Apr 26, 2025 7:26 PM in response to hackerkiller

hackerkiller wrote:

Is it out of the realm of possibility that the Seashell or any shell program for that matter could be modified for use on the current iteration of os?


Every software system of non-trivial size contains bugs. Some of those may be bugs that an attacking program could exploit. Even extraordinary attempts to rigorously prove that software is correct – attempts that might be justified for, say, spaceflight control software, weapons control software, or software for medical devices – may miss things.


That doesn't mean that all bugs are known and that every script kiddie who wants to break into your system can just go to some Dark Web site and download a tool to hack a phone or computer running the latest OS.


You appear to be going to great lengths to set up a scenario where if there is some theoretical possibility that a bug which opens a small security hole exists, that "proves" that someone has hacked your equipment. There is the theoretical possibility that big asteroids will strike the Earth, causing nuclear- or even extinction-level events, and even some evidence that it has happened once or twice. But that's far from "proof" that the events happen every year.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Tell me that I haven’t been Hacked

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.