Skip to main content

Ugandans, You Better Pay Attention.More SIM Cards Vulnerable to Simjacker Attack Than Previously Disclosed.


Remember the Simjacker vulnerability?

Earlier this month, we reported about a critical unpatched weakness in a wide range of SIM cards, which an unnamed surveillance company has actively been exploiting in the wild to remotely compromise targeted mobile phones just by sending a specially crafted SMS to their phone numbers.

If you can recall, the Simjacker vulnerability resides in a dynamic SIM toolkit, called the S@T Browser, which comes installed on a variety of SIM cards, including eSIM, provided by mobile operators in at least 30 countries.


Now, it turns out that the S@T Browser is not the only dynamic SIM toolkit that contains the Simjacker issue which can be exploited remotely from any part of the world without any authorization—regardless of which handsets or mobile operating systems victims are using.

WIB SIM ToolKit Also Leads To SimJacker Attacks.

Following the Simjacker revelation, Lakatos, a researcher at Ginno Security Lab, reached out to The Hacker News earlier this week and revealed that another dynamic SIM toolkit, called Wireless Internet Browser (WIB), can also be exploited in the same way, exposing another set of hundreds of millions of mobile phones users to remote hackers.


Lakatos Said that he discovered this vulnerability back in 2015 but decided not to disclose it publicly until now because the process to patch such a flaw is complex and most importantly, can be abused by "bad guys to control phones running vulnerable SIMs remotely."

Besides this, Lakatos also claimed that he independently discovered S@T Browser as well and also provided a video demonstration of the Simjacker vulnerability with more details that have not yet been published by AdaptiveMobile Security researchers who initially disclosed the issue earlier this month.

Web Application Firewall

WIB toolkit is created and maintained by SmartTrust, one of the leading companies that offer SIM toolkit-based browsing solutions to more than 200 mobile operators worldwide, and, according to some press releases, the list includes AT&T, Claro, Etisalat, KPN, TMobile, Telenor, and Vodafone.

WIB and S@T Browsers Flaw Could Lets Attackers Target Mass Users

Just like the S@T Browser, WIB toolkit has also been designed to allow mobile carriers to provide some essential services, subscriptions, and value-added services over-the-air to their customers or change core network settings on their devices.


Instead of a pre-fixed installed menu, having a dynamic toolkit on the SIMs allows mobile operators to generate new features and options on the fly based on information provided by a central server.

"OTA is based on client/server architecture where at one end there is an operator back-end system (customer care, billing system, application server…) and at the other end there is a SIM card," the researcher explained in a blog post.


The flaw in both S@T and WIB Browsers can be exploited to perform several tasks on a targeted device just by sending an SMS containing a specific type of spyware-like code.

Retrieving targeted device' location and IMEI information,

Sending fake messages on behalf of victims,

Distributing malware by launching victim's phone browser and forcing it to open a malicious web page,

Performing premium-rate scams by dialing premium-rate numbers,

Spying on victims' surroundings by instructing the device to call the attacker's phone number,

Performing denial of service attacks by disabling the SIM card, and

Retrieving other information like language, radio type, battery level, etc.


How Does SimJacker Attack Work Against WIB or S@T Enabled SIMs?

Simjacker vulnerability

As practically demonstrated in the video and illustrated in the above diagram that Lakatos shared, both Simjacker and WIBattack attacks can be summarized in four following steps:

Step 1 — Attackers send a malicious OTA SMS to the victim's phone number containing an S@T or WIB command such as SETUP CALL, SEND SMS, or PROVIDE LOCATION INFO.

Step 2 — Once received, the victim's mobile operating system forwards this command to the S@T or WIB browser installed on the SIM card, without raising an alert or indicating the user about the incoming message.

Step 3 — The targeted browser then instructs the victim's mobile operating system to follow the command.

Step 4 — The victim's mobile OS then performs the corresponding actions.

Lakatos says he also reported his findings to the GSM Association (GSMA), a trade body that represents the interests of mobile operators worldwide.


