Apple says no one using Lockdown Mode has been hacked with spyware

👁 0 views

Almost 4 years after launching a safety function known as Lockdown Mode, Apple says it has but to see a case the place somebody’s system was hacked with these extra safety protections switched on. 

“We are not aware of any successful mercenary spyware attacks against a Lockdown Mode-enabled Apple device,” Apple spokesperson Sarah O’Rourke instructed TechCrunch on Friday.

It’s the tech large’s most up-to-date affirmation that Apple gadgets with Lockdown Mode can face up to authorities spyware assaults, after first making the declare a yr after the safety function’s debut.

Apple in 2022 introduced Lockdown Mode, an opt-in collection of safety protections that switches off sure options in iPhones and different Apple gadgets which can be generally exploited to hack targets with spyware. Apple particularly launched this safety mode to assist at-risk clients defend themselves from the threats posed by authorities spyware made by corporations like Intellexa, NSO Group, and Paragon Solutions.

In current years, Apple has conceded that its clients might be hacked by spyware and has been extra proactive about notifying clients who’ve been focused.

Apple has despatched quite a few batches of notifications to customers in over 150 nations, alerting them that they could have been hacked with spyware, which reveals how a lot visibility the corporate now has on a lot of these assaults. Apple has by no means mentioned what number of customers it has notified, nevertheless it’s seemingly honest to imagine there have been dozens, if no more.

A screenshot showing iOS Lockdown Mode in iOS 16.
Image Credits:Apple (provided)

Donncha Ó Cearbhaill, the top of the safety lab at Amnesty International, the place he has investigated dozens of spyware assaults, mentioned that he and his colleagues “have not seen any evidence of an iPhone being successfully compromised by mercenary spyware where Lockdown Mode was enabled at the time of the attack.”

Digital rights organizations like Amnesty International and the University of Toronto’s Citizen Lab have documented a number of profitable assaults on iPhone customers, none of which have talked about a bypass of Lockdown Mode. In no less than two instances, Citizen Lab researchers publicly mentioned that they had seen Lockdown Mode actively block spyware assaults, one carried out with NSO’s Pegasus, the opposite with Predator spyware, made by an organization now a part of Intellexa.

In no less than one documented case of a spyware assault concentrating on iPhones, safety researchers at Google mentioned the spyware would bail out of attempting to contaminate the sufferer if it detects Lockdown Mode, seemingly as a approach to evade detection.

Patrick Wardle, an Apple cybersecurity professional and critic, says that Lockdown Mode is a crucial function that makes it harder for spyware makers to assault Apple customers.

“I think it’s safe to say, Lockdown Mode is one of the most aggressive consumer-facing hardening features ever shipped,” he instructed TechCrunch. 

Contact Us

Do you have got extra details about spyware assaults, or spyware makers? From a non-work system, you’ll be able to contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or through Telegram, Keybase and Wire @lorenzofb, or by electronic mail.

Wardle defined that by “shrinking the attack surface,” Lockdown Mode eliminates many methods usually used to use the iPhone, and forces spyware makers to make use of extra complicated and costly methods to develop.

“It kills entire delivery mechanisms/exploit classes,” he added, “as it blocks most message attachment types, restricts WebKit features. This is really a huge reduction in remotely reachable attack surface, especially for zero-click exploit chains,” referring to hacks that may goal individuals over the web with none interplay from the sufferer.

It’s doable that Lockdown Mode has been bypassed, and neither Apple nor impartial investigators have caught the assault. But on condition that Apple is usually publicly tight-lipped at one of the best of instances, its newest assertion marks a major milestone for Lockdown Mode.

I’ve used Lockdown Mode for years, and I barely give it some thought — besides when it pops up notifications that may be often complicated. Some options which have been switched off require you to take an additional step, similar to copying and pasting hyperlinks from textual content messages to your browser. That’s why I, and several other digital safety specialists, advocate anybody frightened about being focused by spyware or digital assaults to change on Lockdown Mode.

Scroll to Top