• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

X-Buy

World Breaking News

  • Submit
  • Disclaimers
  • About
  • DMCA
  • Privacy Policy
  • Contact

You are here: Home / New SIM card attack disclosed, similar to Simjacker

New SIM card attack disclosed, similar to Simjacker

September 27, 2019 by Leave a Comment

A team of security researchers has detailed a second SMS-based attack that can allow malicious actors to track users’ devices by abusing little-known apps that are running on SIM cards.

See also

  • 10 dangerous app vulnerabilities to watch out for (free PDF)

This new attack, named WIBattack, is identical to Simjacker, an attack disclosed at the start of the month by mobile security firm AdaptiveMobile.

Both attacks work in the same way, and they grant access to similar commands, with the exception that they target different apps running on the SIM cards.

Mainly, Simjacker runs commands against the [email protected] Browser app, while WIBattack sends commands to the Wireless Internet Browser (WIB) app.

Both are Java applets that mobile telcos install on SIM cards they provide to their customers. The purpose of these apps is to allow remote management for customer devices and their mobile subscriptions.

WIBattack

In a report released earlier this month, AdaptiveMobile said it discovered that a “private company that works with governments” was using rogue commands sent to [email protected] Browser apps running on SIM cards to track individuals.

In a report published last weekend, security researchers from Ginno Security Labs said that the WIB app was also vulnerable to similar attacks, although they were not aware of any attacks.

In the case of both [email protected] and WIB apps, attackers can send a specially formatted binary SMS (called an OTA SMS) that will execute STK (SIM Toolkit) instructions on SIM cards on which telcos did not enable special security features.

The commands supported on the WIB app are about the same ones supported by the [email protected] Browser, which are:

  • Get location data
  • Start call
  • Send SMS
  • Send SS requests
  • Send USSD requests
  • Launch internet browser with a specific URL
  • Display text on the device
  • Play a tone

Just like the Simjacker attack, Ginno Security Labs researchers say this attack vector can also be abused to track users. If used by a skilled attacker, they can allow a threat actor to track a victim’s location or start phone calls and listen to nearby conversations.

Researchers said they discovered the WIBattack back in 2015 when they also found the Simjacker attack (which they called [email protected]) but did no go pubic with their findings.

They estimated the number of devices running SIM cards with a WIB app at “hundreds of millions.”

Scary numbers don’t hold water

But the estimations that Simjacker and WIBattack impact hundreds of millions of SIM cards may not be accurate, according to a report ZDNet received this week from SRLabs.

The SRLabs team, a well-known expert in the field of mobile and telco security, previously developed two apps named SIMTester and SnoopSnitch.

The first is a desktop app that users can install and test their SIM cards for security flaws. The second is an Android app that runs on rooted devices with Qualcomm chipsets and which can test smartphones for various SIM, mobile network, and OS security flaws.

Researchers used telemetry from both apps to investigate the breadth of the Simjacker and WIBattack vulnerabilities.

In total, they received data from 800 SIM card tests via the SIMTest app, from all over the world. The results revealed that most mobile telcos don’t ship the [email protected] and WIB applets anymore.

  • 9.4% of the tested SIMs have the [email protected] applet installed
  • A subset of 5.6% are vulnerable to Simjacker, because their protection level was set to zero
  • 10.7% have the WIB applet installed
  • A subset of 3.5% are vulnerable to a Simjacker-style attack against the WIB applet
  • In total, 9.1% of tested SIM cards were vulnerable to attacks against either [email protected] or WIB

Furthermore, data from more than 500,000 SnoopSnitch users revealed that only a very small number of users received OTA SMS messages, like the ones needed to exploit Simjacker and WIBattack.

  • We received reports from 8 users about 29 OTA SMS targeting the [email protected] applet
  • The first message was reported in 2016
  • Most of the messages targeted users in Latin and South America

These results mean that most users today are safe from these threats, which confirms private conversations that this reporter had with mobile security experts, who said that only a handful of mobile providers across the world ship SIM cards with the two apps, mostly located in the MENA, Eastern Europe, and Latin America regions.

Not a dangerous attack, when compared to others

Users who are curious to see if their phones’ SIM card runs the [email protected] or WIB apps can install and run the SIMTest app.

But even if the two SIM card apps are installed, the SRLabs team said it does not automatically mean the SIM card is vulnerable. To be vulnerable and exploitable, attackers would need to have the ability to send OTA SMS messages to the two apps, something that telcos can block by enabling security features on the two SIM card apps.

Unless [email protected] and WIB have a minimum security level (MSL) index of 0, the innate security feature present in the two apps should prevent random strangers from sending binary OTA SMS messages that trigger hidden command executions.

Karsten Nohl, a security researcher with SRLabs, also called for calm in an interview with ZDNet this week.

“In the context of mobile network hacks, Simjacker would appear less attractive to criminals than SS7 attacks or social engineering such as SIM swapping,” he said.

“While SS7 hacks and SIM swaps are reported in large numbers, Simjacker attacks seem to appear only anecdotally in comparison.”

In other words, you’re more vulnerable to your mobile telco’s employees assiginign your phone number to a hacker, rather than being bombarded with shady OTA SMS messages.

10 best smartphones not made in China SEE FULL GALLERY
1 – 5 of 10

NEXT PREV

Security

  • Dear network operators, please use the existing tools to fix security
  • Massive wave of account hijacks hits YouTube creators
  • Apple neutered ad blockers in Safari, but unlike Chrome, users didn’t say a thing
  • GDPR one year later: The challenges organizations still face (ZDNet YouTube)
  • The best DIY home security systems of 2019 (CNET)
  • Governments still struggling to contend with weaponized social media platforms (TechRepublic)

  • 3 Reasons Why a Global SIM Card Will Boost Business Cash Flow
  • Prepaid International SIM Cards Are Great For the Regular Traveler
  • The Perfect Phone SIM Card For Those Who Travel a Lot
  • A Roaming SIM Card is a Must Have Accessory For the Truly Global Business Person
  • What Are International SIM Cards?
  • International SIM Cards - What to Look For When Purchasing One
  • Buying a Roaming SIM Card and Other Top Budget International Travel Tips
  • New Credit Card Laws - Interest Rates
  • New Credit Card Laws (2009) And Students
  • New Credit Card Rules - Will This Bring Relief to Consumers?

Filed Under: Security prepaid sim card 2 weeks, 3 prepaid sim card, 3 prepaid sim card europe, 3 prepaid sim card ireland, 3 prepaid sim card australia, 3 prepaid sim card top up, prepaid sim card iphone 4, prepaid sim card iphone 5, prepaid sim card iphone 6, prepaid sim card japan 7 days, which prepaid sim card is the best in singapore, best prepaid sim card malaysia, best prepaid sim card philippines, global sim card for travellers, global sim card for canada, mytel register sim card, mytel sim card register online, phones dual sim card, ipad at&t sim card, why clone a sim card, giffgaff lost sim card keep number, sims 4 attacked by spiders, new gwent cards, how to insert sim card, how to insert a sim card, iphone 5s sim card removal, chase freedom activate new card, new idea sim offers

Primary Sidebar

RSS Recent Stories

  • Intel: We Aren’t Stepping Back to 22nm Haswell; We Never Left
  • Silicon Lottery’s Binned Ryzen 9 3950X Chips Start At $850, Stretch to $1,299
  • Meet CIMON-2: The floating A.I. brain that lives on the ISS
  • Denon unveils Denon Home: Three new wireless multiroom speakers
  • SF’s curb on tech tests in public spaces could scupper pogo-stick plan
Copyright © 2019 X-Buy. Power by Wordpress.