My iPhone has been hacked

Crash report from my analytics data

any help?

had this issue for 2months now.

its some using an apple developer account with the email ha********y34@icloud.com


app_name":"FedStatsMLHostPlugin","timestamp":"2025-02-10 18:29:03.00 -0500","app_version":"1.0","slice_uuid":"fc98d4e6-3a45-3457-b446-288c330a837b","build_version":"1","platform":2,"bundleID":"com.apple.aiml.mlpt.FedStats.MLHostPlugin","share_with_app_devs":0,"is_first_party":1,"bug_type":"309","os_version":"iPhone OS 18.2 (22C152)","roots_installed":0,"name":"FedStatsMLHostPlugin","incident_id":"CD543212-9016-40A1-B4E9-EE86DAF666E3"}

{

"uptime" : 170000,

"procRole" : "Unspecified",

"version" : 2,

"userID" : 501,

"deployVersion" : 210,

"modelCode" : "iPhone16,2",

"coalitionID" : 2129,

"osVersion" : {

"isEmbedded" : true,

"train" : "iPhone OS 18.2",

"releaseType" : "User",

"build" : "22C152"

},

"captureTime" : "2025-02-10 18:29:02.8193 -0500",

"codeSigningMonitor" : 2,

"incident" : "CD543212-9016-40A1-B4E9-EE86DAF666E3",

"pid" : 5460,

"translated" : false,

"cpuType" : "ARM-64",

"roots_installed" : 0,

"bug_type" : "309",

"procLaunch" : "2025-02-10 18:29:00.6719 -0500",

"procStartAbsTime" : 4260999060237,

"procExitAbsTime" : 4261050363134,

"procName" : "FedStatsMLHostPlugin",

"procPath" : "\/System\/Library\/ExtensionKit\/Extensions\/FedStatsMLHostPlugin.appex\/FedStatsMLHostPlugin",

"bundleInfo" : {"CFBundleShortVersionString":"1.0","CFBundleVersion":"1","CFBundleIdentifier":"com.apple.aiml.mlpt.FedStats.MLHostPlugin"},

"parentProc" : "launchd",

"parentPid" : 1,

"coalitionName" : "com.apple.aiml.mlpt.FedStats.MLHostPlugin",

"crashReporterKey" : "299b619cacfa05aab54f3cd61a9182ba481e5240",

"appleIntelligenceStatus" : {"reasons":["assetIsNotReady","notOptedIn"],"state":"unavailable"},

"wasUnlockedSinceBoot" : 1,


logWritingSignature" : "fdb0ab253ea4191d315695faf9e2243130d13564",

"trialInfo" : {

"rollouts" : [

{

"rolloutId" : "6434420a89ec2e0a7a38bf5a",

"factorPackIds" : {


},

"deploymentId" : 240000011

},

{

"rolloutId" : "65a8173205d942272410674b",

"factorPackIds" : {

"SIRI_HOME_AUTOMATION_SERVER_FLOW_DEPRECATION" : "65d39fa4cb0e2417d11ce5f6"

},

"deploymentId" : 240000001

}

],

"experiments" : [

{

"treatmentId" : "4ca117bb-5bf4-4aca-8bd2-aaddc9a7bcda",

"experimentId" : "66d9e11556f9247c8bf41f49",

"deploymentId" : 400000003



[Edited by Moderator]


iPhone 15 Pro Max, iOS 18

Posted on Feb 13, 2025 1:33 PM

Reply
Question marked as Top-ranking reply

Posted on Mar 24, 2025 9:39 AM

If fear of hacking is an overriding concern in your daily activities, and if your adversaries are immensely well funded, then your sole available option is isolating snd potentially removing all such complex devices from your usage. That might mean switching to a feature phone, or removing the phone and other complex devices entirely.


And to be very clear, an iPhone can be hacked, you can be an immensely valuable target, and nobody here can assist with the security practices and considerations necessary for your particular case, or the forensics involved. That is all quite rare, targeted, and involves immensely expensive tooling.


Worse for your concerns here, detecting mercenary tooling and related activities can be immensely difficult. And proving that an iPhone or any other sufficiently-complex device is not hacked is somewhere between difficult and impossible. And expensive.


Reading telemetry looking for evidence of compromise without some idea of what you’re looking for is also somewhere between difficult, and futile. Particularly given various recent mercenary tooling intentionally deletes logs containing details the malware seeks to mask, meaning there can be nothing to look for, other than looking for nothing.


Mercenary tooling is rare and targeted, based in available reports.


Spyware and stalker ware that involve installing apps onto your iPhone or iPad, or of adversaries accessing unprotected local or iCloud backups are unfortunately more common. And stalking, GPS-based cellular tracking, gaslighting, fraud, abuse, and other activities can be ongoing, and are routinely entirely unrelated to an iPhone. So too can be issues entirely unrelated to IT and device security, such as those that can be related to or caused by medical conditions, for instance. Diagnosing those issues is outside the bailiwick of anybody around here.


As for the telemetry shown here, collecting federated statistics from machine learning activities is a normal and benign part of iPhone activities.


Similar questions

22 replies
Question marked as Top-ranking reply

Mar 24, 2025 9:39 AM in response to Lena1_

If fear of hacking is an overriding concern in your daily activities, and if your adversaries are immensely well funded, then your sole available option is isolating snd potentially removing all such complex devices from your usage. That might mean switching to a feature phone, or removing the phone and other complex devices entirely.


And to be very clear, an iPhone can be hacked, you can be an immensely valuable target, and nobody here can assist with the security practices and considerations necessary for your particular case, or the forensics involved. That is all quite rare, targeted, and involves immensely expensive tooling.


