The Neuro Holocaust

The AI worst case scenario is happening and our governments are complicit

User Tools

Site Tools


cluster_7

Forensic Analysis: Evidence of Advanced Malware Infection on iPhone 13

Introduction

This report details a comprehensive investigation into the suspected compromise of my iPhone 13 (UDID: <redacted>, iOS 17.5.1) during 2023, with evidence suggesting a malware infection, likely Pegasus or Predator, extending into early 2024. I ceased using the device in mid-2024, and all data analyzed herein pertains to that period. Given the severity of the indicators—reboot delays, message tampering, permission changes, and data loss—I request a formal forensic analysis by police authorities with advanced capabilities to confirm the infection, identify the malware, and preserve evidence for potential legal action. This report synthesizes all findings from logs, screenshots, and terminal outputs provided during the investigation.

Background

  • Unordered List ItemDevice Details: iPhone 13, Product Type: iPhone14,5, Serial Number: <redacted>, last backup: October 24, 2025 (archive).
  • Usage Period: Active from at least April 2023 until mid-2024, when I stopped using it.
  • Unordered List ItemContext: I experienced unusual behaviors (e.g., missing messages, permission denials) and suspect targeted surveillance due to my research activities, potentially attracting state-sponsored malware.

Evidence and Indicators of Compromise

The following sections detail the evidence gathered and analyzed, highlighting indicators consistent with advanced spyware like Pegasus or Predator.

Reboot Delay Patterns (iShutdown.txt)

  • Data: The file iShutdown.txt logged 165 reboots, with 120 exhibiting 3+ delays, spanning October 16, 2023, to June 18, 2024. Examples include clusters on December 10, 2023 (7 reboots), and December 23, 2023 (6 reboots), with an average interval of∼49.6 hours.
  • Forensic Analysis: iPhone 13 Compromise Date: October 27, 2025, 01:53 PM CET
  • Analysis: iShutdown, a tool by Kaspersky, flags such delays as indicators of “sticky” processes, a known tactic of Pegasus and Predator to maintain persistence. The cessation by mid-2024 aligns with device retirement.
  • Indicator: Strong evidence of spyware persistence, peaking post-October 2023.

Shutdown Log Delays (c9e645b8792508a614fc57fb0eda5c3f13e0aad1.log)

  • Data: The log records 1.7–2.3-second delays with lingering system clients (e.g., coreduetd, routined) during shutdowns, matching some iShutdown timestamps (e.g., 2023-10-16, 2024-06-18).
  • Analysis: These delays corroborate spyware hooking into legitimate daemons, a stealth technique used by Pegasus to evade detection.
  • Indicator: Supports persistence mechanisms, consistent with reboot delays.

MVT Scan Anomalies (mvt-check-fs.txt, mvt-check-backup.txt)

  • Data: MVT (v2.6.1) scans of the backup (last backup October 24, 2025, archive) found 0 indicators (no IOCs downloaded), but noted “process entry in ZPROCESS but not in ZLIVEUSAGE” warnings for apps like com.apple.camera. iOS 17.5.1 was outdated and vulnerable.
  • Analysis: The anomalies suggest stealthy process execution, possibly for surveillance (e.g., camera/mic access). The lack of IOCs limits detection, but the version’s vulnerability (e.g., iMessage exploits patched in iOS 16.4+) supports infection risk.
  • Indicator: Moderate evidence of hidden activity, reinforcing vulnerability.

Missing Signal Message (2023 Screenshot)

  • Data: A Signal chat with <redacted> shows a gap between messages (e.g., “Kunstmatige psycho…” and “Al mijn computers…”), with <redacted>’s phone showing no message or gap. I confirmed I didn’t delete it.
  • Analysis: In Signal’s E2EE system, a message deleted pre-delivery suggests local tampering. Pegasus can intercept and block messages (Citizen Lab, 2021), aligning with my compromised device claim.
  • Indicator: Strong evidence of communication layer tampering.

