New Delhi: Apple introduced Lockdown Mode in 2022 as a security feature for users who may face targeted cyberattacks. Nearly four years later, the company says it has not found any case where a device using this feature was successfully hacked using spyware.
The statement highlights how the feature has worked so far, especially against advanced surveillance tools often used in targeted attacks. Apple also told TechCrunch that it is not aware of any successful spyware breaches on devices with Lockdown Mode enabled.
What Apple says about security
Apple maintains that Lockdown Mode has been effective in blocking known types of mercenary spyware. The company says the added protections make it much harder for attackers to break into devices.
This is not the first time Apple has made such a claim. Since the feature was launched, it has repeatedly said that Lockdown Mode reduces the chances of exploitation. So far, even independent security researchers and organisations tracking spyware activity have not reported any confirmed cases where the feature was bypassed.
How Lockdown Mode reduces risk
Lockdown Mode is designed mainly for people at higher risk, such as journalists, activists, and government officials. It works by limiting certain features on the device to reduce possible entry points for attackers.
For example, it restricts message attachments, blocks some web technologies, and limits incoming requests. These changes may affect how the device functions, but they also make it harder for spyware to operate.
In some observed cases, security researchers found that spyware attempts were blocked when Lockdown Mode was active. There have also been instances where the spyware stopped working after detecting the feature.
While Apple admits that undetected attacks cannot be completely ruled out, there are no confirmed reports of successful breaches so far. Experts say this shows that reducing access points on a device can be an effective way to defend against advanced cyber threats.