![]() ![]() Its a major wake-up call that shows hostile actors are investing heavily in increasingly complex and creative ways to undermine network security. This is potentially the most sophisticated attack ever seen over core mobile networks, said Cathal McDaid, CTO, AdaptiveMobile Security in a press release. ![]() Simjacker represents a clear danger to the mobile operators and subscribers. This is because it contains a list of instructions that the SIM card is to execute.Īccording to the researchers, all manufacturers and mobile phone models are vulnerable to the SimJacker attack as the vulnerability exploits a legacy technology embedded on SIM cards, whose specification has not been updated since 2009, potentially putting over a billion people at risk. This attack is also unique, in that the Simjacker Attack Message could logically be classified as carrying a complete malware payload, specifically spyware. Since ST Browser contains a series of STK instructionssuch as send short message, setup call, launch browser, provide local data, run at command, and send datathat can be triggered just by sending an SMS to a device, the software offers an execution environment to run malicious commands on mobile phones as well. ST Browser, short for SIMalliance Toolbox Browser, is an application that comes installed on a variety of SIM cards, including eSIM, as part of SIM Tool Kit (STK) and has been designed to let mobile carriers provide some basic services, subscriptions, and value-added services over-the-air to their customers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |