Joke Collection Website - Public benefit messages - How do hackers use the vulnerability of SIM card to steal data?
How do hackers use the vulnerability of SIM card to steal data?
It is said that the "Simjacker" vulnerability attack includes sending a short message to the mobile phone, which contains a specific type of code similar to spyware, and then the mobile phone will instruct the SIM card in the mobile phone to control the mobile phone, retrieve and execute sensitive commands. The vulnerability exists in the browser named S@T, which is embedded in most mobile phone SIM cards as a part of the commonly used mobile phone application toolkit (STK) for GSM, and provides value-added services for customers. After receiving the short message, the device will blindly send the message to the SIM card without checking the source of the message, and then the SIM card will run the code in the background, including the request location, IMEI number and call record.
Record. It is difficult for users to find that they have been hacked and their personal privacy has been leaked. AdaptiveMobile said that mobile operators in at least 30 countries actively use S@T browser technology, with a total of more than 654.38 billion. This means that more than 654.38 billion mobile phone users around the world may be affected. According to the researchers, attacks occur every day, and several phone numbers have been tracked hundreds of times in seven days. Although the main attack detected involves stealing the location of mobile phone users, the scope of Simjacker attacks has now expanded to fraud, fraudulent phone calls, information disclosure and denial of service attacks.
Strike, even espionage and so on. Aiming at the vulnerability of Simjacker, SIMalliance put forward new suggestions to operators to protect users' personal privacy by filtering these illegal binary short messages.
- Related articles
- Master of the Demon Realm enters. I want to know how to deal with the 91 card and how to change the magic stone.
- Apple sharks cannot be distributed.
- How to save the Samsung 7 100youni SMS reception to the mobile phone?
- Couples quarrel, and the man doesn't send text messages for four days.
- What should I do if there is no information in the volunteer form of the membership card in the Smart Alliance?
- How to send text messages from virtual numbers?
- Apple ringtone library band
- Do you have a schematic diagram of an electric car alarm? How to connect the external wiring?
- How much is the post salary of fourth-grade teachers in Anhui?
- What about Meizu M8 in all aspects? The gunman is dead.