Worse for your concerns here, detecting mercenary tooling and related activities can be immensely difficult. And proving that an iPhone or any other sufficiently-complex device is not hacked is somewhere between difficult and impossible. And expensive.


Reading telemetry looking for evidence of compromise without some idea of what you’re looking for is also somewhere between difficult, and futile. Particularly given various recent mercenary tooling intentionally deletes logs containing details the malware seeks to mask, meaning there can be nothing to look for, other than looking for nothing.


Mercenary tooling is rare and targeted, based in available reports.


Spyware and stalker ware that involve installing apps onto your iPhone or iPad, or of adversaries accessing unprotected local or iCloud backups are unfortunately more common. And stalking, GPS-based cellular tracking, gaslighting, fraud, abuse, and other activities can be ongoing, and are routinely entirely unrelated to an iPhone. So too can be issues entirely unrelated to IT and device security, such as those that can be related to or caused by medical conditions, for instance. Diagnosing those issues is outside the bailiwick of anybody around here.


As for the telemetry shown here, collecting federated statistics from machine learning activities is a normal and benign part of iPhone activities.


Apr 23, 2025 10:35 AM in response to Okaypinnochio

Okaypinnochio wrote:

The problem is that you have not provided anything such a screenshot showing a problem. Generalities of concerns such as data theft, manipulations of settings, and access to your microphone/camera without knowing what you are seeing are simply what users see and spread on Social Media for the alternative motive of upvotes and shares. Data theft can happen from phishing messages, manipulation of settings can be seen on a shared Apple Account and Microphone/Camera usage is granted by the user for an app and can also be revoked.


This is also seen many times in a post such as this with the analytic log posted by the OP. They see the word "Fed", "Root", or "Deployment" and jump to the conclusion that their security has been compromised. All things seen there are normal even though many people will insist that they should be concerned. That is where the paranoia may be referenced and in those cases, many times it is impossible to prove to them that none of that should be of concern.

Feb 13, 2025 1:54 PM in response to vCardinformation

vCardinformation wrote:

I explained everything to some at apple support and he told me it is hacked but it’s nothing they can do. It’s not “hacked” but someone is using an Apple developer account to monitor/mirror my phone. Track my location.

Either the person you spoke to didn't know what they were talking about, or just wanted you to go away, or you were not actually speaking to someone at Apple support.


It's more likely you were scammed.

Mar 24, 2025 9:14 AM in response to Lena1_

If you really want to not have this issue then dump your iPhone and anything android based is in the same boat.

your choices are plain old regular flip phone with like no Internet no GPS or a real encrypted phone which you’re gonna spend as about as much as a iPhone current model that’s brand new but you can’t buy them on payment you pay for the whole thing out right and they run on proprietary operating systems. Do your due diligence and do some research. There’s about five or six good ones out there. Too bad blackberries no more but there’s still some of those out there that are quite good and encrypted with no GPS either.

Apr 23, 2025 10:14 AM in response to KiltedTim

Privacy Concerns & Repeated Device Compromises — Need Real Help, Not Dismissal


I’m reaching out here because I - and many others—have experienced ongoing, deeply disturbing issues with our devices and privacy. Over the years, I’ve watched new-in-box devices become unstable, slow, or unusable shortly after setup—often following a Wi-Fi login or iCloud sync.




We’re told to trust in the security of these systems, but many of us are facing coordinated, targeted intrusions. Not everyone dealing with this is a public figure or government employee—many are just regular people dealing with malicious actors who are persistent, tech-savvy, and dangerous.

We need this community to stop dismissing these reports as paranoia or “user error.” The reality is: not everyone uses the term “hacked” in the technical sense. We’re describing what we’re seeing and experiencing—because we don’t always know the right jargon. But we do know when something’s wrong.

These intrusions go beyond glitches. They involve data theft, tracking, manipulation of settings, and access to microphones, cameras, and private content. Some of us are living under the threat of real-world abuse or harassment and are trying to use forums like this to find real-world solutions.

Please stop defaulting to “it’s impossible” or “you’re imagining things.” That mindset is dangerous. What we need is guidance on how to verify, trace, and defend ourselves when we believe our systems are compromised.


If you’ve gone through this and found solutions—or if you’re a knowledgeable user who can guide us toward real evidence collection, system hardening, or effective tools—your input would mean everything.

Thanks in advance to those who actually listen and take this seriously.

Apr 26, 2025 9:39 AM in response to kb1951

This is incorrect. There are Many IOS exploit kits out there which have ability to gain admin privs, and move any banking, crypto apps off your phone, and much more.. please explore the CVE reports, and Cyberthreat blogs.


Apple work hard to update the IOS security - this is why we must always update new IOS issues.. those security patches dont come from thin air, but are Apple security patching found, bug bounties, and discovered exploits.

Apr 30, 2025 10:28 PM in response to Okaypinnochio

Okaypinnochio, your post was very well worded and on point. EVERY time one of us non-programmer type people comes here and expresses concern about our phones being compromised/duplicated/hacked/etc/etc, a slew of programmer types immediately respond by stating emphatically that our phone has not & could not be comp/dup/hack/etc. I know for a fact my iphone was snatched and a dupe program was installed on it, then 48 hours later my 'missing' phone re-appeared on my bed pillow. Yeah, I looked there for it. Right after i found my phone, I was driving and a text popped into my phone that wascwritten to the person that had snatched, duped and then returned my phone. The kid who sent the msg did not know tgis snatchduper and had no idea his text would be received by me also.

How do i delete this malware off of my phone?

thanks


This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

My iPhone has been hacked

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.