May 30, 2023
  • About
  • Contact Us
  • Greek (Greece)
  • English (UK)
ID-on't renounce my freedomID-on't renounce my freedom
  • Articles
    • Privacy
      • General Privacy Issues
      • Social Μedia
      • Data Mining
      • Data Brokers
      • Data Leaks - Hackers
      • Surveilance
      • Face Recognition
    • e- Government
      • General e-Government Issues
      • Citizen Card
      • Social Credit
    • Artificial Intelligence
      • General Artificial Intelligence Issues
      • Man Machine Interface
      • Robots
      • Superhumanism and Rehumanism
    • Economy
      • Cashless Society
    • Legal Issues
      • Legal News
    • Technologies
      • Bar Code
      • RFID
      • NFC
      • Electronic Implants
      • Cryptography
  • Blog
  • Videos
  • Books
  • Laws
  • You are here:  
  • Home
  • Articles
  • Privacy
  • New Simjacker vulnerability exploited by surveillance companies for espionage operation

New Simjacker vulnerability exploited by surveillance companies for espionage operation

AdaptiveMobile Security
Privacy
21 September 2019
Hits: 1033
  • Print
  • Email

simjacker 01

 
AdaptiveMobile Security have uncovered a new and previously undetected vulnerability and associated exploits, called Simjacker. This vulnerability is currently being actively exploited by a specific private company that works with governments to monitor inpiduals. Simjacker and its associated exploits is a huge jump in complexity and sophistication compared to attacks previously seen over mobile core networks. The main Simjacker attack involves an SMS containing a specific type of spyware-like code being sent to a mobile phone, which then instructs the SIM Card within the phone to ‘take over’ the mobile phone to retrieve and perform sensitive commands. The location information of thousands of devices was obtained over time without the knowledge or consent of the targeted mobile phone users. During the attack, the user is completely unaware that they received the attack, that information was retrieved, and that it was successfully exfiltrated. However the Simjacker attack can, and has been extended further to perform additional types of attacks.

Example of how Simjacker can track mobile phone location of vulnerable subscribers

simjacker 02


The Scale of the Simjacker Vulnerability and Attacks

Simjacker has been further exploited to perform many other types of attacks against inpiduals and mobile operators such as fraud, scam calls, information leakage, denial of service and espionage. AdaptiveMobile Security Threat Intelligence analysts observed the hackers vary their attacks, testing many of these further exploits. In theory, all makes and models of mobile phone are open to attack as the vulnerability is linked to a technology embedded on SIM cards. The Simjacker vulnerability could extend to over 1 billion mobile phone users globally, potentially impacting countries in the Americas, West Africa, Europe, Middle East and indeed any region of the world where this SIM card technology is in use.


Stopping the attacks and building long-term defences

We are quite confident that this exploit has been developed by a specific private company that works with governments to monitor inpiduals. AdaptiveMobile Security has been working closely with their customers and the wider industry; including both mobile network operators and SIM card manufacturers to protect mobile phone subscribers. We have blocked attacks and are committed to using our global threat intelligence to build defences against these new sophisticated attacks that are circumventing current security measures.

 

Source: simjacker.com/

 

Tags: Data Leaks - Hackers
  • Prev
  • Next

Follow Us

  • RSS Subscribe us on News
  • Facebook Like us on Facebook
  • Twitter Follow us on Twitter
  • Youtube Subscribe on Youtube

Popular Articles

300 million jobs could be affected by latest wave of…

Apr 05, 2023 Artificial Intelligence

  • What Is a Central Bank Digital Currency (CBDC)?

    Economy
    May 12, 2023
  • Meta Joins Generative AI Race, Will Begin Testing AI-Powered Ads…

    Artificial Intelligence
    May 16, 2023
  • Here are the 7 biggest revelations from the US leaks…

    Privacy
    Apr 12, 2023
  • U.S. Marshals Service suffers 'major' security breach that compromises sensitive…

    Privacy
    Mar 05, 2023
  • Musk and experts call for halt in 'giant AI experiments'

    Artificial Intelligence
    Mar 29, 2023
  • Elon Musk says that A.I. ‘humanoid robots’ will eventually outnumber…

    Artificial Intelligence
    Mar 12, 2023
  • Elon Musk's Neuralink wins FDA approval for human study of…

    Technologies
    May 28, 2023
  • ChatGPT Introduces Next Level of Satellite Surveillance

    Artificial Intelligence
    May 22, 2023
footer-logo.png

The 'ID-on't renounce my freedom' website contains articles and news related to the growing threat to our personal freedom and privacy.

  info@id-ont.org

© 2019 ID-on't renounce my freedom | Designed by Privacy Team
  • Privacy
  • Site Terms
  • Contact Us
  • Home
  • Articles
    • Privacy
    • e- Government
    • Artificial Intelligence
    • Economy
    • Legal Issues
    • Technologies
  • Blog
  • Videos
  • Books
  • Laws