SimJacker is 0-day vulnerability under active attack according to this article:
Dubbed “SimJacker,” the vulnerability resides in a particular piece of software, called the S@T Browser (a dynamic SIM toolkit), embedded on most SIM cards.
New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMS
https://thehackernews.com/2019/09/simjacker-mobile-hacking.html
Huge security issue claims need some fact checking. Fortunately I had just written an article related to SIM card technologies (to be published later) so I have some up to date information on SIM card technologies. Based on that I can verify that SIM card often support remote management with SMS messages and they have nowadays apps that can interact with messages. With security on both on level that could be preferably better. I can’t verify this specific claim, because there is not enough info published yet.
It seems that there is something on this as the SIMalliance has acknowledged this or other similar issue and provided recommendations for SIM card manufacturers to implement security for S@T push messages.
https://simalliance.org/wp-content/uploads/2019/08/[email protected]
News on this looks now like advertisement on future security talk. The researchers will be giving technical details on Simjacker during the Virus Bulletin Conference, London, 3rd October 2019. They have also published a blog that gives an overview of Simjacker, how it works and who is potentially exploiting it.
Simjacker – Next Generation Spying Over Mobile
https://www.adaptivemobile.com/blog/simjacker-next-generation-spying-over-mobile
“there is nothing much a mobile device user can do if they are using a SIM card with S@T Browser technology deployed on it,”
So that begs the question…
How does one determine specifically if they have such a SIM card?
Why was the proper security not built in already to SIMs?
SIMs have been advertised as secure elements for IoT systems especially on 5G IoT talks by operators.
Let’s wait for more details.
5 Comments
Tomi Engdahl says:
Hackers are exploiting a platform-agnostic flaw to track mobile phone locations
Attacks work by sending commands directly to applications stored on SIM cards.
https://arstechnica.com/information-technology/2019/09/hackers-are-exploiting-a-platform-agnostic-flaw-to-track-mobile-phone-locations/
Tomi Engdahl says:
1B Mobile Users Vulnerable to Ongoing SimJacker Surveillance Attack
https://threatpost.com/1b-mobile-users-vulnerable-to-ongoing-simjacker-surveillance-attack/148277/
More than one billion mobile users are at risk from a SIM card flaw
being currently exploited by threat actors, researchers warn.. Also:
https://www.zdnet.com/article/new-simjacker-attack-exploited-in-the-wild-to-track-users-for-at-least-two-years/
Tomi Engdahl says:
Report: https://simjacker.com/
Tomi Engdahl says:
https://www.uusiteknologia.fi/2019/09/13/kannykoiden-sim-korteissa-tietoturvaongelmia-ei-suomessa/
Tomi Engdahl says:
https://www.wired.com/story/simjacker-attack-north-korea-security-news/