Thursday, March 13, 2025
HomeCyber Security NewsWIBattack - SIM Card Browser Bug let Hackers Take Control Over Mobile...

WIBattack – SIM Card Browser Bug let Hackers Take Control Over Mobile Phones to Make Calls & SMS

Published on

SIEM as a Service

Follow Us on Google News

The WIBattack vulnerability impacts hundreds of millions of telecom subscribers worldwide. The vulnerability comes from the sim card and it doesn’t depend on the mobile phone or the operating system.

The vulnerability in WIB sim browser let hackers take control of the victim machine and perform various malicious functions such as sending SMS, make a phone call, get victim’s location, launch other browsers (e.g WAP browser), get victim’s IMEI.

According to Ginno Security Lab, the vulnerability was identified in 2015 and this is the first time it has been published online.

We reported similar kind of the vulnerability earlier dubbed Simjacker, according to AdaptiveMobile Security, the vulnerability actively exploited any private company who works for the government to monitor the individuals.

WIBAttack Scenario

The Wireless Internet Browser(WIB) is the leading SIM card based browser that has menu stored in the SIM and it can be managed and updated using Over The Air (OTA) services.

The attack starts with an SMS from attacker mobile, attackers send malicious OTA SMS that contains WIB commands to the victim phone number.

WIBattack Attack Scenario

Once the victim receives the OTA SMS it forwards the command to WIB browser in victim’s Simcard. WIB responds to the command and sends PROACTIVE COMMAND to victim mobile phones, such as initiating a call, send SMS and other info.

Following the command from SIM card, an attacker can send a call to any phone number, send SMS to any number and even can track the geo-location.

Researchers published a demo that illustrates, how an attacker gain control over the phone through an SMS.

The WIBattack was already reported by researchers to the GSM Association. Researchers recommend testing SIM cards with SIMtester to determine the vulnerabilities in WIB browser. Also, they are in the process of developing a SIM scanning device that runs on android devices.

Here you can find the complete report including the technical details published by Ginno Security Lab.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Blind Eagle Targets Organizations with Weaponized .URL Files to Steal User Hashes

In a significant development in the cybersecurity landscape, APT-C-36, more commonly known as Blind...

INE Security Alert: Using AI-Driven Cybersecurity Training to Counter Emerging Threats

As Artificial Intelligence (AI)-powered cyber threats surge, INE Security, a global leader in cybersecurity...

Apache NiFi Vulnerability Exposes MongoDB Credentials to Attackers

A critical security vulnerability has been identified in Apache NiFi, a popular open-source data...

86,000+ Healthcare Staff Records Exposed Due to AWS S3 Misconfiguration

A non-password-protected database belonging to ESHYFT, a New Jersey-based HealthTech company, was recently discovered...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Blind Eagle Targets Organizations with Weaponized .URL Files to Steal User Hashes

In a significant development in the cybersecurity landscape, APT-C-36, more commonly known as Blind...

Apache NiFi Vulnerability Exposes MongoDB Credentials to Attackers

A critical security vulnerability has been identified in Apache NiFi, a popular open-source data...

86,000+ Healthcare Staff Records Exposed Due to AWS S3 Misconfiguration

A non-password-protected database belonging to ESHYFT, a New Jersey-based HealthTech company, was recently discovered...