Skip to content
Tech News
← Back to articles

Apple says no one using Lockdown Mode has been hacked with spyware

read original get Apple Lockdown Mode Guide → more articles
Why This Matters

Apple's Lockdown Mode has proven highly effective in preventing spyware attacks, with no reported cases of successful hacking when enabled. This underscores the importance of advanced security features in protecting vulnerable users from government-sponsored spyware threats. For consumers and the tech industry, it highlights the potential of proactive security measures to mitigate sophisticated cyber threats.

Key Takeaways

Almost four years after launching a security feature called Lockdown Mode, Apple says it has yet to see a case where someone’s device was hacked with these additional security protections switched on.

“We are not aware of any successful mercenary spyware attacks against a Lockdown Mode-enabled Apple device,” Apple spokesperson Sarah O’Rourke told TechCrunch on Friday.

It’s the tech giant’s most recent affirmation that Apple devices with Lockdown Mode can withstand government spyware attacks, after first making the claim a year after the security feature’s debut.

Apple in 2022 announced Lockdown Mode, an opt-in series of security protections that switches off certain features in iPhones and other Apple devices that are commonly exploited to hack targets with spyware. Apple specifically released this security mode to help at-risk customers defend themselves from the threats posed by government spyware made by companies like Intellexa, NSO Group, and Paragon Solutions.

In recent years, Apple has conceded that its customers can be hacked by spyware and has been more proactive about notifying customers who have been targeted.

Apple has sent numerous batches of notifications to users in over 150 countries, alerting them that they may have been hacked with spyware, which shows how much visibility the company now has on these types of attacks. Apple has never said how many users it has notified, but it’s likely fair to assume there have been dozens, if not more.

Image Credits:Apple (supplied)

Donncha Ó Cearbhaill, the head of the security lab at Amnesty International, where he has investigated dozens of spyware attacks, said that he and his colleagues “have not seen any evidence of an iPhone being successfully compromised by mercenary spyware where Lockdown Mode was enabled at the time of the attack.”

Digital rights organizations like Amnesty International and the University of Toronto’s Citizen Lab have documented several successful attacks on iPhone users, none of which have mentioned a bypass of Lockdown Mode. In at least two cases, Citizen Lab researchers publicly said they had seen Lockdown Mode actively block spyware attacks, one carried out with NSO’s Pegasus, the other with Predator spyware, made by a company now part of Intellexa.

In at least one documented case of a spyware attack targeting iPhones, security researchers at Google said the spyware would bail out of trying to infect the victim if it detects Lockdown Mode, likely as a way to evade detection.

... continue reading