AdaptiveMobile Security Simjacker Technical Paper 01


Simjacker Attacker Structure and Operating Procedure ............................................ 12



Download 3.33 Mb.
View original pdf
Page2/29
Date20.12.2023
Size3.33 Mb.
#62999
1   2   3   4   5   6   7   8   9   ...   29
SimJacker
SIM-Swapping
4
Simjacker Attacker Structure and Operating Procedure ............................................ 12
4.1
Volumes in Period Targeted .......................................................................................... 12 Information Retrieved ................................................................................................... 14 4.3
Simjacker Attack Packet Format ................................................................................... 15 Infrastructure Used by Attacker Network .................................................................... 16 External SS Network Sources ..................................................................................... 17
5
Attack Format and Evolution .................................................................................... 20
5.1
Avoidance techniques ................................................................................................... 20 Additional Functionality Attempted by Attacker .......................................................... 23
6
Attribution & Evaluation .......................................................................................... 24
6.1
Attribution of Simjacker Attacks ................................................................................... 24 Overall Evaluation of Simjacker Attacks ....................................................................... 25
7
Wider Applicability of the Vulnerability .................................................................... 27
7.1
Countries/Operators Potentially Affected .................................................................... 27 Additional Functionality Potential ................................................................................. 30 Other Vulnerable SIM Card Applications ...................................................................... 33
8
Recommendations ................................................................................................... 36
8.1
Mobile Subscribers ........................................................................................................ 36 Mobile Operators ........................................................................................................... 36

Download 3.33 Mb.

Share with your friends:
1   2   3   4   5   6   7   8   9   ...   29




The database is protected by copyright ©ininet.org 2024
send message

    Main page