What Is A SIM Card? 8 Things You Need To Know
What Is A SIM Card? 8 Things You Need To Know
What Is A SIM Card? 8 Things You Need To Know
A Computer Science BSc graduate who has been writing about technology since 2014,
and using Windows machines since 3.1. After working for an indie game studio, he
found his passion for writing and decided to use his skill set to write about all things
tech.
POLL
Has a health tracking app on your smartphone made you any healthier?
Absolutely
Only in the beginning
Not at all
VoteView ResultsDiscuss This Poll
ARTIFICIAL INTELLIGENCE
ONLINE PRIVACY
The 6 Best Free AI Text to Art Generators to Create an Image From What You Type
JAN 31, 2023
The 6 Best Alternatives to ChatGPT
3 DAYS AGO
9 Virtual AI Companions to Chat and Have Fun With
FEB 8, 2023
See More
HOME
SECURITY
1. Simjacker
In September 2019, security researchers
at AdaptiveMobile Security announced they had
discovered a new security vulnerability they
called Simjacker. This complex attack carries out
SIM card hacking by sending a piece of
spyware-like code to a target device using an
SMS message.
If a user opens the message, hackers can use
the code to spy on their calls and messages—
and even track their location.
FREE EMAIL COURSE:LEARN
TO SECURE YOUR
INBOX WITH OUR FREE COURSE
The vulnerability works by using a piece of
software called S@T Browser, which is part of
the SIM Application Toolkit (STK) that many
phone operators use on their SIM cards. The
SIMalliance Toolbox Browser is a way of
accessing the internet—essentially, it's a basic
web browser that lets service providers interact
with web applications like email.
However, now that most people use a browser
like Chrome or Firefox on their device, the S@T
Browser is rarely used. The software is still
installed on many devices, though, leaving them
vulnerable to the Simjacker attack.
The researchers believe this attack has been
used in multiple countries, specifying that the
S@T protocol is "used by mobile operators in at
least 30 countries whose cumulative population
adds up to over a billion people," primarily in the
Middle East, Asia, North Africa, and Eastern
Europe.
They also believed the exploit was developed
and used by a specific private company, which
was working with various governments to
monitor specific demographics—such as
journalists and activists.
All kinds of phones are vulnerable, including both
iPhones and Android devices. Simjacker even
works on embedded SIM cards (eSIMs).
3. SIM Cloning
Many times, people try to put SIM swapping and
SIM cloning under that same umbrella. However,
SIM cloning is more hands-on than the other
option.
In a SIM clone attack, the hacker first gains
physical access to your SIM card and then
creates a copy of the original. Naturally, for
copying your SIM card, the hacker will first take
out your SIM from the smartphone.
They do this with the help of a smart card
copying software, which copies the unique
identifier number—assigned to you on your SIM
card—onto their blank SIM card.
The hacker will then insert the newly copied SIM
card into their smartphone. Once this process is
complete, consider your unique SIM card identity
to be as good as gone.
Now, the hacker can snoop in on all the
communications that are sent to your phone—
just as they can in SIM swapping. This means
they also have access to your two-factor
authentication codes, which will let them hack
into your social media accounts, email
addresses, card and bank accounts, and more.
Hackers can also use your stolen SIM card
identity to carry out scams where a unique
phone number might be needed.