AdaptiveMobile Security Simjacker Technical Paper 01
Simjacker Attacker Structure and Operating Procedure ............................................ 12
Download
3.33 Mb.
View original pdf
Page
2/29
Date
20.12.2023
Size
3.33 Mb.
#62999
1
2
3
4
5
6
7
8
9
...
29
SimJacker
SIM-Swapping
4
Simjacker Attacker Structure and Operating Procedure ............................................ 12
4.1
Volumes in Period Targeted .......................................................................................... 12 Information Retrieved ................................................................................................... 14 4.3
Simjacker Attack Packet Format ................................................................................... 15 Infrastructure Used by Attacker Network .................................................................... 16 External SS Network Sources ..................................................................................... 17
5
Attack Format and Evolution .................................................................................... 20
5.1
Avoidance techniques ................................................................................................... 20 Additional Functionality Attempted by Attacker .......................................................... 23
6
Attribution & Evaluation .......................................................................................... 24
6.1
Attribution of Simjacker Attacks ................................................................................... 24 Overall Evaluation of Simjacker Attacks ....................................................................... 25
7
Wider Applicability of the Vulnerability .................................................................... 27
7.1
Countries/Operators Potentially Affected .................................................................... 27 Additional Functionality Potential ................................................................................. 30 Other Vulnerable SIM Card Applications ...................................................................... 33
8
Recommendations ................................................................................................... 36
8.1
Mobile Subscribers ........................................................................................................ 36 Mobile Operators ........................................................................................................... 36
Download
3.33 Mb.
Share with your friends:
1
2
3
4
5
6
7
8
9
...
29
The database is protected by copyright ©ininet.org 2024
send message
Main page
written consent