A team of security researchers has detailed a second SMS-based attack that can allow malicious actors to track users’ devices by abusing little-known apps that are running on SIM cards. See also 10 dangerous app vulnerabilities to watch out for (free PDF) This new attack, named WIBattack, is identical to Simjacker, an attack disclosed at the start of the month by mobile security firm AdaptiveMobile.Both attacks work in the same way, and they grant access to similar commands, with the exception that they target different apps running on the SIM cards.Mainly, Simjacker runs commands against the [email protected] Browser app, while WIBattack sends commands to the Wireless Internet Browser (WIB) app.Both are Java applets that mobile telcos install on SIM cards they provide to their customers. The purpose of these apps is to allow remote management for customer devices and their mobile subscriptions.WIBattack In a report released earlier this month, AdaptiveMobile said it discovered that a “private company that works with governments” was using rogue commands sent to [email protected] Browser apps running on SIM cards to track individuals.In a report published last weekend, security researchers from Ginno Security Labs said that the WIB app was also vulnerable to similar attacks, although… Read full this story
- Prepaid Global Roaming Sim Card
- Pre-paid SIM Card for Fiji
- Pre-repaid SIM Card Kenya
- Pre-paid SIM Card for Norway
- Pre-paid SIM Card for the Philippines
- Can I Buy SIM Cards Overseas When I Get There?
- Pre-paid SIM Cards for Estonia
- Pre-paid SIM Card Lithuania
- Pre-paid SIM Card for Malaysia
- Italy SIM Card
New SIM card attack disclosed, similar to Simjacker have 266 words, post on www.zdnet.com at September 27, 2019. This is cached page on X-Buy. If you want remove this page, please contact us.