Skip to content

Lockdown Mode's First Victory

Posted on:April 18, 2023 at 06:30 AM

With its recent introduction in iOS 16, Lockdown Mode’s effectiveness against sophisticated threats like the Pegasus spyware had yet to be publicly tested. A recent report from Citizen Lab provides the first known case of Lockdown Mode’s efficacy, particularly against an exploit known as PWNYOURHOME.

What is PWNYOURHOME?

PWNYOURHOME is a two-phase zero-click exploit targeting iOS 15 and iOS 16. The first phase exploits the HomeKit functionality (homed process), while the second phase targets iMessage (MessagesBlastDoorService process). The exploit does not require the user to have previously configured a “Home” in HomeKit.

Infiltration: The exploit targets iPhone’s HomeKit and iMessage systems, adding an attacker’s email to HomeKit and deleting an iMessage attachment.

HomeKit Exploitation: It triggers a crash in the homed process by misusing the NSKeyedUnArchiver to decode an unusual class, setting the stage for the exploit.

iMessage Exploitation: Malicious PNG images downloaded via iMessage cause crashes in the MessagesBlastDoorService process, indicating the bypass of pointer authentication codes (PAC).

Gadget Execution: The exploit uses a series of functions, or gadgets, to manipulate memory and execute arbitrary code, bypassing security measures.

Memory Manipulation: A memory copy gadget is employed to copy memory chunks, aiding further exploitation.

Final Execution: The exploit escapes the BlastDoor sandbox and launches the Pegasus spyware via the mediaserverd process.

This is a TLDR, but for those interested in more technical details on the exploit chain, I highly recommend reading the full comprehensive report by Citizen Lab for an in-depth analysis.

Lockdown Mode Prevention

On a device with lockdown mode enabled, the user’s iPhone blocks an attempted HomeKit invitation. On a device with lockdown mode enabled, the user’s iPhone blocks an attempted HomeKit invitation. Source: Citizen Lab

When Lockdown mode is enabled, it restricts incoming invitations for Apple services from unknown contacts. Specifically, it blocks unsolicited FaceTime or Home invitations, and promptly notifies the user of such an intervention.

By disallowing invitations from unrecognized sources for services like HomeKit, devices in Lockdown Mode were capable of generating immediate alerts upon detecting exploitation attempts. Although Citizen Lab suspects that PWNYOURHOME may have been modified to circumvent user notifications, there is no evidence of successful infiltrations on devices with Lockdown Mode activated.

While Apple’s task is far from complete, and continuous refinement of Lockdown Mode is necessary, the initial outcomes are encouraging. This represents a victory for potential targets, showcasing that Apple’s implementation is effectively impeding the progression of spyware.


Sources

Triple Threat: NSO Group’s Pegasus Spyware Returns in 2022 with a Trio of iOS 15 and iOS 16 Zero-Click Exploit Chains

About Lockdown Mode

Ryan Naraine: Curious if these contain bypasses for iOS Lockdown Mode

About the security content of iOS 16.4.1 and iPadOS 16.4.1

About the security content of iOS 16.3.1 and iPadOS 16.3.1