How can I tell if my iPhone 11 is hacked?

My iPhone 11 is doing things that don’t seem right and I have noticed that certain items are either changing without me doing anything and it happens within minutes/ seconds, i don’t even have certain things in my settings lie my access isn’t even an option. I looked through some of my analytics and have seen iPhone 12 multiple times and I use the WiFi of someone who owns the same type of device. Have had conversations with this person about my phone being spied on or remotely controlled and am told I’m crazy, delusional, it doesn’t happen and it’s been happening to me for years that my devices are compromised. I don’t know what to do and I want to have my phone analyzed but there seems like no one does that where I live. Please give me any advice


[Re-Titled by Moderator]

iPhone 11, iOS 18

Posted on Apr 7, 2025 8:48 AM

Reply
Question marked as ⚠️ Top-ranking reply

Posted on Apr 7, 2025 9:38 AM

Teener17 wrote:

I guess I replied at 9:09am when it’s 12:10 . I’m new to iPhone so I am still learning but it’s hard to figure out at first. Not exactly the most technically inclined. Thank you for your response and not being rude.


If you’ve not already seen this Apple doc, here is the iPhone user guide: iPhone User Guide - Apple Support.


Asking “hey, why is [whatever detail you don’t understand]?” or ”where can I get info about [whatever]?” can work quite well. Starting with a conclusion — “hacked”, in this case — can sometimes delay getting answers, or can sometimes take discussions in unexpected directions.


Malware does exist for iPhone yes, but it’s been exceedingly expensive and targeted*, based on available reports. Most security compromises are due to password exposure and password re-use, due to phishing and related scams, and these password exposures then too often combined with Apple Accounts not having the last-chance two-factor authentication defense enabled.


Scams are very common. Scams are far more common than actually-hacked iPhones. Scams including fake claims of payments to Apple or other entities and other fake bills, the ever-popular fake “(3) viruses found!” fake virus scans, electronic toll scams, and the on-going “pervert” creative-writing scams, among many others. Here are a very few examples:


Recognize and avoid social engineering schemes including phishing messages, phony support calls, and other scams - Apple Support


As mentioned above, iPhone telemetry and related logs are just filled with ominous and scarily-worded and utterly benign diagnostics data, too. Malware goes out of its way to try to avoid leaving any traces in logs, too. That can include deleting the logs, which means you’re actually looking for, well, nothing in the log. But again, this stuff is rare, expensive, and targeted.



*If you’re an investigative journalist, political dissident, senior in government or private entities, with access to sensitive or classified data, active in military or defense or intelligence organizations, with access to great wealth, or have peeved a seriously wealth adversary (with budgets of many millions and billions of dollars), you can be targeted. The rest of us, not so much.


23 replies
Sort By: 

Apr 7, 2025 11:56 AM in response to MrHoffman

Oh, for sure, there are simpler, though still not easy ways to get into older devices. Direct access is always a good one where the person can then install jailbreak software.


Hadn't heard about the A11 exploit. But then, I don't have the time (or necessity) to dig that deep on such issues.


As always, your extra, and expert information is always worth the read.

Reply

Apr 7, 2025 11:57 AM in response to MrHoffman

I thank you for being respectful and more kind in the way you have given your feedback. Trust me I feel ridiculous enough and I’m embarrassed that I don’t know more and have left myself vulnerable in the past but I am trying to learn and be aware. It’s very different when someone you know has the right friends to do almost anything and I’m just saying in general. I didn’t know about websites that offer keys that can unlock any door and such. When someone is in love with power and control they go that extra mile. He has the computer and what u need to plug up a phone and check it but refuses. I think that is what you do anyway to find if the phones compromised. It would be nice if I had an Apple Store in my area. It’s hard to find places with people that have the patience to help and that’s unfortunate. In reality all I would need I hope (as long as it’s not some deeper issue. SIM card or whatever else can be done to invade privacy.) is to factory reset and properly protect my device and that’s a problem. I can’t use two factor authentication since my phone isn’t active so I’m looking into alternatives. I’m literally looking into taking some type of classes to understand this stuff. I’m 41 and totally lost with technology I have to do something about it. lol.

Reply

Apr 7, 2025 12:08 PM in response to Mac Jim ID

Thank you and yes I’m getting a lot of great information from everyone here and I appreciate it very much. It does make me feel much better understanding the difference as you explained very well as to gaining access to an account and not the actual device in itself. I thank you and if I do see something that will add to receiving more information that I can screenshot I definitely will.

Reply

Apr 7, 2025 12:15 PM in response to Kurt Lang

I know I went on and on I just needed to make sure I was understood as far as where my thinking was and everyone has been so helpful I was trying to hit the up arrow but it stopped me. I appreciate everyone’s honesty and expertise. Thank you again

Reply

Apr 12, 2025 2:54 AM in response to Teener17

So, I went through **** last year and just recent again with ALL my emails, two factor's , etc. changed and locked out of. I still had a working phone number appearing that way so I don't know how it was possible for passwords to be changed, two factor deleted, phone deleted, any associated email deleted and then Locked out of accounts because too many password changes and requires days to get it back while in the mean time, can't do anything on the phone, also means anything digital because everything requires sign in and verification.


This is long but my recent story that I thought someone hacked my phone too.... well what I think is they were able to get to my devices, all three apple phones, imac and MacBook, Dell and HP windows computers started with the Dell since its windows 10?? Or just the fact I used the same password a couple years ago for everything. Since changed due to last year lock out for almost a month and cause unlucky to have lock my phone in a Lyft in another state on way to airport!!!! Trying to port your number takes some time and having simple information as account number and making sure the sim isn't locked, no sim restrictions and if you can esim.


There isn't much you can really do except file police reports and notify ISP, Mobile provider, utilities, and more. I.E. Eventhough I had to wifi for two whole weeks, it said my usage was 500GB or 1 TB, but I brought it up and said they should look into it cause it caused them a customer cause I switched.


Amen

I've changed the lock to a electric combo lock.


[Edited by Moderator]

Reply

How can I tell if my iPhone 11 is hacked?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.