New Apple feature protects system functions from highly targeted cyberattacks
Apple Inc. today previewed a new security feature that automatically locks down system functionality that could be hijacked in “highly targeted cyberattacks.”
Called Lockdown Mode, the feature, described by Apple as a “groundbreaking security capability,” offers specialized protection to users who may be at risk of highly targeted cyberattacks from private companies developing state-sponsored mercenary spyware. The new service is optional and is targeted at a very small number of users who face grave, targeted threats to their digital security.
With Apple services, incoming invitations and service requests, including FaceTime calls, are blocked if the user has not previously sent the initiator a call or request. Wired connections with a computer or accessory are blocked when an iPhone is locked. Configuration profiles cannot be installed and the device cannot enroll into mobile device management while Lockdown Mode is turned on.
“Lockdown Mode is a groundbreaking capability that reflects our unwavering commitment to protecting users from even the rarest, most sophisticated attacks,” Ivan Krstić, Apple’s head of security engineering and architecture, said in a statement. “While the vast majority of users will never be the victims of highly targeted cyberattacks, we will work tirelessly to protect the small number of users who are.”
While Apple primarily pitches the idea using general terms, they’re not shy in holding back on whom the feature really targets, citing controversial Israeli spyware maker NSO Group Ltd. by name.
NSO Group has been one of if not the most controversial cybersecurity companies of recent times. The company’s Pegasus spyware is a form of software that uses zero-day or unpatched exploits to infect mobile devices. The software can breach mobile devices without requiring a user to perform any action and can infect most versions of iOS and Android.
Apple has tried to address the exploits used by Pegasus in the past, such as a September release that addressed the “Forcedentry” exploit. However, NSO Group has a reputation for a reason: The company continues to find new ways for Peagusus to access devices, including iPhones.
Previous exploits used by the like of NSO’s Pegasus and other similar spyware packages have involved sending unsolicited messages to gain access to a targeted device, in some cases not even requiring the message to be opened. That’s where Lockdown Mode steps in, blocking the messages before they can run malicious scripts and take over the device.
Apple intends to make Lockdown Mode generally available in fall.
A message from John Furrier, co-founder of SiliconANGLE:
Show your support for our mission by joining our Cube Club and Cube Event Community of experts. Join the community that includes Amazon Web Services and Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger and many more luminaries and experts.
We really want to hear from you, and we’re looking forward to seeing you at the event and in theCUBE Club.