The telecom industry needs urgent countermeasures to prevent Simjacker, WIBattack, and other evolving threats to protect billions of mobile phone users worldwide.

How to Detect Simjacker Attacks?

Detect Simjacker Attack

Meanwhile, the researcher also told The Hacker News that he is working on a mobile phone app, to be released soon, that would allow users to scan their SIM cards to detect if it's vulnerable to Simjacker vulnerability or not.

Developed by researchers at SRLabs, there's another Android app, called SnoopSnitch, which can detect attacks based on suspicious binary SMS including Simjacker and alert users of it.

You can download SnoopSnitch from Google Play Store, but you need to have a rooted Android smartphone with a Qualcomm chipset for the SMS attack alerting feature to work.

We also reached out to AdaptiveMobile Security firm for a comment but have not heard back from them yet.











Comments

Popular posts from this blog

Vurra Constituency MP Adriko Yovan gets six months imprisonment for failing to repay loan.

📸: Hon Adriko Yovan. Story By Andrew Cohen Amvesi. ARUA . Yovan Adriko, the Vurra County Member of Parliament (MP) in Arua district has been committed to six months civil prison for failing to clear debts amounting to shs55,677,400. Adriko was on Thursday evening sent to Arua government prison to serve six months shortly after his arrest at Slumberland hotel in Arua City. MP Adriko warrant of committal judgement debtor to jail. Paul Mawa of T/A Vitality Associates, the court bailiff assigned to arrest the MP, duped him to come and pick some money for a land transaction at Slumberland hotel where he picked him like a baby after a long hunt. Adriko was immediately arraigned before Her Worship Karungi Leo, the Deputy Registrar of Arua High Court who later committed him to imprisonment not exceeding six months. Part of Adriko’s warrant of arrest issued b court Adriko was sent to the coolers for failing to clear shs48m which is the princip

Arrested Arua City Officials Taken to Kampala this Night.

Wednesday 8-November-2023. 📸: The arrest of Arua City Physical Planner Mr Findru Moses on 6-Nov-2023 at around 2pm. 📸: Mr Jobile Cornelius the City Deputy town clerk who was arrested on 7-Nov-2023 at around 4pm. 📸: Mrs Lillian Aleni (in red cloth) and Mr Edoni Benard being handcuffed by police officer on 6-Nov-2023 at around 6pm. The bail that was to be issued last night 8pm 7-Nov-2023 to release the arrested City Deputy town clerk Mr Jobile Cornelius and CFO Mr Sam Adriko over mismanagement of government properties and monies was canceled, and by this time of the night 11pm, highly placed sources leaked that, all the arrested suspects (Mr Findru Moses the Arua City Physical Planner, Mr Jobile Cornelius the Deputy City clerk, Mr Adriko Sam the CFO, Mr Edoni Benard the PDM BOG Chairperson for Pangisa ward and Mrs Lillian Aleni the parish chief for Pangisa ward) are being transported by State House Anti-corruption Unit officers who will soon be reac

Wedded Ayivu West MP Lematia John Fights Over Another Woman.

  📸: Hon Lematia John. By URN. Police in Arua district are investigating a case of assault and threatening violence involving the Member of Parliament for Ayivu West Constituency John Lematia and James Ariko, a DSTV technician in Arua city. Drama ensued on Easter Sunday 31-3-2024 at Dream Land Hotel located at Kuluva trading center along Arua-Nebbi highway in Arua district when the legislator and the technician engaged in a fight reportedly over a woman identified as Faith Eyotaru 25, a relationship officer at Victoria University Kampala. The scuffle started after Ayivu West Mp John Lematia went to swim at Dreamland Hotel with Faith Eyotaru only to find Ariko, who had gone to the same hotel earlier. However, upon seeing the duo coming out of the vehicle, Ariko confronted Lematia with both men claiming to be having a relationship with the lady. It took the intervention of the staff at the hotel who intervened and separated the fight between the men. Josephine Angucia, the West Nile re