Case study on Simjacker - A telecom software vulnerability enabling remote device control. #36
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
The Simjacker vulnerability (GHSA-mq4h-3x66-jfc7, GHSA-287m-gfcr-hmjw), a serious security flaw found in 2019 that affected SIM Toolkit (S@T Browser) software. It allowed attackers to send special binary SMS messages that could run commands on users' phones without them knowing. It revealed how weak security in SIM Toolkit (S@T Browser) software could let attackers remotely control mobile devices through hidden SMS commands. This case study aims to explain how it happened and what lessons developers can learn from it.