How a New Technique Exploits Apple’s Lockdown Mode

by | Dec 6, 2023 | News

Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A “post-exploitation tampering technique” has emerged, posing a threat as malicious actors can employ it to visually trick Apple iPhone users into believing their device is in Lockdown Mode when it’s actually vulnerable to covert attacks.

The innovative method, outlined in a report by Jamf Threat Labs shared exclusively with The Hacker News, exposes a flaw where hackers, having infiltrated a device, can bypass Lockdown Mode by triggering its activation.

Simply put, the objective is to implement a Fake Lockdown Mode on a compromised device, typically accessed through unpatched security flaws that can execute arbitrary code.

SALE: Benefit from discounted prices on our Courses from 24/11 to 06/12.
Offensive Security, Bug Bounty Courses

Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Lockdown Mode, introduced by Apple last year with iOS 16, is a robust security measure designed to protect high-risk individuals from advanced digital threats like mercenary spyware. However, it doesn’t prevent the execution of malicious payloads on a compromised device, allowing a trojan to manipulate Lockdown Mode, creating a false sense of security.

Security researchers Hu Ke and Nir Avraham explained, “In the case of an infected phone, there are no safeguards in place to stop the malware from running in the background, whether the user activates Lockdown Mode or not.”

Lockdown Mode Attack

The creation of fake Lockdown Mode involves hooking functions activated upon setting activation, creating a file called “/fakelockdownmode_on,” and initiating a userspace reboot. This clandestine reboot, which terminates all processes and restarts the system without kernel interference, allows malware without persistence to persist even after such a reboot, covertly spying on users.

Michael Covington, Vice President of Portfolio Strategy at Jamf, highlighted the deceptive nature of the exploit: “By tricking the user into believing that their device is operating normally and that additional security features can be activated, the user is far less likely to suspect any malicious activity is taking place behind the scenes.”




Moreover, adversaries can manipulate Lockdown Mode on the Safari web browser, enabling the viewing of PDF files, which is typically blocked when the setting is active.

“Since iOS 17, Apple has elevated Lockdown Mode to kernel level,” the researchers noted, praising this as a significant security enhancement due to the difficulty in undoing changes made by Lockdown Mode in the kernel without a system reboot.

Jamf’s disclosure comes four months after it demonstrated another method on iOS 16, illustrating how an attacker could maintain access to an Apple device by tricking the victim into thinking their device’s Airplane Mode is enabled.

Covington emphasized the broader issue, stating, “Jamf’s research on Fake Airplane Mode and Fake Lockdown Mode has explored how interfaces convey trust and provide users with assurances that a device is secure.” He expressed concern about the shifting threat landscape and the evolution of social engineering techniques, anticipating more active use of such exploits in the future.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: thehackernews.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This