Blend
  • Home
  • Downloads
    Adobe Premiere Pro 2023 Free Download

    Adobe Premiere Pro 2023 Free Download

    Adobe Photoshop 2023 Free Download

    Adobe Photoshop 2023 Free Download

    Adobe Illustrator 2023 Free Download

    Adobe Illustrator 2023 Free Download

    NTSA – KENYA LEARNER DRIVER HANDBOOK 2021 [PDF]

    NTSA – KENYA LEARNER DRIVER HANDBOOK 2021 [PDF]

  • Tech
    Apple introduces the new HomePod with breakthrough sound and intelligence

    Apple introduces the new HomePod with breakthrough sound and intelligence

    Bank to Mobile Money Charges Are Coming Back!!

    Musk proposes charging $8 for verified Twitter accounts.

    Musk proposes charging $8 for verified Twitter accounts.

    Apple to put USB-C connectors in iPhones to comply with EU rules

    Apple to put USB-C connectors in iPhones to comply with EU rules

    WhatsApp Sends Reminder: Accept new terms or get blocked from messaging

    WhatsApp increases group chat limit to 1,024 participants

    Advantages and disadvantages of using Flutter

    Twitter downvote reply button to a few iOS users

    Twitter downvote reply button to a few iOS users

    Need Kenyan Instagram followers?

    Need Kenyan Instagram followers?

    Why skills – not degrees – will shape the future of work

    Why skills – not degrees – will shape the future of work

  • Rides
    Nissan Note or Toyota Vitz?

    Nissan Note or Toyota Vitz?

  • Music
  • Business
No Result
View All Result
  • Home
  • Downloads
    Adobe Premiere Pro 2023 Free Download

    Adobe Premiere Pro 2023 Free Download

    Adobe Photoshop 2023 Free Download

    Adobe Photoshop 2023 Free Download

    Adobe Illustrator 2023 Free Download

    Adobe Illustrator 2023 Free Download

    NTSA – KENYA LEARNER DRIVER HANDBOOK 2021 [PDF]

    NTSA – KENYA LEARNER DRIVER HANDBOOK 2021 [PDF]

  • Tech
    Apple introduces the new HomePod with breakthrough sound and intelligence

    Apple introduces the new HomePod with breakthrough sound and intelligence

    Bank to Mobile Money Charges Are Coming Back!!

    Musk proposes charging $8 for verified Twitter accounts.

    Musk proposes charging $8 for verified Twitter accounts.

    Apple to put USB-C connectors in iPhones to comply with EU rules

    Apple to put USB-C connectors in iPhones to comply with EU rules

    WhatsApp Sends Reminder: Accept new terms or get blocked from messaging

    WhatsApp increases group chat limit to 1,024 participants

    Advantages and disadvantages of using Flutter

    Twitter downvote reply button to a few iOS users

    Twitter downvote reply button to a few iOS users

    Need Kenyan Instagram followers?

    Need Kenyan Instagram followers?

    Why skills – not degrees – will shape the future of work

    Why skills – not degrees – will shape the future of work

  • Rides
    Nissan Note or Toyota Vitz?

    Nissan Note or Toyota Vitz?

  • Music
  • Business
No Result
View All Result
Blend
No Result
View All Result
Home Happening

2 Ways Your SIM Card Can Be Hacked

Blend Sports by Blend Sports
October 15, 2022
in Happening, Tech
0
0
0
SHARES
44
VIEWS
Share on FacebookShare on Twitter

Your SIM card is a security risk! Here’s how SIM cards can be hacked and what you can do to protect your phone and contacts.

You probably know that your smartphone’s operating system needs to be regularly updated to protect against security vulnerabilities. But your SIM card can be a source of security vulnerabilities too. Here we’ll show you some ways hackers can use SIM cards to gain access to devices, and advice on how you can keep your SIM card safe.


1. Simjacker

n September 2019, security researchers at AdaptiveMobile Security announced they had discovered a new security vulnerability they named Simjacker. This complex attack targets SIM cards. It does this by sending a piece of spyware-like code to a target device using an SMS message.