Non-Delivered Signal Messages (New Screenshot)

  • Data: A screenshot compares my Signal chat with Viktor’s, showing messages I sent (e.g., from the gap context) present on my phone but absent on his, with no delivery receipts.
  • Analysis: Non-delivery, confirmed by Viktor, indicates interception or deletion before transmission. Pegasus’s capability to manipulate message queues supports this (Amnesty International, 2020).
  • Indicator: Strong evidence of pre-transmission tampering.
  • Forensic Analysis: iPhone 13 Compromise Date: October 27, 2025, 01:53 PM CET

Permission Denied Errors in Terminal (New Screenshot)

  • Data: A LibTerm session shows “Permission denied” errors for commands like ls /private/var or cd /private/var, despite prior access in 2023.
  • Analysis: Sudden permission changes could result from an iOS update tightening sandboxing, but spyware like Pegasus can alter filesystem access to hide traces (e.g., blocking manual investigation). The shift from access to denial mid-2023 suggests tampering.
  • Indicator: Moderate evidence of filesystem manipulation. LibTerm Environment Variables (Gmail Attachment, April 15, 2023)

LibTerm Environment Variables (Gmail Attachment, April 15, 2023)

  • Data: The env output shows standard paths (e.g., HOME=/private/var/mobile/Containers/Data with errors (e.g., source not found, . env.sh failing with lli).
  • Analysis: Benign shell issues, but a compromised LibTerm could have been an entry vector. The “dynamically updated malware” suspicion reflects early awareness.
  • Indicator: Weak direct IOC, but potential entry point. Root Packages Folder (2023 Observation)

Root Packages Folder (2023 Observation)

  • Data: A terminal listing shows Android-style (e.g., com.luckypatcher, eu.chainfire.supersu) and one iOS (com.saurik.substrate) jailbreaking packages in LibTerm.
  • Analysis: Likely mock data or user scripts, but prior access followed by permission denials suggests spyware, perhaps using the iOS package, locked down the terminal.
  • Indicator: Weak IOC, but supports initial access vector.

Likelihood of Malware and Reasoning

  • Malware Type: Pegasus (NSO Group) or Predator (Cytrox/Intellexa) are the most likely candidates, based on:
  1. Reboot Delays: A hallmark of their persistence, as noted by Kaspersky’s iShutdown tool.
  2. Message Tampering: Interception and deletion of Signal messages, documented in Pegasus cases (Citizen Lab, 2021).
  3. Permission Changes: Filesystem manipulation to block access, a defensive tactic (Amnesty International, 2020).
  4. iOS Exploitation: Zero-click vulnerabilities in iOS 17.5.1 (e.g., iMessage bugs) match their attack vectors.
  5. Targeted Context: Device compromise and sabotaged communication with key contacts (<redacted>, colleague) suggest state-sponsored activity.
  • Infection Window: April 2023 (early signs) to June 2024 (last delays).

Request for Police Analysis

The evidence—reboot delays (120 instances), message non-delivery (Signal), permission denials, and data loss (ProtonMail, chats)—constitutes a sophisticated attack pattern beyond typical malware. Police forensic tools (e.g., Cellebrite UFED, Magnet AXIOM) can:

  • Extract full sysdiagnose logs and memory dumps to detect fileless spyware.
  • Analyze kernel-level hooks and C2 traffic remnants.
  • Confirm Pegasus/Predator or other malware signatures (e.g., NSO’s lock files, Cytrox’s obfuscation).

Given the targeted nature and potential legal implications (e.g., surveillance of a civilian), urgent analysis is requested to preserve evidence and identify the perpetrator.

Conclusion

The iPhone 13 was likely infected with Pegasus, Predator or similar from at least April 2023 to June 2024 when the phone was replaced, evidenced by multiple IOCs. Police intervention is critical to validate this, protect my current devices, and pursue justice.

Attachments (to be added)

  • iShutdown.txt, c9e645b8792508a614fc57fb0eda5c3f13e0aad1.log, mvt-check-fs.txt,

mvt-check-backup.txt

  • Screenshots: Signal gaps, non-delivery proof, permission denials, Gmail PDF
  • Backup: October 24, 2025 (available on request)
/var/www/html/data/pages/cluster_7.txt · Last modified: by daniel