TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

SIM Vulnerability leads to information disclosure via malicious SMS

137 pointsby lejokoover 5 years ago

15 comments

falsedanover 5 years ago
There&#x27;s a lot of woo in the press release, but the essense is: they claim to have found an exploit in the SIM Application Toolkit (specifically, in the S@T Browser [SIMalliance Toolbox Browser]), which can be triggered when the SIM processes a SMS which contains some attacker data as a payload, and results in the payload being executed by the SIM. The SIM can request some details from the phone (like Cell ID (rough location) and IMEI) and exfiltrate them (via another SMS).<p>The SIM Application Toolkit is fairly low-level, so has access to a few other functions, like making calls or opening applications or updating firmware. Whether these functions are permitted by the phone depends on the manufacturer, but they claim that the Cell ID &amp; IMEI functions are widely-supported.
cypresover 5 years ago
Title is misleading. No &quot;hijacking&quot; is taking place, they are obtaining the Cell ID (approximate location) and IMEI info from the phone, by sending it a malicious SMS containing SIM card instructions. Details; <a href="https:&#x2F;&#x2F;www.adaptivemobile.com&#x2F;blog&#x2F;simjacker-next-generation-spying-over-mobile" rel="nofollow">https:&#x2F;&#x2F;www.adaptivemobile.com&#x2F;blog&#x2F;simjacker-next-generatio...</a><p>A better title IMHO; SIM Vulnerability leads to information disclosure via malicious SMS.
评论 #20954132 未加载
评论 #20954077 未加载
评论 #20954157 未加载
评论 #20961577 未加载
评论 #20954274 未加载
评论 #20996361 未加载
raintreesover 5 years ago
I obtained a low-tech phone for SMS and phone calls. I then turned my Samsung Android back into a PDA by removing the SIM chip.<p>I explain to my clients when they express astonishment at my low-tech phone that I am protecting their security, as I have the PDA sync with my Exchange Server, where I keep sensitive info to provide them support and I do not allow the low-tech phone to access my Exchange Server.<p>I also tell them that I had based my decision on the track records of Google, Apple, Verizon, etc. in regards to security.<p>Nothing is perfect, but at least my attack surface is lessened.
评论 #20959757 未加载
评论 #20958083 未加载
评论 #20956011 未加载
ga-vuover 5 years ago
Old attack: <a href="http:&#x2F;&#x2F;blog.m-sec.net&#x2F;2011&#x2F;sim-toolkit-attack&#x2F;" rel="nofollow">http:&#x2F;&#x2F;blog.m-sec.net&#x2F;2011&#x2F;sim-toolkit-attack&#x2F;</a>
rando444over 5 years ago
The youtube-conspiracy-style intro video and lack of details does not instill a feeling of credibility.
eternalny1over 5 years ago
This whole site reeks of a security company trying to cash in on a previously reported issue.<p>The scarier they can make it, the more $$ ... they even have the domain name.<p>2011 ... <a href="http:&#x2F;&#x2F;blog.m-sec.net&#x2F;2011&#x2F;sim-toolkit-attack&#x2F;" rel="nofollow">http:&#x2F;&#x2F;blog.m-sec.net&#x2F;2011&#x2F;sim-toolkit-attack&#x2F;</a>
vectorEQover 5 years ago
so many companies who offer these services since forever. verint, gamma, etc. etc.<p>1 or 2 binary sms sent and you have someones phone depending on your flavor of attack.<p>sim card runs java. with sim pin you can even just send apdu requests to read its filesystem...<p>don&#x27;t know why now all of a sudden this is a hot topic. it&#x27;s the whole design of the mobile infrastructure to be able to do this...<p>just think about it: if you clone someones phone via such method, and they get called, you get called. if you then pickup within ~1 second of them picking up, your speaker is enabled but microphone is disabled so they can&#x27;t hear you snooping in on them.... that is by design.<p>between carriers everything is unauthenticated, to enable this at global scale... by design.
markovbotover 5 years ago
There doesn&#x27;t seem to be a lot of specifics here. Does this mean I can send anyone a text that has some magical character in it to trigger this S@T Browser to execute arbitrary AT commands? Or is this some kind of special SMS like a type-0 SMS or something?
