sim browser toolkit simjacker vulnerability

Remember the Simjacker vulnerability?

Earlier this month, we reported about a critical unpatched weakness in a wide range of SIM cards, which an unnamed surveillance company has actively been exploiting in the wild to remotely compromise targeted mobile phones just by sending a specially crafted SMS to their phone numbers.

If you can recall, the Simjacker vulnerability resides in a dynamic SIM toolkit, called the S@T Browser, which comes installed on a variety of SIM cards, including eSIM, provided by mobile operators in at least 30 countries.

Now, it turns out that the S@T Browser is not the only dynamic SIM toolkit that contains the Simjacker issue which can be exploited remotely from any part of the world without any authorization—regardless of which handsets or mobile operating systems victims are using.

WIB SIM ToolKit Also Leads To SimJacker Attacks

Following the Simjacker revelation, Lakatos, a researcher at Ginno Security Lab, reached out to The Hacker News earlier this week and revealed that another dynamic SIM toolkit, called Wireless Internet Browser (WIB), can also be exploited in the same way, exposing another set of hundreds of millions of mobile phones users…

http://feedproxy.google.com/~r/TheHackersNews/~3/dcj-7LYGmVA/dynamic-sim-toolkit-vulnerability.html

About Author
Edvis
View All Articles
Check latest article from this author !
Mark Zuckerberg Sparks Controversy Over Lauren Sanchez Post
TCL’s 75-inch smart TV now over $1,000 off
Value of Trump and Melania Meme Coins

Leave a Reply

Related Posts