The Simjacker vulnerability is currently being actively exploited by a specific private company that works with governments to monitor individuals. Simjacker and its associated exploits is a huge jump in complexity and sophistication compared to attacks previously seen over mobile core networks.
The main Simjacker attack involves an SMS containing a specific type of spyware-like code being sent to a mobile phone, which then instructs the SIM Card within the phone to ‘take over’ the mobile phone to retrieve and perform sensitive commands.
The location information of thousands of devices was obtained over time without the knowledge or consent of the targeted mobile phone users.
During the attack, the user is completely unaware that they received the attack, that information was retrieved, and that it was successfully exfiltrated.
The Simjacker attack can, and has been extended further to perform additional types of attacks.
Vulnerability linked to a technology embedded on sim cards
We believe that the Simjacker vulnerability has been exploited for at least the last 2 years by a highly sophisticated threat actor in multiple countries, primarily for the purposes of surveillance. Read on to discover more about this ground-breaking attack.
Here we put the most common questions, as well as showing example demos of the Location retrieval and Browser-Opening attacks, made possible by Simjacker.
Do you want to know if attacks like Simjacker or other next generation attacks are happening in your network?
Request a meeting with the AdaptiveMobile Security Threat Intelligence Experts.