Sarai Hannah Ajai's VERIZON ACCOUNT, APPLE ECOSYSTEM, AND HOME-NETWORK MI*CO COMPROMISES

VERIZON ACCOUNT, APPLE ECOSYSTEM, AND HOME-NETWORK MI*CO COMPROMISES

Prepared by: Sarai Hannah Ajai

Hacking Incident Report

Updated Through: January 31, 2026

 I. Executive Overview (Updated Through Jan 31, 2026)

This updated summary extends the documented timeframe through December 2025 and January 2026, and reflects a material infrastructure change: I replaced my prior ASUS Wi-Fi 6 router with a Netgear Nighthawk Dual-Band WiFi 7 router. Despite the router replacement and continued credential rotations, I continued to experience compromise indicators consistent with ongoing unauthorized access attempts and/or credential interference.

My Excel forensic workbooks remain the controlling record and include timestamped entries documenting forced resets and recovery actions affecting:

Verizon account access, PINs, and voicemail authentication

Apple ecosystem device authentication and Apple ID/iCloud session integrity

eSIM authentication states and cellular provisioning irregularities

Router administrative credentials and Wi-Fi security controls

Device-level passcodes, recovery workflows, and re-enrollment events

 

II. Updated Quantitative Summary of Logged Credential Reset/Recovery Events

(May 2025 – January 2026)

Below are the month-by-month counts based on the number of date-stamped log entries on each month’s worksheet tab.

Month Logged Credential Reset / Recovery Entries

May 2025 24

June 2025 30

July 2025 39

August 2025 30

September 2025 23

October 2025 29

November 2025 29

December 2025 30

January 2026 27

Total (May 2025 – Jan 2026) 261

Interpretation (unchanged, but strengthened): This total reflects the intensity and persistence of takeover pressure rather than “routine security maintenance.” Multiple categories were tracked in parallel, and several entries involve multi-system resets during a single incident cycle.

 

III. Device & Account Scope (Expanded)

The January 2026 worksheet reflects that the security impact extends beyond the original device set and now includes at least one additional Apple platform device:

Apple iPhone 11 (Returned to Apple Dated on 10-31-25 for Credit)

Apple iPhone 17

Apple Watch Series 7

Mac Mini M1

Apple iPad (M3) (appears in January 2026 log entries)

Verizon wireless line(s) including *** *** 6195

Home LAN/Wi-Fi + router admin plane

This supports the conclusion that the interference pattern is ecosystem-wide rather than limited to one endpoint.

 

IV. Updated Technical Environment (Router Change + Continued Compromise)

ISP: Mi*co*ti*e*t C*m*u*ic*ti*ns

Modem: Netgear Nighthawk CM1200

Router (Updated): Netgear Nighthawk Dual-Band Router WiFi 7 (replaced ASUS RT-AX1800S)

Mac Mini M1: Ethernet-connected to router

Mobile devices: Wi-Fi/cellular hybrid connectivity (iPhone 11/17, Watch Series 7, iPad M3)

Significance: Router replacement reduces the likelihood that the compromise was solely due to a single router firmware issue or a static router credential exposure. Continued compromises after replacement are consistent with one or more of the following conditions:

Credential/session token abuse occurring at the account layer (carrier or Apple ID), independent of router hardware

Repeated re-authentication pressure consistent with unauthorized attempts (e.g., Apple ID, carrier PIN, voicemail)

A persistence mechanism that survives router replacement (e.g., device compromise, account takeover, SIM/eSIM provisioning interference, or upstream network manipulation)

(This is a forensic inference based on the continuity of your logs; it does not assert a specific actor or method as fact.)

 

V. Federal Statutes Implicated (Reaffirmed; Applies Through Jan 2026)

Your continuing logs through January 2026 reinforce the same federal exposure categories previously identified:

18 U.S.C. § 1030 (CFAA) — unauthorized access / impairment of protected computers and authentication integrity

18 U.S.C. § 2511 (Wiretap Act) — interference with electronic communications and related systems (including voicemail and carrier signaling contexts)

18 U.S.C. § 1028 — identity theft/fraud indicators where personal identifiers are used to access accounts/services

18 U.S.C. § 2261A — cyberstalking / harassment pattern when electronic conduct is repeated and targeted

47 U.S.C. § 222 (CPNI) — carrier duty to protect customer proprietary network information and access controls

 

VI. Forensic Indicators (Strengthened by Router Replacement + iPad Inclusion)

The post-November continuation, combined with router replacement and the appearance of an additional Apple device (iPad M3), strengthens these indicators:

Persistent reset cadence (month-over-month continuity)

Multi-surface impact (carrier + Apple ID + device passcodes + LAN controls)

Evidence consistent with account-layer interference (Apple ID sessions, carrier PIN/voicemail, eSIM)

Continued interference after infrastructure change (WiFi 7 router), reducing the likelihood of a single-router explanation

 

VII. Methodology (Updated Data Sources)

Counts above were derived from the attached Excel forensic workbooks. Each qualifying entry corresponds to a date-stamped row documenting a password reset, passcode change, PIN reset, voicemail authentication change, router/Wi-Fi credential rotation, forced Apple re-authentication, or device recovery workflow.

The updated totals include: December 2025 and January 2026 worksheet tabs in addition to May–November 2025.

 

VIII. Insert-Ready Text for Your Main Report

If you want to drop this directly into your original complaint, use the following replacement lines:

Replace: “Between May 1, 2025 and November 30, 2025…”

With: “Between May 1, 2025 and January 31, 2026…”

Replace: “Total Recorded Reset/Recovery Events: 212 entries”

With: “Total Recorded Reset/Recovery Events: 261 entries (May 2025 – Jan 2026)”

Replace router line in Technical Environment:

With: “Router: Netgear Nighthawk Dual-Band Router WiFi 7 Activated on January 9, 2026 (replaced ASUS RT-AX1800S) — compromises continued after replacement.”







Comments