16
Simjacker
Technical Report ©2019 AdaptiveMobile Security We believe the variations in the actual Simjacker Attack packet itself was done to also potentially avoid defences, or potentially to tailor the attack per specific Sim card type. Section 5 explains in more detail the techniques used by the attacker.
4.4
Infrastructure Used by Attacker Network Sending
Attack Message In this period, the Sending Infrastructure comprised of over
70 sending number of devices sending the attack messages. The main sender sent nearly 22%
of attacks, but most sending devices sent less than 5% of attacks in this time.
Figure 8: Simjacker Sender % Volumes Receiving Data Message Within the Simjacker Attack Messages,
we identified over 60 Share with your friends: