• btc = $61 343.00 -2 534.96 (-3.97 %)

  • eth = $2 990.26 - 105.16 (-3.40 %)

  • ton = $6.09 -0.27 (-4.22 %)

  • btc = $61 343.00 -2 534.96 (-3.97 %)

  • eth = $2 990.26 - 105.16 (-3.40 %)

  • ton = $6.09 -0.27 (-4.22 %)

18 Apr, 2023
2 min time to read

According to researchers, they have discovered proof that a functionality known as Lockdown Mode effectively prevented a cyberattack from hackers who utilized spyware created by the notorious NSO Group, a mercenary hacking service.

Last year, Apple launched a new feature for iPhone users who are worried about getting targeted with sophisticated spyware, such as journalists or human rights defenders. Now, researchers say they have found evidence that the feature — called Lockdown Mode — helped block an attack by hackers using spyware made by the infamous mercenary hacking provider NSO Group.

On Tuesday, the cybersecurity and human rights research group Citizen Lab released a report analyzing three new zero-day exploits in iOS 15 and iOS 16 — meaning Apple was unaware of the vulnerabilities at the time they were used to target at least two Mexican human rights defenders.

One of those exploits was blocked by Lockdown Mode, the researchers found. Lockdown Mode was specifically designed to reduce the iPhone’s attack surface — cybersecurity lingo referring to parts of the code or features of a system prone to attacks by hackers. This is the first documented case where Lockdown Mode has successfully protected someone from a targeted attack.

In the recent cases, Citizen Lab researchers said that the targets’ iPhones blocked the hacking attempts and showed a notification saying Lockdown Mode prevented someone from accessing the phone’s Home app. The researchers, however, note that it’s possible that at some point NSO’s exploit developers “may have figured out a way to correct the notification issue, such as by fingerprinting Lockdown Mode.”

As other researchers have pointed out in the past, it’s easy to fingerprint users to determine who has Lockdown Mode turned on, but that’s not to say its protections are not meaningful. As this case found by Citizen Lab shows, Lockdown Mode can be effective.

“The fact that Lockdown Mode seems to have thwarted, and even notified targets of a real-world zero-click attack shows that it is a powerful mitigation, and is a cause for great optimism,” Bill Marczak, a senior researcher at Citizen Lab and one of the authors of the report, told TechCrunch. “But, as with any optional feature, the devil is always in the details. How many people will opt to turn on Lockdown Mode? Will attackers simply move away from exploiting Apple apps and target third-party apps, which are harder for Lockdown Mode to secure?”

Apple spokesperson Scott Radcliffe said in a statement: “We are pleased to see that Lockdown Mode disrupted this sophisticated attack and alerted users immediately, even before the specific threat was known to Apple and security researchers. Our security teams around the world will continue to work tirelessly to advance Lockdown Mode and strengthen the security and privacy protections in iOS.”

NSO Group spokesperson Liron Bruck did not respond to a series of questions, instead sending a statement saying that “Citizen Lab has repeatedly produced reports that are unable to determine the technology in use and they refuse to share their underlying data. NSO adheres to strict regulation and its technology is used by its governmental customers to fight terror and crime around the world.”

Citizen Lab’s report identified three different exploits — all “zero-click,” meaning they did not require any interaction by the target — by analyzing several phones that were suspected to have been hacked with NSO’s spyware, also known as Pegasus.

Pegasus, which NSO sells exclusively to government customers, can remotely obtain a phone’s location, messages, photos, and virtually anything the phone’s legitimate owner can access. For years, researchers at Citizen Lab, Amnesty International and other organizations have documented several cases where NSO customers used the company’s spyware to target journalists, human rights defenders, and opposition politicians.