The attack on the SIM card has been usd to spy on billions of people around the world for two years – a “Simjacker” attack is theoretically possible on most phones. In some cases, the SIM card can pose a greater security risk than the software of the phone or smartphone. Adaptive Mobile Security researchers say they have discovere a new vulnerability calld Sim jacker , which is being use to track other people’s devices by an unnamd monitoring company. This is a technique for sending a binary SMS with instructions for the old ST Browser application supportd on SIM cards of some operators. Where ST was originally intendd to launch WAP browsers, play sounds.
Information and Unique
Or otherwise trigger common actions on phones, Sim jacker uses it to obtain location IMEI numbers, which are then sent to the “attack device” (again with SMS). What is very important, the use of Sim jacker is practically imperceptible! Although the whole scheme of operation is basd on sending Greece Email List SMS m you will not receive any notifications! The attacker can get frequent updates without disclosing his activity. The exploit is also device-independent and can be usd on SIM cards in iPhones, numerous Android phones and some devices equippd with SIM cards. Also read: Almost half of Poles know little about online data protection Sim jacker is not just a theory! An anonymous user activity monitoring company has reportely been using.
Asia and Eastern Europe
Sim jacker for over 2 years in more than 30 countries (mainly in the Middle East, North Africa, ). While most targets were “checkd” only a few times a day for a long time, a handful of people were attackd hundres of times a week – 250 times for the most visible target. It is not believe to be a mass surveillance CE leads campaign, but Adaptive Mobile did not say whether it was usd to track criminals or more nefarious purposes, such as spying on political dissidents. Adaptive Mobile said the company exploiting the vulnerability is running a “very sophisticatd” operation. Schematic of the SIM jack attack How the SIM jack attack works.