Skip to main content

Ugandans, You Better Pay Attention.More SIM Cards Vulnerable to Simjacker Attack Than Previously Disclosed.


Remember the Simjacker vulnerability?

Earlier this month, we reported about a critical unpatched weakness in a wide range of SIM cards, which an unnamed surveillance company has actively been exploiting in the wild to remotely compromise targeted mobile phones just by sending a specially crafted SMS to their phone numbers.

If you can recall, the Simjacker vulnerability resides in a dynamic SIM toolkit, called the S@T Browser, which comes installed on a variety of SIM cards, including eSIM, provided by mobile operators in at least 30 countries.


Now, it turns out that the S@T Browser is not the only dynamic SIM toolkit that contains the Simjacker issue which can be exploited remotely from any part of the world without any authorization—regardless of which handsets or mobile operating systems victims are using.

WIB SIM ToolKit Also Leads To SimJacker Attacks.

Following the Simjacker revelation, Lakatos, a researcher at Ginno Security Lab, reached out to The Hacker News earlier this week and revealed that another dynamic SIM toolkit, called Wireless Internet Browser (WIB), can also be exploited in the same way, exposing another set of hundreds of millions of mobile phones users to remote hackers.


Lakatos Said that he discovered this vulnerability back in 2015 but decided not to disclose it publicly until now because the process to patch such a flaw is complex and most importantly, can be abused by "bad guys to control phones running vulnerable SIMs remotely."

Besides this, Lakatos also claimed that he independently discovered S@T Browser as well and also provided a video demonstration of the Simjacker vulnerability with more details that have not yet been published by AdaptiveMobile Security researchers who initially disclosed the issue earlier this month.

Web Application Firewall

WIB toolkit is created and maintained by SmartTrust, one of the leading companies that offer SIM toolkit-based browsing solutions to more than 200 mobile operators worldwide, and, according to some press releases, the list includes AT&T, Claro, Etisalat, KPN, TMobile, Telenor, and Vodafone.

WIB and S@T Browsers Flaw Could Lets Attackers Target Mass Users

Just like the S@T Browser, WIB toolkit has also been designed to allow mobile carriers to provide some essential services, subscriptions, and value-added services over-the-air to their customers or change core network settings on their devices.


Instead of a pre-fixed installed menu, having a dynamic toolkit on the SIMs allows mobile operators to generate new features and options on the fly based on information provided by a central server.

"OTA is based on client/server architecture where at one end there is an operator back-end system (customer care, billing system, application server…) and at the other end there is a SIM card," the researcher explained in a blog post.


The flaw in both S@T and WIB Browsers can be exploited to perform several tasks on a targeted device just by sending an SMS containing a specific type of spyware-like code.

Retrieving targeted device' location and IMEI information,

Sending fake messages on behalf of victims,

Distributing malware by launching victim's phone browser and forcing it to open a malicious web page,

Performing premium-rate scams by dialing premium-rate numbers,

Spying on victims' surroundings by instructing the device to call the attacker's phone number,

Performing denial of service attacks by disabling the SIM card, and

Retrieving other information like language, radio type, battery level, etc.


How Does SimJacker Attack Work Against WIB or S@T Enabled SIMs?

Simjacker vulnerability

As practically demonstrated in the video and illustrated in the above diagram that Lakatos shared, both Simjacker and WIBattack attacks can be summarized in four following steps:

Step 1 — Attackers send a malicious OTA SMS to the victim's phone number containing an S@T or WIB command such as SETUP CALL, SEND SMS, or PROVIDE LOCATION INFO.

Step 2 — Once received, the victim's mobile operating system forwards this command to the S@T or WIB browser installed on the SIM card, without raising an alert or indicating the user about the incoming message.

Step 3 — The targeted browser then instructs the victim's mobile operating system to follow the command.

Step 4 — The victim's mobile OS then performs the corresponding actions.

