More SIM Cards Vulnerable to Simjacker Attack Than Previously Disclosed

sim browser toolkit simjacker vulnerability

Remember the Simjacker vulnerability?

Earlier this month, we reported about a critical unpatched weakness in a wide range of SIM cards, which an unnamed surveillance company has actively been exploiting in the wild to remotely compromise targeted mobile phones just by sending a specially crafted SMS to their phone numbers.

If you can recall, the Simjacker vulnerability resides in a dynamic SIM toolkit, called the S@T Browser, which comes installed on a variety of SIM cards, including eSIM, provided by mobile operators in at least 30 countries.

Now, it turns out that the S@T Browser is not the only dynamic SIM toolkit that contains the Simjacker issue which can be exploited remotely from any part of the world without any authorization—regardless of which handsets or mobile operating systems victims are using.

WIB SIM ToolKit Also Leads To SimJacker Attacks

Following the Simjacker revelation, Lakatos, a researcher at Ginno Security Lab, reached out to The Hacker News earlier this week and revealed that another dynamic SIM toolkit, called Wireless Internet Browser (WIB), can also be exploited in the same way, exposing another set of hundreds of millions of mobile phones users…

http://feedproxy.google.com/~r/TheHackersNews/~3/dcj-7LYGmVA/dynamic-sim-toolkit-vulnerability.html

Leave a Reply