{"id":6160,"date":"2019-09-14T09:22:52","date_gmt":"2019-09-14T13:22:52","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/?p=6160"},"modified":"2019-09-14T10:26:04","modified_gmt":"2019-09-14T14:26:04","slug":"simjacker-hacking-phones-via-sms","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/2019\/09\/14\/simjacker-hacking-phones-via-sms\/","title":{"rendered":"SimJacker &#8211; Hacking phones via SMS!"},"content":{"rendered":"<p>We vaguely talked about a vulnerability or vulnerabilities at this point in sim card which allows attackers to compromise cell phones. From thehackernwes.com I was able to track down the article which talks about it. Known as \u201c<strong>SimJacker<\/strong>\u201d the threat lies in the SIM toolkit which can be exploited no matter what type of cellphone users have. This particular type of SIM card is used in over 30 countries and more than a few dozen big operators use that. The freaky part is according to the article \u2013 \u201cWhat&#8217;s worrisome? A specific private company that works with governments is actively exploiting the SimJacker vulnerability from at least the last two years to conduct targeted surveillance on mobile phone users across several countries.\u201d The article explains what exactly the <strong>SimJacker<\/strong> does and how it works.<\/p>\n<p>\u201cDisclosed by researchers at AdaptiveMobile Security in\u00a0<a href=\"https:\/\/simjacker.com\/\">new research<\/a>\u00a0published today, the vulnerability can be exploited using a $10 GSM modem to perform several tasks, listed below, on a targeted device just by sending an SMS containing a specific type of spyware-like code.<\/p>\n<p>Retrieving targeted device&#8217; location and IMEI information,<\/p>\n<ul>\n<li>Spreading mis-information by sending fake messages on behalf of victims,<\/li>\n<li>Performing premium-rate scams by dialing premium-rate numbers,<\/li>\n<li>Spying on victims&#8217; surroundings by instructing the device to call the attacker&#8217;s phone number,<\/li>\n<li>Spreading malware by forcing victim&#8217;s phone browser to open a malicious web page,<\/li>\n<li>Performing denial of service attacks by disabling the SIM card, and<\/li>\n<li>Retrieving other information like language, radio type, battery level, etc.\u201d<\/li>\n<\/ul>\n<p>Kind of a long read but worth it. Alarming imo!<\/p>\n<p>Source Link: <a href=\"https:\/\/thehackernews.com\/2019\/09\/simjacker-mobile-hacking.html\">https:\/\/thehackernews.com\/2019\/09\/simjacker-mobile-hacking.html<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We vaguely talked about a vulnerability or vulnerabilities at this point in sim card which allows attackers to compromise cell phones. From thehackernwes.com I was able to track down the article which talks about it. Known as \u201cSimJacker\u201d the threat lies in the SIM toolkit which can be exploited no matter what type of cellphone [&hellip;]<\/p>\n","protected":false},"author":20418,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-6160","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/posts\/6160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/users\/20418"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/comments?post=6160"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/posts\/6160\/revisions"}],"predecessor-version":[{"id":6161,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/posts\/6160\/revisions\/6161"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/media?parent=6160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/categories?post=6160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/tags?post=6160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}