It depends what type of attack it was - if the hacker still has control of the computer then they could be repeatedly changing her password ***** every time she recovers the account.
The infected computer will need to be dealt with first to ensure the hacker and any associated virus or malware is removed from it first, then concentrate on recovering any files, accounts, etc afterwards.
--------------------------Kindly rate my service 5 stars at the top of your question page if my answer is helpful so I am rewarded for my time; tips greatly appreciated :)Alternatively, please reply back if you need further assistance.Pete.--------------------------
A new iPhone will be safe unless it is connected to a compromised account.
The existing Yahoo email username cannot be used for a new account if it is already in use with another account.
Access to the backups could indeed be the reason why Apple are unable to restore the phone.
This is probably the best strategy to take, however it is possible for hackers to hide their IP address or use proxy servers to bounce their connection around the world, making it extremely difficult to trace them.
The safest way to firewall all associations is to set up a completely new account on a new phone and PC, otherwise there is no 100% guarantee that they will be safe from further attack.
iMessage texts should indeed be safe, but again nothing is 100% safe in cyberspace as there will always be unknown vulnerabilities, however Apple have a great track record in patching up vulnerabilities as soon as possible after they are discovered.
Emails to a new account can STILL compromise a system if they contain malicious code, even if you don't open the attachment - that is how sophisticated hacking has become. But again, Apple software is the most resistance to these attacks.
Facebook is one of the most common ways for an attacker to gain access to a system - it is full of spam messages containing threats. I would suggest keeping two phones - one for work use and one for personal and facebook use.
There isn't any way to verify the integrity and safety of the iCloud or iTunes backups before they are used.
I would suggest using another device to extract the contact information, scan it for threats, then transfer it to the new iPhone to help contain any threat.
Any text messages stored on the corrupt iPhone should still be accessible if you can turn on the phone.
Hi, just checking in on your question. How did things turn out for you?