Australia markets close in 1 hour 27 minutes
  • ALL ORDS

    7,371.20
    +58.80 (+0.80%)
     
  • ASX 200

    7,177.10
    +54.80 (+0.77%)
     
  • AUD/USD

    0.6718
    +0.0001 (+0.01%)
     
  • OIL

    74.32
    -0.05 (-0.07%)
     
  • GOLD

    1,998.70
    +1.00 (+0.05%)
     
  • Bitcoin AUD

    41,945.87
    -469.54 (-1.11%)
     
  • CMC Crypto 200

    615.39
    -3.86 (-0.62%)
     
  • AUD/EUR

    0.6159
    +0.0007 (+0.11%)
     
  • AUD/NZD

    1.0696
    -0.0019 (-0.18%)
     
  • NZX 50

    11,901.62
    -31.55 (-0.26%)
     
  • NASDAQ

    12,963.14
    +117.11 (+0.91%)
     
  • FTSE

    7,620.43
    +56.16 (+0.74%)
     
  • Dow Jones

    32,859.03
    +141.43 (+0.43%)
     
  • DAX

    15,522.40
    +193.62 (+1.26%)
     
  • Hang Seng

    20,485.10
    +175.97 (+0.87%)
     
  • NIKKEI 225

    28,046.75
    +263.82 (+0.95%)
     

Second SIM card attack can send texts and phone location data

The number of potential victims may not be as bad as claimed, though.

William_Potter via Getty Images

Simjacker isn't the only SIM-based attack that could put phones at risk. Ginno Security Lab has detailed another exploit, WIBattack, that compromises the WIB (Wireless Internet Browser) app on some SIM cards to take control of key phone functions. Like its counterpart, WIBattack infects a phone through a carefully formatted SMS text that runs instructions on cards that don't have key security features enabled. If successful, the intruders can send texts, start calls, point your web browser to specific sties, display text and send location info.

The vulnerability could be used to track a device's location, point users to phishing websites and rack up fees on calls to toll numbers, among other tricks. Ginno has briefed the GSM Association on WIBattack, although it's not clear what if anything the industry body is doing to address the issue.

It's not certain just how many people are truly vulnerable. While Ginno warns that "hundreds of millions" of phones with WIB-capable SIM cards might be at risk, ZDNet obtained an SRLabs report suggesting the real number of potential victims might be considerably lower. Out of 800 tested cards, only 10.7 percent had WIB installed, and 3.5 percent of them were vulnerable to a Simjacker-like attack.

There's also the question of whether or not this would be the most effective method for would-be attackers. It may be easier to try SIM hijacking (which can simply involve less-than-scrupulous carrier staff) or an SS7 exploit. Still, this is another significant flaw that may be difficult to completely eliminate until networks and users upgrade to more secure SIMs.