
Open
Posted
•
Ends in 6 days
Paid on delivery
Both my Linux-based laptop and my iOS phone are showing clear signs of compromise—unexpected network activity, pop-ups I can’t trace, and login alerts from locations I’ve never visited. I’ve tried standard antivirus scans and OS updates, but the intrusions keep resurfacing, so I need a security specialist who can dive deeper. The work I’m asking for covers three phases: • Investigation & Evidence Capture – Conduct a remote forensic sweep of the Linux machine (terminal-level tools such as chkrootkit, rkhunter, Wireshark, auditd, etc.) and the iPhone (device logs, mobile forensics toolkit or config profiles). – Identify and document any malware, rootkits, rogue services, or suspicious network routes. • Removal & Recovery – Safely eliminate every confirmed threat without forcing a full wipe unless absolutely necessary. – Patch vulnerabilities, lock down SSH or other exposed services, and restore trusted system files. – Ensure the iPhone is clean, free of spy profiles or side-loaded configuration files, and fully updated. • Hardening & After-Care – Deliver a concise, plain-English report showing what was found, what was fixed, and how the compromise happened. – Provide a step-by-step hardening checklist (firewall rules, SELinux/AppArmor settings, 2FA recommendations, secure backup strategy, ongoing monitoring tools) to keep both devices safe. I can be available for live sessions via Zoom or any screen-sharing tool of your choice. If you have verifiable experience in incident response on Linux and iOS, plus a solid track record of helping individuals recover their devices, I’d like to start as soon as possible.
Project ID: 40190118
15 proposals
Open for bidding
Remote project
Active 39 secs ago
Set your budget and timeframe
Get paid for your work
Outline your proposal
It's free to sign up and bid on jobs
15 freelancers are bidding on average $1,158 USD for this job

Hello, I understand you're dealing with a suspected security breach on your Linux laptop and iPhone. I will conduct a remote forensic sweep for both devices, identify malware, rootkits, rogue services, or suspicious network routes, and capture evidence. On the Linux side I'll use chkrootkit, rkhunter, auditd, and Wireshark; on the iPhone I'll review device logs, profiles, and available mobile-forensics data. In Removal & Recovery I'll eliminate every confirmed threat without a full wipe unless absolutely necessary, patch vulnerabilities, secure SSH and exposed services, and restore trusted system files. For the iPhone I'll ensure no spy profiles or side-loaded configuration files remain and apply the latest updates. In Hardening & After-Care I'll deliver a plain-English report of findings, fixes, and how the compromise happened, plus a practical hardening checklist (firewall rules, SELinux/AppArmor considerations, 2FA, secure backup strategy, ongoing monitoring). I can work remotely and offer live sessions via Zoom or your preferred screen-sharing tool. Please review and provide input: Could you share any known indicators of compromise (IPs, domains, malware hints) and confirm your preferred times for live sessions? Best regards,
$1,500 USD in 21 days
7.1
7.1

With my expertise in Linux, Computer Security, Technical Support, Ubuntu, and Internet Security, I am well-equipped to tackle the project "Secure Hacked Laptop & iPhone." I am confident in my ability to conduct a thorough investigation, remove all threats, and provide comprehensive after-care to ensure the security of your devices. Rest assured, I am flexible with the budget and eager to commence work promptly. Please review my extensive 15-year-old profile to see my track record of client satisfaction. Let's discuss the details and get started right away. Please go through my profile its 15 years old see the work I did over the years. No Win No Fee means that your satisfaction is my utmost priority. Lets discuss the job details. Moreover, I am willing to start the job and perform tasks without even being hired; it is just to show my commitment to this project. Looking forward to hear from you.
$1,050 USD in 21 days
4.5
4.5

On the subject of security, I understand its paramount importance in this digital age. My licensure for the Sacramentary Country Permit demonstrates my commitment to responsible practices. I may not have experience specifically in incident response on Linux and iOS, but as a structural and civil engineer, I'm experienced in comprehensive analysis and intricate problem-solving—essential skills when it comes to investigating the nuances of compromised devices. I am wholeheartedly devoted to ensuring your laptop and iPhone are thoroughly examined and restored to full security. My experience with advanced simulations and modeling will prove valuable for identifying unseen vulnerabilities. As your security specialist, I'll provide more than just a clean-up; I'll deliver detailed reports of what was found and any actions taken, while also providing future steps to maintain device safety. In short, my adaptability, deep-dive approach, and dedication make me uniquely qualified for this project.
$1,000 USD in 3 days
4.0
4.0