If the target opens the message, hackers can use the code to surveil them by spying on their calls and messages and even tracking their location.

The vulnerability works by using a piece of software called S@T Browser, which is part of the SIM Application Toolkit (STK) that many phone operators use on their SIM cards. The SIMalliance Toolbox Browser is a way of accessing the internet—essentially, it’s a basic web browser—which lets service providers interact with web applications like email.

However, now that most people use a browser like Chrome or Firefox on their device, the S@T Browser is rarely used. The software is still installed on a large number of devices though, leaving them vulnerable to the Simjacker attack.

The researchers believe this attack has been used in multiple countries in the last two years, specifying that the S@T protocol is “used by mobile operators in at least 30 countries whose cumulative population adds up to over a billion people,” primarily in the Middle East, Asia, North Africa, and Eastern Europe.

They also believe the exploit was developed and used by a specific private company, which is working with various governments to monitor particular people. Currently, between 100 and 150 people are targeted by this attack per day.

As the attack works on SIM cards, all kinds of phones are vulnerable, including both iPhones and Android devices, and it even works on embedded SIM cards (eSIMs).

2. SIM Card Swapping

Another SIM card security issue you may have heard of is SIM card swapping. Hackers used a variation of this technique to take over Twitter CEO Jack Dorsey’s personal Twitter account in August 2019. This event raised awareness of how these attacks can be destructive. The relatively simple technique uses trickery and human engineering rather than technical vulnerabilities.

In order to perform a SIM card swap, a hacker will first call up your phone provider. They’ll pretend to be you and ask for a replacement SIM card. They’ll say they want to upgrade to a new device and therefore need a new SIM. If they are successful, the phone provider will send them the SIM.

Then they can steal your phone number and link it to their own device. All without removing your SIM card!

This has two effects. Firstly, your real SIM card will be deactivated by your provider and will stop working. Secondly, the hacker now has control over phone calls, messages, and two-factor authentication requests sent to your phone number. This means they could have enough information to access your bank accounts, email, and more.

And they may even be able to lock you out of other accounts.

SIM card swapping is hard to protect against. That’s because hackers can convince a customer support agent that they are you. Once they have your SIM, they have control over your phone number. And you may not even know you’re a target until it’s too late.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to share on WhatsApp (Opens in new window)
  • Click to share on Telegram (Opens in new window)

Like this:

Like Loading...
Previous Post

Protect Your Device From SIM Attacks

Next Post

The Government in Dilemma

Blend Sports

Blend Sports

Next Post

The Government in Dilemma

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Search Article

No Result
View All Result
Apple introduces the new HomePod with breakthrough sound and intelligence

Apple introduces the new HomePod with breakthrough sound and intelligence

January 19, 2023
Adobe Premiere Pro 2023 Free Download

Adobe Premiere Pro 2023 Free Download

December 18, 2022
Adobe Photoshop 2023 Free Download

Adobe Photoshop 2023 Free Download

December 9, 2022
Adobe Illustrator 2023 Free Download

Adobe Illustrator 2023 Free Download

January 20, 2023

5 Ways To Feel Happier in Yourself

November 18, 2022

Bank to Mobile Money Charges Are Coming Back!!

November 11, 2022
Blend

We bring you best of Business, Technology and Literature news, reviews and critics. Follow us on our social platforms to keep updated

Follow Us

Browse by Category

  • Business
  • Downloads
  • Happening
  • Music
  • Rides
  • Tech
  • Word

Recent News

Apple introduces the new HomePod with breakthrough sound and intelligence

Apple introduces the new HomePod with breakthrough sound and intelligence

January 19, 2023
Adobe Premiere Pro 2023 Free Download

Adobe Premiere Pro 2023 Free Download

December 18, 2022
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2022 Developed and Maintained by DevelopForMe

No Result
View All Result
  • Home
  • Downloads
  • Tech
  • Rides
  • Music
  • Business

© 2022 Developed and Maintained by DevelopForMe

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
%d bloggers like this: