12
Simjacker
Technical Report ©2019 AdaptiveMobile Security
4
Simjacker Attacker Structure and Operating Procedure The attackers we detected using the Simjacker message vary their methods and use of the
Simjacker vulnerability constantly. This
is due to changing conditions, objectives and defences being put in place. This makes profiling what is the normal use of the vulnerability difficult. Nevertheless, we can show what is the typical activity in a time period, as a representative guide.
In the below analysis, we have taken ab typical day continuous time period, from sometime within the last year. This period is a time where we actively engaged in detecting and blocking these attacks with our mobile customers. From retrospective analysis, it is also similar to other time periods when
blocking was not occurring, so this day period is representative of the activity throughout the larger timespan.
4.1
Share with your friends: