Apple: No iPhones Hacked with Lockdown Mode Enabled So Far

by Priyanka Patel

Apple says it’s seen no evidence of successful hacks targeting users who have enabled its Lockdown Mode, a security feature designed to protect against sophisticated spyware attacks. The company’s statement, shared with TechCrunch on Friday, marks the latest affirmation of the feature’s effectiveness since its introduction nearly four years ago. While acknowledging the ongoing threat of mercenary spyware, Apple maintains that, to date, no devices running with Lockdown Mode activated have been compromised.

The reassurance comes as concerns about government-backed surveillance and the proliferation of tools like Pegasus, developed by NSO Group, continue to grow. These tools have been used to target journalists, activists, and political figures globally. Apple’s proactive stance, including notifying users potentially targeted by such attacks, reflects a growing awareness of these threats and a commitment to user security. The company has been sending notifications to users in over 150 countries, alerting them to potential compromises, though the exact number of those notified remains undisclosed.

Lockdown Mode, first announced in 2022, is an optional setting that drastically reduces the attack surface of iPhones and other Apple devices. It achieves this by disabling certain features commonly exploited by attackers, such as complex web technologies, attachment handling, and incoming FaceTime calls from people the user hasn’t interacted with. The feature was specifically designed to defend against threats posed by companies like Intellexa, NSO Group, and Paragon Solutions, all known for developing and selling powerful spyware.

A Proactive Shift in Security

Apple’s response to the threat of spyware hasn’t always been as assertive. In recent years, the company has acknowledged that its devices can be compromised, and has moved towards a more transparent approach, proactively alerting users who may have been targeted. This shift is a significant departure from previous practices and demonstrates a growing understanding of the evolving threat landscape. The company’s willingness to publicly address these issues, even when acknowledging vulnerabilities, is a notable change.

However, the fact that Apple has yet to confirm a successful breach of a device running Lockdown Mode doesn’t mean the feature is impenetrable. Security experts caution that sophisticated attackers are constantly developing new techniques. Donncha Ó Cearbhaill, head of the security lab at Amnesty International, explained that his team “have not seen any evidence of an iPhone being successfully compromised by mercenary spyware where Lockdown Mode was enabled at the time of the attack.” This assessment, while reassuring, is based on the attacks Amnesty International has investigated – it doesn’t guarantee complete immunity.

How Lockdown Mode Works and What it Blocks

Lockdown Mode operates by significantly restricting device functionality. It disables features like link previews, invites in Mail, and certain types of web content. While these restrictions can be inconvenient, they dramatically reduce the avenues available to attackers. Patrick Wardle, an Apple cybersecurity expert and critic, describes Lockdown Mode as “one of the most aggressive consumer-facing hardening features ever shipped.” He explains that it “kills entire delivery mechanisms/exploit classes,” forcing attackers to invest in more complex and expensive methods.

In some instances, spyware has been observed to simply abort an attempted infection when it detects Lockdown Mode is active. Google researchers, for example, discovered that a particular spyware suite would cease its efforts to compromise a device if Lockdown Mode was enabled, likely as a way to avoid detection. This suggests that the feature is already proving to be a deterrent, even if it hasn’t been directly tested in a confirmed successful attack scenario.

Image Credits:Apple (supplied)

Is Lockdown Mode Right for You?

While the lack of confirmed breaches is encouraging, it’s key to remember that Lockdown Mode isn’t a silver bullet. The restrictions it imposes can impact everyday usability. As one long-time user noted, the feature is largely unobtrusive, but does require extra steps for certain tasks, like copying and pasting links from messages. Despite these minor inconveniences, security experts generally recommend enabling Lockdown Mode for anyone concerned about being targeted by sophisticated spyware attacks, particularly journalists, activists, and individuals working in politically sensitive fields.

Apple’s continued monitoring of the threat landscape and its commitment to transparency are crucial. The company has not disclosed how many users have been notified of potential spyware attacks, but the fact that notifications have been sent to individuals in over 150 countries underscores the widespread nature of this threat. Apple’s next scheduled update on security measures is expected during its Worldwide Developers Conference in June, where further enhancements to Lockdown Mode and other security features may be announced.

If you are concerned about targeted spyware, enabling Lockdown Mode is a proactive step you can seize to enhance your device’s security. For more information on Lockdown Mode and how to enable it, visit Apple’s support page.

What are your thoughts on Apple’s security measures? Share your comments below, and please consider sharing this article with others who may find it helpful.

You may also like

Leave a Comment