Lakatos says he also reported his findings to the GSM Association (GSMA), a trade body that represents the interests of mobile operators worldwide.


The telecom industry needs urgent countermeasures to prevent Simjacker, WIBattack, and other evolving threats to protect billions of mobile phone users worldwide.

How to Detect Simjacker Attacks?

Detect Simjacker Attack

Meanwhile, the researcher also told The Hacker News that he is working on a mobile phone app, to be released soon, that would allow users to scan their SIM cards to detect if it's vulnerable to Simjacker vulnerability or not.

Developed by researchers at SRLabs, there's another Android app, called SnoopSnitch, which can detect attacks based on suspicious binary SMS including Simjacker and alert users of it.

You can download SnoopSnitch from Google Play Store, but you need to have a rooted Android smartphone with a Qualcomm chipset for the SMS attack alerting feature to work.

We also reached out to AdaptiveMobile Security firm for a comment but have not heard back from them yet.











Comments

Popular posts from this blog

Escaped Murder Suspect Finally Arrested in Yumbe Regional Referral Hospital, Yumbe District.

Story by Osuta Yusuf. 19-November-2024. 📸: Eyotre Kennedy handcuffed on bed while receiving medication this morning at Yumbe Regional Referral Hospital in Yumbe District. Eyotre Kennedy originating from Etoko village, Nyoroo Parish, Nyadri Sub-county in Maracha District who has for many years been terrorizing residents in his village, has finally been arrested this Monday morning 19-November-2024 while receiving treatment at Yumbe Regional Referral Hospital in Yumbe District following injuries he sustained from Theft mission on Saturday night 16-November-2024 in Owapi village, Azapi parish in Odupi Sub-county, Terego East Constituency in Terego District. Click here on the link  https://informationispowah.blogspot.com/2024/11/fugitive-who-chopped-3-people-killed.html   to read the story on his Theft of Goats in Terego. Upon getting cut on the finger and leg by the Mob as he attempted to fight and overpower owner of the goats he attempted to steal on Saturday night ...

41-Years-Old Man Digs His Own Grave in Maracha District.

Story by Osuta Yusuf.  Maracha District.  📸: The grave been dug by Mr Opiga Michael, a victim of frustration. Photo taken by Osuta Yusuf , on Wednesday 11-September-2024. The residents of Ebapi village, Baria Parish in Nyadri Sub-county, Maracha east constituency, Maracha District are in shock after a 41 year old man started digging his own grave. The man, identified as Mr Opiga Michael, who seems to be frustrated over some challenges in life, started digging his own grave on Tuesday 10-September-2024 until he was stopped by the elders in Nyaria clan. 📸: Opiga Michael, the Victim of Frustration. Photo by Osuta Yusuf , Information is Power. While speaking to our reporter on Wednesday evening 11-September-2024, Mr Opiga Michael, said, his main plan  was to commit suicide after finishing digging the grave for burying himself, explained that, he feels frustrated, abandoned and hated by his own clan people, whom he accused of piling lies against him a...

Wedded Ayivu West MP Lematia John Fights Over Another Woman.

  📸: Hon Lematia John. By URN. Police in Arua district are investigating a case of assault and threatening violence involving the Member of Parliament for Ayivu West Constituency John Lematia and James Ariko, a DSTV technician in Arua city. Drama ensued on Easter Sunday 31-3-2024 at Dream Land Hotel located at Kuluva trading center along Arua-Nebbi highway in Arua district when the legislator and the technician engaged in a fight reportedly over a woman identified as Faith Eyotaru 25, a relationship officer at Victoria University Kampala. The scuffle started after Ayivu West Mp John Lematia went to swim at Dreamland Hotel with Faith Eyotaru only to find Ariko, who had gone to the same hotel earlier. However, upon seeing the duo coming out of the vehicle, Ariko confronted Lematia with both men claiming to be having a relationship with the lady. It took the intervention of the staff at the hotel who intervened and separated the fight between the men. Josephine Angucia, the West Nil...