archi42over 5 years ago
That SIMs are expoitable was to be expected, and is another nail in the coffin of SMS 2FA. I&#x27;m just worried about the isolation between SIM and CPU - delivering a crypto locker via SMS would be an impressive feat, but wreak absolute havoc.
segfaultbuserrover 5 years ago
Unsurprising, and I don&#x27;t think it&#x27;s a backdoor like ME, but just plain incompetence (or malpractice). It&#x27;s only a matter of time and location when a exploit like this is discovered. I highly recommend this hilarious paper, <i>Fuzzing the GSM Protocol</i> (<a href="https:&#x2F;&#x2F;www.ru.nl&#x2F;publish&#x2F;pages&#x2F;769526&#x2F;scriptie-brinio-final-brinio_hond.pdf" rel="nofollow">https:&#x2F;&#x2F;www.ru.nl&#x2F;publish&#x2F;pages&#x2F;769526&#x2F;scriptie-brinio-final...</a>). By feeding the phones with random GSM data with a Software-Defined Radio, it showed most dumb and smartphones have serious memory corruption issues. Just starts reading from Page 27, Chapter 5.<p>* Read Memory<p>&gt; <i>On two different phones it was possible to read out (part of) the phone memory. The most interesting of these phones was the Nokia 2600, where a text message would get stored that shows a seemingly random part of the phone memory upon opening. Closing and reopening of the same message would display a different part of the memory, sometimes also causing a reboot of the phone.</i><p>&gt; <i>On the Samsung SGH-D500 certain messages would show a strange sequence of characters when opened, but it was unclear to us where it came from. The same message would show up differently when sent multiple times, so we expect it came somewhere from memory.</i><p>* Reboot<p>&gt; <i>Seven of the sixteen phones could be forced to reboot remotely. When rebooting the network connection would be lost temporarily.</i><p>&gt; <i>In all but two cases reboots were caused by a discrepancy between a length field and the actual length of that field in the message, making it likely that the behaviour is caused by a buffer overflow.</i><p>* Long time DoS<p>&gt; <i>For the iPhone 4 and HTC Legend the attack with the highest impact was found. By sending a carefully crafted SMS message the phone would not display anything and also stop receiving any SMS messages altogether. In addition on the iPhone it was impossible to change network after the attack.</i><p>* Icons<p>&gt; <i>SMS offers the ability to notify a user that a voice, fax or email message is waiting to be retrieved. According to the specifications every cell phone has to show an icon on the screen when this happens. Problem is that these icons are hard to remove when they were activated illegitimately. Even though this is not an actual security risk it can be quite annoying.</i><p>(lol!)<p>* Unable to delete messages<p>&gt; <i>A rather annoying bug manifested itself on two cell phones, the Sony Ericsson T630 and Samsung SGH-D500. [...] They could not be viewed or deleted in any way, but they still occupied space on the SIM. The only way to delete these messages was to put the SIM in a different phone and delete them there.</i><p>&gt; <i>Problems like these can be quite dangerous.</i><p>Nowadays, it&#x27;s an extremely dangerous problem in the age of smartphones, when the baseband processor contains proprietary, unauditable code, with no isolation between the baseband processor and the main system.
评论 #20956882 未加载
johnisgoodover 5 years ago
So how do I know if someone sent me a malicious message? Does this affect GSM only, or WCDMA, too, or does it even matter?
评论 #20955277 未加载
Haed1zoesee6over 5 years ago
Will a baseband firewall protect me from this?
pingecover 5 years ago
Does this break SMS 2FA?
评论 #20956143 未加载
评论 #20953957 未加载
评论 #20953946 未加载
评论 #20954356 未加载
Smoozy23over 5 years ago
I don’t understand why to steal someone else’s phones? the main thing for what?
评论 #20953636 未加载
评论 #20953292 未加载
评论 #20953420 未加载
评论 #20954711 未加载
评论 #20953591 未加载
biggtover 5 years ago
First the Intel management engine backdoor. And now this, probably first conceived when someone cards were being developed