Teener17 wrote:
I guess I replied at 9:09am when it’s 12:10 . I’m new to iPhone so I am still learning but it’s hard to figure out at first. Not exactly the most technically inclined. Thank you for your response and not being rude.
If you’ve not already seen this Apple doc, here is the iPhone user guide: iPhone User Guide - Apple Support.
Asking “hey, why is [whatever detail you don’t understand]?” or ”where can I get info about [whatever]?” can work quite well. Starting with a conclusion — “hacked”, in this case — can sometimes delay getting answers, or can sometimes take discussions in unexpected directions.
Malware does exist for iPhone yes, but it’s been exceedingly expensive and targeted*, based on available reports. Most security compromises are due to password exposure and password re-use, due to phishing and related scams, and these password exposures then too often combined with Apple Accounts not having the last-chance two-factor authentication defense enabled.
Scams are very common. Scams are far more common than actually-hacked iPhones. Scams including fake claims of payments to Apple or other entities and other fake bills, the ever-popular fake “(3) viruses found!” fake virus scans, electronic toll scams, and the on-going “pervert” creative-writing scams, among many others. Here are a very few examples:
Recognize and avoid social engineering schemes including phishing messages, phony support calls, and other scams - Apple Support
As mentioned above, iPhone telemetry and related logs are just filled with ominous and scarily-worded and utterly benign diagnostics data, too. Malware goes out of its way to try to avoid leaving any traces in logs, too. That can include deleting the logs, which means you’re actually looking for, well, nothing in the log. But again, this stuff is rare, expensive, and targeted.
*If you’re an investigative journalist, political dissident, senior in government or private entities, with access to sensitive or classified data, active in military or defense or intelligence organizations, with access to great wealth, or have peeved a seriously wealth adversary (with budgets of many millions and billions of dollars), you can be targeted. The rest of us, not so much.