RT @sovryntech: As I've been saying for years on #SovrynTech: Anything with a SIM card is inherently not secure. Throw away that little (or not so little, these days) black mirror as soon as you can, folks.
Here’re some links that aren’t just useless technophobic paeudonews babble. That website is notoriously bad for reporting things in a way that tells you nothing practical.
Exec summary though:
-expecting details in first week of October re where the affected sims are still in use in the wild.
-most of the touted possible uses haven’t been found in the wild
-there’s nothing you as a consumer can do really; it’s the mobile network operators who need to resolve, and it looks likely that the big players across markets in the developed world have mostly phased the tech out already. Nothing concrete on this yet though.
Where I stand, the mobile provider shouldn't have had any of those abilities, nevermind hackers. The functionality to open your browser remotely on a page is one of those things.
Hackers merely discovered how to gain access to the tools that the mobile providers had built into the SIM. People need to push back against technology that we pay for with built in backdoor functionality.
*edit: Android autocorrect does at least as much harm as good.
If this is true, it seems use of smart phones for two factor authentication is even less safe than previously known. Even using Authenticator apps seems untenable, without knowing more about what kinds of data can be accessed. Boon for yubi keys.
I actually received one of these messages and I accidentally clicked the link cause I thought it was from my friend. I immediately closed the link but how would I know if I’m being tracked? I use nord vpn also btw
I don't understand how this was not forseen from day 1. Clearly those exploiting it have known about it - how come those installing this caopability on the cards could not understand the risks?
S@T Browser contains a series of STK instructions—such as send short message, setup call, launch browser, provide local data, run at command, and send data—that can be triggered just by sending an SMS to a device
Well, shit Sherlock, who woulda thought that could be exploited? /s
> How would I know the replacement SIM has proper [security]
Since it has been published, you could check it by trying to use the exploit on your own device.
> and what are these mechanisms (eli5)?
"Proprietary" in that field generally means a mechanism that is kept secret by the provider or is heavily customized to be incompatible with other systems. It's not what you want (see [Security through obscurity](https://en.wikipedia.org/wiki/Security_through_obscurity)) but might be better than nothing because it requires an attack that is designed specifically for that provider.
It looks like current SIM cards could actually be safe:
> At the SIM card level, the Minimum Security Level - MSL - attached to the S@T browser in push mode can force Cryptographic Checksum + Encryption (MSL = 0x06 at least)
> In such cases where the replay of legitimate messages could lead to undesirable effects, MSL with Cryptographic Checksum + Encryption and anti replay Counter is recommended (e.g. 0x16)
So if your SIM card is vulnerable, it's because your provider decided to not enable the security feature.
> Since it has been published, you could check it by trying to use the exploit on your own device.
According to the article "technical details, detailed paper and proof-of-concept of the vulnerability are scheduled to be released publicly in October this year" but attacks have been observed in the wild already so some people have and are using this exploit, but I wouldn't expect most people to be able to test this for at least a few more weeks.
Delayed public disclosure rules don't really make any sense for vulnerabilities that already have exploits being performed in the wild. Speed of disclosure to the general public becomes more important then because they need to be aware of the issue.
What's worrisome? A specific private company that works with governments is actively exploiting the SimJacker vulnerability from at least the last two years to conduct targeted surveillance on mobile phone users across several countries.
According to the researchers, all manufacturers and mobile phone models are vulnerable to the SimJacker attack as the vulnerability exploits a legacy technology embedded on SIM cards, whose specification has not been updated since 2009, potentially putting over a billion people at risk.
Well shit. Was hoping having an older phone would be a bonus here but I guess not.
Voilà ce qu'il se passe à essayer de foutre des systèmes propriétaires et planqués dans les appareils des utilisateurs !
On en a partout aujourd'hui de ce genre de sous-systèmes qui tournent dans leur coin sans que l'utilisateur ne puisse y avoir accès ou qu'il puisse le monitorer... (tout les processeurs embarquent ce genre de systèmes enclavés)
"(...) The vulnerability can be exploited using a $10 GSM modem to perform several tasks (...) on a targeted device just by sending an SMS containing a specific type of spyware-like code. (...) "During the attack, the user is completely unaware that they received the attack, that information was retrieved, and that it was successfully exfiltrated," researchers explain. (...) Though the technical details and proof-of-concept of the vulnerability are yet to be disclosed, the researchers said they had observed real-attacks against users with devices from nearly every manufacturer, including Apple, ZTE, Motorola, Samsung, Google, Huawei, and even IoT devices with SIM cards.(...)"