Dear , I have extensive experience in incident response and cybersecurity, specializing in Linux and iOS systems. I understand the urgency and sensitivity of your situation and am prepared to conduct a thorough investigation using advanced tools like chkrootkit, rkhunter, Wireshark, and mobile forensic kits. My approach involves meticulous evidence capture, precise threat removal, and comprehensive system hardening to prevent future breaches. I will provide you with a detailed report outlining the findings, actions taken, and preventive measures implemented. With a proven track record of restoring compromised devices and enhancing their security posture, I am confident in my ability to secure your laptop and iPhone effectively. Let's collaborate to safeguard your digital assets promptly. Looking forward to working with you. Regards, Shiva Modi
$1,100 USD in 7 days
3.1
3.1

Hi, I can do this. With extensive experience in incident response for both Linux and iOS devices, I am well-equipped to address your security concerns. **Investigation & Evidence Capture:** I will perform a thorough forensic analysis of your Linux laptop using tools like chkrootkit and Wireshark, alongside mobile forensics on your iPhone to identify any threats. **Removal & Recovery:** I will safely eliminate confirmed threats, patch vulnerabilities, and ensure both devices are secure without unnecessary data loss. **Hardening & After-Care:** You will receive a detailed report outlining findings and a hardening checklist to prevent future compromises. I am available for live sessions via Zoom or any preferred tool to facilitate this process. Let’s get started on securing your devices. Ashnasajid
$1,125 USD in 3 days
2.9
2.9

Hello. How are you? We're very interest in your project. Here's how we work. 1. we comply 100% with client's requirements 2. we provide the first work result within 12 hours 3. we provide updated work progress everyday 4. we can make call if you wanna that There are 23 members in my team and each member has unique skill each other. we work with 8 -10 projects everyday. Then we will wait for a good news. Thanks in advance.
$1,200 USD in 10 days
0.0
0.0

As an experienced and highly skilled Full Stack Software Engineer with a particular focus on computer security, I believe I would be an ideal choice for your project. With over 10 years of experience, I have a deep understanding of the various layers of system vulnerabilities and know how to efficiently eliminate them without compromising the integrity of your valuable data. My expertise extends to almost all dimensions of technology stack - from hardware-level programming and kernel engineering to building cloud dashboards and mobile apps. This hands-on experience gives me a unique advantage in conducting reliable remote forensics, identifying malware or any rogue services, and patching exposed security vulnerabilities as required in the first phase. In the second phase, I ensure precise elimination of the threats while retaining your data without hasty wipes. Additionally, my love for details and concise yet comprehensive documentation allows me to provide you with a step-by-step hardening checklist tailored for your devices in the aftercare stage. My knowledge about secure firmware development (including OTA updates), cryptography concepts such as 2FA, makes me confident that I can furnish you with robust solutions ensuring end-to-end safety. Let's get started on this project immediately via live sessions over screen-sharing tools that you prefer!
$1,000 USD in 5 days
0.0
0.0

Hello, How are you? I have checked your job description and I’m confident I can complete exactly what you need. I have extensive experience with digital forensics and computer security, particularly with Linux and iOS devices. I understand the intricacies involved in investigating and resolving security issues, especially regarding unexpected network activities and unauthorized access alerts. I can effectively conduct a forensic sweep of your laptop using terminal-level tools like chkrootkit and rkhunter, as well as mobile forensics for your iPhone to identify any threats. I will ensure that all confirmed threats are safely removed and will provide you with a comprehensive report detailing what was found, fixed, and steps to prevent future incidents. Additionally, I will develop a hardening checklist tailored to your needs to enhance the security of both your devices. I think this job is an ideal match with my skills and experience. Please send me a message so that we can discuss more. Thanks,
$1,000 USD in 15 days
0.0
0.0

