Thursday, March 28, 2024

WIBattack – SIM Card Browser Bug let Hackers Take Control Over Mobile Phones to Make Calls & SMS

The WIBattack vulnerability impacts hundreds of millions of telecom subscribers worldwide. The vulnerability comes from the sim card and it doesn’t depend on the mobile phone or the operating system.

The vulnerability in WIB sim browser let hackers take control of the victim machine and perform various malicious functions such as sending SMS, make a phone call, get victim’s location, launch other browsers (e.g WAP browser), get victim’s IMEI.

According to Ginno Security Lab, the vulnerability was identified in 2015 and this is the first time it has been published online.

We reported similar kind of the vulnerability earlier dubbed Simjacker, according to AdaptiveMobile Security, the vulnerability actively exploited any private company who works for the government to monitor the individuals.

WIBAttack Scenario

The Wireless Internet Browser(WIB) is the leading SIM card based browser that has menu stored in the SIM and it can be managed and updated using Over The Air (OTA) services.

The attack starts with an SMS from attacker mobile, attackers send malicious OTA SMS that contains WIB commands to the victim phone number.

WIBattack Attack Scenario

Once the victim receives the OTA SMS it forwards the command to WIB browser in victim’s Simcard. WIB responds to the command and sends PROACTIVE COMMAND to victim mobile phones, such as initiating a call, send SMS and other info.

Following the command from SIM card, an attacker can send a call to any phone number, send SMS to any number and even can track the geo-location.

Researchers published a demo that illustrates, how an attacker gain control over the phone through an SMS.

The WIBattack was already reported by researchers to the GSM Association. Researchers recommend testing SIM cards with SIMtester to determine the vulnerabilities in WIB browser. Also, they are in the process of developing a SIM scanning device that runs on android devices.

Here you can find the complete report including the technical details published by Ginno Security Lab.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles