YOU ARE AT:Devices'Major wake-up call': SIM vulnerability targets mobile users for surveillance

‘Major wake-up call’: SIM vulnerability targets mobile users for surveillance

Researchers at AdaptiveMobile Security say that they have uncovered a SIM-based smartphone vulnerability used for targeted surveillance which has been expanded to use for fraud, scam calls and other uses by hackers.

Dubbed Simjacker, AdaptiveMobile Security said that the vulnerability represents “a huge jump in complexity and sophistication compared to attacks previously seen over mobile core networks.”

“Simjacker represents a clear danger to the mobile operators and subscribers. This is potentially the most sophisticated attack ever seen over core mobile networks. It’s a major wake-up call that shows hostile actors are investing heavily in increasingly complex and creative ways to undermine network security,” said Cathal McDaid, CTO of AdaptiveMobile Security. “This compromises the security and trust of customers, mobile operators and impacts the national security of entire countries.”

Simjacker works via an SMS with “spyware-like code” being sent to a mobile phone, which instructs the device’s SIM card to take over the device and retrieve sensitive commands. In theory, at least, any smartphone that has a SIM card is vulnerable.

AdaptiveMobile said that location information from “thousands of devices” was obtained over time, and that affected users are completely unaware of what is happening. The primary attack has revolved around retrieving location information, and AdaptiveMobile said that it is “quite confident that this exploit has been developed by a specific private company that works with governments to monitor individuals.” But AdaptiveMobile said that the Simjacker mechanism “has been further exploited to perform many other types of attacks against individuals and mobile operators such as fraud, scam calls, information leakage, denial of service and espionage” and that its analysts have observed hackers varying their attacks to test those capabilities.

McDaid said that Simjacker has been successful because it “took advantage of a combination of complex interfaces and obscure technologies, showing that mobile operators cannot rely on standard established defenses. Now that this vulnerability has been revealed, we fully expect the exploit authors and other malicious actors will try to evolve these attacks into other areas”.

ABOUT AUTHOR

Kelly Hill
Kelly Hill
Kelly reports on network test and measurement, as well as the use of big data and analytics. She first covered the wireless industry for RCR Wireless News in 2005, focusing on carriers and mobile virtual network operators, then took a few years’ hiatus and returned to RCR Wireless News to write about heterogeneous networks and network infrastructure. Kelly is an Ohio native with a masters degree in journalism from the University of California, Berkeley, where she focused on science writing and multimedia. She has written for the San Francisco Chronicle, The Oregonian and The Canton Repository. Follow her on Twitter: @khillrcr