Hi guys I found this information and I want to share it with you 🙃
Consider the wealth of sensitive information tied to your Google account, including your address, birthdate, photos, calendar, emails, contacts, and other services linked to your primary email address.
- SIMJacker
The SIMJacker attack is initiated when an attacker sends an SMS to your smartphone. This seemingly harmless message contains a link or a specific code that instructs the SIM card to reveal data or allow remote control. This process occurs silently, without your knowledge. It is worth noting that SIMJacker is not limited to a specific operating system, so it compromises all phones, including Android and iPhones.
The data extracted from the SIM card includes your mobile identifier, which can determine your location, as well as device-specific information, such as the IMEI. This data is then transmitted to a device controlled by the attacker. Once compromised, the attacker can eavesdrop on your calls, steal credits or hijack your bank accounts by linking your email to your phone number.
- SIM Swap
- The attacker deceives your service provider, impersonating you to request a new SIM card.
- The attacker steals your phone number and links it to their own device.
- Your legitimate SIM card is deactivated.
- The attacker gains access to your calls, messages, bank accounts, emails, and more.
- SIM Cloning
Each SIM card has three critical codes:
- International Mobile Subscriber Identity Code (IMSI): Identifies the SIM on international networks, comprising the country code or network ID.
- Integrated Circuit Card Identifier (ICCID): The serial number of the SIM chip, distinct from the phone's serial number.
- (Ki) Code: This is the crucial code for hackers, as it identifies and secures the card within the network.
Cloning becomes possible by obtaining these codes. While IMSI and ICCID codes can be read with a SIM card reader, the (Ki) code requires more sophisticated methods. Hackers employ various techniques to scan and decode it. The chip's data is then copied onto a writable, programmable card, not supplied by telecom companies but readily available online. Numerous programs and applications allow attackers to decode and copy your SIM data, writing it onto a new chip.
- WIB ATTACK
Instead of static SIM toolkit applications with pre-installed menus, some operators opt for dynamic SIM toolkits. These toolkits generate menus and user dialogs on-the-fly based on data provided by a central server. SIM applications providing this functionality are often referred to as SIM browsers or µ-browsers.
Currently, two browsers are available, with the Wireless Internet Browser (WIB) being the pioneering solution introduced and promoted by SmartTrust. The WIB-enabled SIM features a menu stored on the card, which can be managed and updated using Over The Air (OTA) services.