Joke Collection Website - Public benefit messages - How do hackers use the vulnerability of SIM card to steal data?

How do hackers use the vulnerability of SIM card to steal data?

According to TNW, network security researchers have warned that there is a serious loophole in the SIM card, and remote attackers can send short messages to attack the target mobile phone and monitor the victims without the user's knowledge. Dublin-based AdaptiveMobile Security Company said that the vulnerability named "Simjacker" has been exploited by a spyware vendor for at least two years, but the security company did not disclose the name of the company that exploited the vulnerability or the information of the victim.

It is said that the "Simjacker" vulnerability attack includes sending a short message to the mobile phone, which contains a specific type of code similar to spyware, and then the mobile phone will instruct the SIM card in the mobile phone to control the mobile phone, retrieve and execute sensitive commands. The vulnerability exists in the browser named S@T, which is embedded in most mobile phone SIM cards as a part of the commonly used mobile phone application toolkit (STK) for GSM, and provides value-added services for customers. After receiving the short message, the device will blindly send the message to the SIM card without checking the source of the message, and then the SIM card will run the code in the background, including the request location, IMEI number and call record.

Record. It is difficult for users to find that they have been hacked and their personal privacy has been leaked. AdaptiveMobile said that mobile operators in at least 30 countries actively use S@T browser technology, with a total of more than 654.38 billion. This means that more than 654.38 billion mobile phone users around the world may be affected. According to the researchers, attacks occur every day, and several phone numbers have been tracked hundreds of times in seven days. Although the main attack detected involves stealing the location of mobile phone users, the scope of Simjacker attacks has now expanded to fraud, fraudulent phone calls, information disclosure and denial of service attacks.

Strike, even espionage and so on. Aiming at the vulnerability of Simjacker, SIMalliance put forward new suggestions to operators to protect users' personal privacy by filtering these illegal binary short messages.