There has been news everywhere about the SimJacker attacks that caused the SimJacker vulnerability all throughout a month. These SimJacker attacks have heavily impacted on the sim cards of all variety. The attack possesses the capability to remotely exploit the sim cards and hack into any mobile devices just by sending an especially crafted binary SMS. Just for the sake of knowledge, the name “SimJacker” has been enrolled to a class of the vulnerabilities that resides due to the perfect lack of the authentication and proprietary security mechanisms that have been implemented by dynamic SIM toolkits and comes embedded in the modern sim cards.

Image Source: cdn.arstechnica.net

Amongst a myriad of the sim card vulnerability tool kits, only two of them have been identified such as – S@T Browser technology and Wireless Internet Browser (WIB) and have been found vulnerable to the SimJacker attacks. Off lately, the cyber security researchers at the Adaptive Mobile Security have now released a new report that opens up about some more details about the SimJacker attacks where they have tried to address some of the most unanswered questions such as the number of affected operators and countries, along with details on attacks spotted in the wild.

Image Source: edge.alluremedia.com.au

The list of the affected countries is what people are waiting to see. Although the researchers did not name the affected mobile operators in order to prevent the attackers of the SimJacker attacks from taking advantage of the disclosed vulnerability, they did disclose the names of the countries where the vulnerable sim cards are still in use. The report includes 29 affected countries across five continents, where customers of a total of 61 mobile operators are actively using vulnerable SIMs with S@T Browser toolkit:

  • North America: Mexico, Guatemala, Honduras, Costa Rica, Nicaragua, Belize, El Salvador, Dominican Republic, and Panama.
  • South America: Peru, Colombia, Brazil, Ecuador, Chile, Argentina, Uruguay, and Paraguay.
  • Africa: Nigeria, Ghana, Benin, Ivory Coast, and Cameroon.
  • Europe: Italy, Bulgaria, and Cyprus.
  • Asia: Saudi Arabia, Iraq, Palestine and Lebanon.

On the contrary, there are only 8 mobile operators in the 7 countries who are proactively using the vulnerable WIB toolkit on their sim cards.

Source: The Hacker News


Disclaimer: Darkweblink.com does not promote or endorse claims that have been made by any parties in this article. The information provided here is for the general purpose only and unintended to promote or support purchasing and/or selling of any products and services or serve as a recommendation in the involvement of doing so. Neither Darkweblink.com nor any member is responsible directly or indirectly for any loss or damage caused or alleged to be caused by or in relation with the reliance on or usage of any content, goods or services mentioned in this article.


Tags: #Deep_Web_directories #Hidden_Wiki_Links #Deep_Web_Links_and_Web_Sites #Dark_Web_Links #Best_Dark_web_Websites

SHARE
Previous articleTop 3 Most Popular Darknet Markets of 2019
Next articleDark Web Prostitution Ring Busted By The Law Enforcement
DEMARCO BERRY
Demarco Berry is a senior writer for Dark Web Link, covering security, privacy, information freedom, and hacker culture. Before coming to Dark Web Link, he worked as a senior writer for The New York magazine. Demarco has received his bachelor’s degree from Haverford College and a master’s degree from New York University’s business and economic reporting program.

LEAVE A REPLY

Please enter your comment!
Please enter your name here