Apple Says No One Using Lockdown Mode Has Been Hacked with Spyware

Apple Says No One Using Lockdown Mode Has Been Hacked with Spyware

TechCrunch (Main)
TechCrunch (Main)Mar 27, 2026

Why It Matters

Lockdown Mode’s proven resistance to sophisticated spyware bolsters confidence in iPhone security for journalists, activists, and other high‑risk individuals, while pressuring adversaries to invest in more expensive attack vectors.

Key Takeaways

  • No known successful spyware attacks on Lockdown Mode devices.
  • Lockdown Mode blocks attachment types and restricts WebKit features.
  • Researchers observed Pegasus and Predator blocked by Lockdown Mode.
  • Feature forces attackers to use costlier, complex exploits.
  • Apple notified users in 150+ countries of potential spyware.

Pulse Analysis

When Apple unveiled Lockdown Mode in 2022, it responded to a growing wave of state‑sponsored spyware campaigns targeting iPhone users. Tools like NSO Group’s Pegasus and Intellexa’s Predator exploit subtle OS pathways—message attachments, link previews, and low‑level WebKit functions—to infiltrate devices without user interaction. By default, iOS balances usability with security, but Lockdown Mode opts for a hardened stance, disabling these high‑risk vectors and requiring users to take extra steps for routine actions. This trade‑off reflects a broader industry shift toward offering optional, enterprise‑grade protections to consumer devices.

Apple’s latest statement that no successful attacks have been recorded on Lockdown Mode‑enabled phones aligns with independent findings from Amnesty International and the University of Toronto’s Citizen Lab. Both organizations documented cases where the feature actively blocked Pegasus and Predator payloads, and Google’s researchers noted that malicious code aborts when it detects the mode. Technically, the feature narrows the attack surface by turning off dynamic code execution paths and restricting background processes, effectively neutralizing many zero‑click exploit chains that have historically been the most lucrative for spyware vendors.

The implications extend beyond individual privacy. For enterprises and governments that mandate secure communications, Lockdown Mode offers a tangible, built‑in hardening layer that reduces reliance on third‑party mobile‑device‑management solutions. Competitors may feel pressure to introduce comparable opt‑in security modes, potentially raising the baseline security posture across the smartphone market. However, the usability friction—extra steps for copying links or receiving limited notifications—means adoption will likely remain concentrated among high‑risk users and organizations that prioritize security over convenience.

Apple says no one using Lockdown Mode has been hacked with spyware

Comments

Want to join the conversation?

Loading comments...