EXPERT ((Technical Support, Digital Forensics, Internet Security, Security, Network Security, Linux, Ubuntu and Computer Security)) DEAR EMPLOYER, I’ve completed the exact same projects before successfully. Awarding me will be the fastest way to complete your task with the best rates possible. I CAN ASSURE YOU 100% THAT WE ARE FULLY CAPABLE OF EXECUTING ANY LEVEL OF TASK/PROJECT BASED ON THE SKILL REQUIRED. I am fully confident about our skills and my understanding of the project description and we are ready to go through any test or sample task you assign to acquire your trust. Let me know when are you available for an initial 15-30-minute discussion (FREE OF CHARGE) so we can discuss the requirement in detail and I can walk you through the mentioned systems to acquire your trust in my skill. REST ASSURED YOUR WORK IS IN VERY SAFE AND PROFESSIONAL HANDS. THANK YOU
$750 USD in 5 days
0.0
0.0

Hi, I completely understand your concern regarding the ongoing security compromise of both your Linux laptop and iPhone. With extensive experience in digital forensics and incident response on Linux and iOS devices, I can perform a thorough remote forensic sweep using advanced tools like chkrootkit, rkhunter, Wireshark, and mobile forensics toolkits. I'll precisely identify and eliminate threats, patch vulnerabilities, and harden your systems with a clear, actionable report and checklist ensuring sustained security. I am ready to begin immediately and support live via Zoom as required. Could you specify the Linux distribution and version on your laptop, and the iOS version on your iPhone? Thanks, Roshan
$1,250 USD in 10 days
1.2
1.2

Hello, I hope you are doing well. I’m a security professional focused on Linux and iOS incident response. I specialize in remote forensics, evidence capture, and precise remediation that minimizes disruption. I’ve conducted Linux sweeps with chkrootkit, rkhunter, Wireshark, and auditd, plus iPhone log/config analysis to detect malware, rootkits, rogue services, and suspicious routes. I’ll document findings clearly without unnecessary data loss. I will remove threats, patch vulnerabilities, lock down exposed services, and restore trusted files. I’ll ensure iPhone cleanliness, updates, and a plain-English hardening report with a practical checklist (firewall, 2FA, backups, monitoring). Please contact me to discuss details. I’m ready to start soon. Best regards, Billy Bryan
$750 USD in 13 days
0.0
0.0

I’ve dealt with similar cases where symptoms like unexpected network traffic and unfamiliar login alerts signaled stealthy footholds rather than just surface malware. One step beyond scanning is tracing suspicious routes and services that linger beneath the OS radar. I see the need for a thorough, terminal-level forensic audit on your Linux system coupled with detailed mobile forensics on your iPhone. Done right means eliminating threats cleanly, no unnecessary wipes, while restoring trust and preventing repeat intrusions with clear, actionable hardening steps. In past breaches, I’ve balanced aggressive threat hunting with minimal disruption, using tools like chkrootkit, auditd, and mobile config analysis to precisely target root causes. Offering remote sessions keeps communication transparent and efficient without costly overhead. What I’ll deliver: ✅ Comprehensive forensic report of all findings and attack vectors ✅ Removal of all detected malware and rogue configurations without forced resets ✅ Customized hardening checklist tailored for your devices and usage ✅ Clear, plain-English explanation so you can maintain security confidently What’s the most urgent device for you to secure first? Let’s schedule a quick sync to clarify your priorities. Happy to discuss this further and align before moving ahead. Kind regards Eliza.
$1,150 USD in 3 days
0.0
0.0

Riyadh, Bahrain
Member since Jan 30, 2026
$30-250 USD
$25-50 USD / hour
$250-550 USD
$10-30 USD
$250-750 USD
$30-250 USD
$15-25 USD / hour
₹600-1500 INR
$50-300 USD
€12-18 EUR / hour
£10-150 GBP
$1500-3000 USD
$8-15 USD / hour
$30-250 USD
$30-250 USD
₹1500-12500 INR
$30-250 USD
$25-50 USD / hour
$8-15 USD / hour
$10-30 USD