Popular devices

Latest News

Latest Reviews

iPhone XS Max review
Jan 16, 2020
Moto G7 Power review
Jan 16, 2020

Jamf shares exploit that fools users into believing their hacked iPhone is safe

Dec 05, 2023 news@appleinsider.com (Wesley Hilliard) News Source appleinsider 32 hits

Jamf shares exploit that fools users into believing their hacked iPhone is safe

Affiliate Disclosure If you buy through our links, we may get a commission. Read our ethics policy . Jamf shares exploit that fools users into believing their hacked iPhone is safe Wesley Hilliard | Dec 05, 2023 Lockdown Mode 0 Facebook Twitter Reddit Despite popular belief, iPhones can get infected with malware — but it is rare. Attackers taking advantage of zero-day vulnerabilities and zero-click exploits can infect a user's device — though these sophisticated attacks are often expensive and difficult to execute. Jamf Threat Labs has worked out a proof-of-concept post-exploitation tampering technique that makes an iPhone behave like it is in Lockdown Mode when it isn't. The user can toggle Lockdown Mode and will see visual cues, like an apparent device restart and warnings in Safari that trick the user into a false sense of security. This isn't a flaw with Lockdown Mode, iPhone security, or the operating system. The tampering technique only works on devices that have already been infected with malware. Jamf researched this proof-of-concept to emphasize that Lockdown Mode has limitations. It is a shield that reduces the attack surface on an iOS device, not anti-malware that detects infections and ejects them. Lockdown Mode is most effective when used on a device before an attack occurs. It reduces the number of entry points available for an attacker. Warnings tell the user Lockdown Mode is being activated A system reboot can help stop malware from monitoring the user, but Jamf found a way to force a userspace reboot instead of a system reboot. That way, the injected code can maintain adaptable control over Lockdown Mode. Lockdown Mode performs several actions, most of which are invisible to the user. Messages — Most message attachments are blocked, and some features are unavailable. FaceTime — Incoming FaceTime calls from people you have not previously called are blocked. Web Browsing — Some web technologies and browsing features are blocked. Shared Albums — Shared albums will be removed from the Photos app, and new Shared Albums invitations will be blocked. Device Connections — Wired connections with another device or accessory are blocked while your iPhone is locked. Apple Services — Incoming invitations for Apple Services from people you have not previously invited are blocked. Profiles — Configuration profiles, such as profiles for school or work, cannot be installed. Those activating Lockdown Mode may not be familiar with everything it does, so Jamf feels that manipulating only a few points can trick users into that false sense of security. For example, they altered an alert in Safari that shows up when Lockdown Mode is active. Lockdown Mode in Safari As was shared before, this tampering technique is only possible on an iPhone that has already been infected by malware. Sophisticated attacks like these are too expensive and difficult to execute without significant resources, so regular users who aren't diplomats or political journalists likely never need to worry about such security risks. Apple made it clear at launch that Lockdown Mode is for specific kinds of people at high risk of attacks. Turning on the feature reduces the available feature set of an iPhone and could lead users to think their device is broken. If you need to turn it on, you'll know.


Rate this article:

Share this article:

Leave a comment:

Related articles