Apple says no one using Lockdown Mode has been hacked with spyware

Apple’s Lockdown Mode: A Secure Haven Against Spyware Attacks

In a groundbreaking revelation, Apple has disclosed that not a single instance of device hacking has been reported with Lockdown Mode activated since its inception nearly four years ago. Apple spokesperson Sarah O’Rourke confirmed this, emphasizing the robust security shield that Lockdown Mode provides.

Introduced in 2022, Lockdown Mode offers users a suite of security safeguards that disable vulnerable features on Apple devices, thus thwarting potential spyware attacks. The primary aim is to safeguard at-risk individuals from sophisticated government-sponsored spyware threats posed by entities like Intellexa, NSO Group, and Paragon Solutions.

Despite acknowledging the susceptibility of its users to spyware attacks, Apple has taken proactive measures to notify and protect targeted individuals. The company has issued numerous alerts to users across 150 countries, signaling its vigilance in combating cyber threats.

\"A
Image Credits:Apple (supplied)

Amnesty International and the University of Toronto’s Citizen Lab have highlighted successful spyware attacks on iPhone users but have not recorded any breaches of Lockdown Mode. In fact, Lockdown Mode has been commended for actively repelling spyware assaults, showcasing its efficacy in safeguarding Apple users.

Renowned Apple cybersecurity expert Patrick Wardle lauds Lockdown Mode for significantly minimizing attack vectors and raising the bar for spyware developers. By curbing exploitable avenues and imposing stringent restrictions, Lockdown Mode fortifies Apple devices against intrusive cyber threats.

While the possibility of Lockdown Mode being circumvented cannot be ruled out entirely, its unblemished track record underscores its pivotal role in fortifying Apple users against malicious intrusions. As digital security experts advocate, enabling Lockdown Mode is a prudent step for individuals wary of potential spyware attacks.

Contact Us

Do you have more information about spyware attacks, or spyware makers? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or by email.

Wardle explained that by “shrinking the attack surface,” Lockdown Mode eliminates many techniques normally used to exploit the iPhone, and forces spyware makers to use more complex and expensive techniques to develop.

“It kills entire delivery mechanisms/exploit classes,” he added, “as it blocks most message attachment types, restricts WebKit features. This is really a huge reduction in remotely reachable attack surface, especially for zero-click exploit chains,” referring to hacks that can target people over the internet without any interaction from the victim.

It’s possible that Lockdown Mode has been bypassed, and neither Apple nor independent investigators have caught the attack. But given that Apple is typically publicly tight-lipped at the best of times, its latest statement marks a significant milestone for Lockdown Mode.

I have used Lockdown Mode for years, and I barely think about it — except when it pops up notifications that can be occasionally confusing. Some features that have been switched off require you to take an extra step, such as copying and pasting links from text messages to your browser. That’s why I, and several digital security experts, recommend anyone worried about being targeted by spyware or digital attacks to switch on Lockdown Mode.

Leave a Reply

Your email address will not be published. Required fields are marked *