Simjacker attack could affect a billion smartphones

(Image credit: Shutterstock)

A new SIM card flaw has been discovered by security researchers who say that more than a billion smartphones could be at risk as threat actors are currently exploiting it in the wild.

The vulnerability, called Simjacker, was found in mobile SIM cards by researchers at AdaptiveMobile Security and it is being used to track user's locations, intercept calls and more all by sending an SMS message to a victim's smartphone.

The researchers released a blog post in which they disclosed the vulnerability and explained that Simjacker has been exploited by a private company over the past two years, saying:

  • SIM hijacking and the flaws of traditional two-factor authentication

“This vulnerability is currently being actively exploited by a specific private company that works with governments to monitor individuals. Simjacker and its associated exploits is a huge jump in complexity and sophistication compared to attacks previously seen over mobile core networks. The main Simjacker attack involves an SMS containing a specific type of spyware-like code being sent to a mobile phone, which then instructs the SIM Card within the phone to ‘take over’ the mobile phone to retrieve and perform sensitive commands.”

Simjacker

Simjacker has already been used to launch attacks against individuals and telecoms including fraud, scam calls, information leakage, denial of service and espionage. Since the vulnerability is linked to a technology embedded on SIM cards and not to a particular device, it has the potential to affect every smartphone which uses a SIM card regardless of the make or model.

The attack itself stems from a technology built in to SIM cards called S@T Browser which stands for SIMalliance Toolbox Browser. Although the technology is generally used for browsing through a SIM card, it can also be used for a number of functions such as opening a browser, setting up calls, playing a ring tone and more. Once a threat actor has used Simjacker to have a smartphone open a browser, they can even instruct the targeted device to open known malicious sites to infect the device with malware.

AdaptiveMobile Security has not yet named the group which has been exploiting the Simjacker vulnerability in the wild though they did provide more details on who they think it might be, saying:

“We can say with a high degree of certainty, that the source is a large professional surveillance company, with very sophisticated abilities in both signaling and handsets.” 

The researchers have submitted details on the exploit to GSMA and they promise to continue investigating how the attacks function while looking for other variants of Simjacker exploits.

Via Threat Post

TOPICS
Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Latest in Security
healthcare
Software bug meant NHS information was potentially “vulnerable to hackers”
A hacker wearing a hoodie sitting at a computer, his face hidden.
Experts warn this critical PHP vulnerability could be set to become a global problem
botnet
YouTubers targeted by blackmail campaign to promote malware on their channels
A close-up of a phone screen showing the Telegram, Signal and WhatsApp apps
Agentic AI has “profound” issues with security and privacy, Signal President says
botnet
Another top security camera maker is seeing devices hijacked into botnet
Bluetooth
Top Bluetooth chip security flaw could put a billion devices at risk worldwide
Latest in News
Lego Mario Kart – Mario & Standard Kart set on a shelf.
Lego just celebrated Mario Day in the best way possible, with an incredible Mario Kart set that's up for preorder now
TCL QM7K TV on orange background
TCL’s big, bright new mid-range mini-LED TVs have built-in Bang & Olufsen sound
Homepage of Manus, a new Chinese artificial intelligence agent capable of handling complex, real-world tasks, is seen on the screen of an iPhone.
Manus AI may be the new DeepSeek, but initial users report problems
Google Maps
Nightmare Google Maps glitch is deleting timelines, and there isn't a fix yet
Twitter social media application change logo to X. Elon Musk CEO of twitter rebranded Twitter to 'X'. Social media application technology concept.
X is down again – Elon Musk confirms 'massive cyberattack' as former Twitter site hit by fourth outage today
Joe Goldberg and Kate Lockwood sitting at a table and looking at the camera in You season 5.
Netflix releases a killer new trailer for You season 5 but my favorite character is missing from Joe's final chapter