{"id":271,"date":"2025-03-26T01:23:49","date_gmt":"2025-03-26T01:23:49","guid":{"rendered":"https:\/\/hkg01.com\/?p=271"},"modified":"2025-03-26T01:28:13","modified_gmt":"2025-03-26T01:28:13","slug":"hackers-use-spyware-to-track-sim-cards","status":"publish","type":"post","link":"https:\/\/hkg01.com\/index.php\/2025\/03\/26\/hackers-use-spyware-to-track-sim-cards\/","title":{"rendered":"Hackers Use Spyware to Track SIM Cards"},"content":{"rendered":"\n<p>Telecom security researchers identify \u2018Simjacker\u2019 spyware, used to track SIM cards in Mexico, Colombia and Peru<\/p>\n\n\n\n<p>Hackers are exploiting a vulnerability in software embedded in the SIM cards of hundreds of millions of phones to track users\u2019 whereabouts\u2014a novel form of spyware targeting one of the most important bits of hardware in a mobile device.<\/p>\n\n\n\n<p>AdaptiveMobile Security, a Dublin-based telecommunications-security company, said it found the technique has been used for at least two years by hackers tracking phones in Mexico, Colombia and Peru. It said the vulnerability exists, however, in SIM cards in use across a much larger swath of the world.<\/p>\n\n\n\n<p>\u201cIt\u2019s the most sophisticated attack I\u2019ve ever seen over these networks,\u201d said Cathal McDaid, the company\u2019s chief technology officer.<\/p>\n\n\n\n<p>The technique, nicknamed \u201cSimjacker\u201d by the researchers, targets the latest in a series of vulnerabilities hackers have found to track the location of a phone without its user\u2019s knowledge. Attacks targeting phones often involve some form of phishing, in which a victim clicks a link and inadvertently downloads malware that carries out commands for an attacker, like relaying location data.<\/p>\n\n\n\n<p>In the case of Simjacker, hackers have managed to exploit a relatively old form of software found on some SIM cards that mobile operators have used in the past to send customers billing information or special offers. Essentially, hackers send secret text messages to particular SIM cards, which then send back information like the phone\u2019s location.<\/p>\n\n\n\n<p>Phones vulnerable to the hack number in the hundreds of millions across some 30 countries in South America, Africa and parts of Europe and the Middle East, AdaptiveMobile says, though it has so far only identified cases in the three Latin American countries. The total number of affected phones in those countries isn\u2019t known, but the company said over a one-week period last month, it identified hundreds of phones being tracked with the technique.<\/p>\n\n\n\n<p>The GSM Association, a trade body of mobile network operators, said it had sent out recommendations to carriers for identifying and patching the vulnerability, which it said affected a \u201cminority of SIM cards\u201d around the world. The GSMA \u201chas been working with the impacted member operators to help implement these mitigations,\u201d it said.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/hkg01.com\/wp-content\/uploads\/2025\/03\/2025032522b55fd15b244a5fac54e424c62be9b7_1616350dfed1c44ba786a82d574c86c30f.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of 2025032522b55fd15b244a5fac54e424c62be9b7_1616350dfed1c44ba786a82d574c86c30f.\"><\/object><a id=\"wp-block-file--media-941efd03-f8c8-48e0-b345-0a5f39c9a6e2\" href=\"https:\/\/hkg01.com\/wp-content\/uploads\/2025\/03\/2025032522b55fd15b244a5fac54e424c62be9b7_1616350dfed1c44ba786a82d574c86c30f.pdf\">2025032522b55fd15b244a5fac54e424c62be9b7_1616350dfed1c44ba786a82d574c86c30f<\/a><a href=\"https:\/\/hkg01.com\/wp-content\/uploads\/2025\/03\/2025032522b55fd15b244a5fac54e424c62be9b7_1616350dfed1c44ba786a82d574c86c30f.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-941efd03-f8c8-48e0-b345-0a5f39c9a6e2\">Download<\/a><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"778\" src=\"https:\/\/hkg01.com\/wp-content\/uploads\/2025\/03\/a28249744784dffd1deb9114bf8926ef-1.jpg\" alt=\"\" class=\"wp-image-277\" srcset=\"https:\/\/hkg01.com\/wp-content\/uploads\/2025\/03\/a28249744784dffd1deb9114bf8926ef-1.jpg 602w, https:\/\/hkg01.com\/wp-content\/uploads\/2025\/03\/a28249744784dffd1deb9114bf8926ef-1-232x300.jpg 232w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"778\" src=\"https:\/\/hkg01.com\/wp-content\/uploads\/2025\/03\/33e0caa0c00d31d72e76d1f4ca4e277d.jpg\" alt=\"\" class=\"wp-image-278\" srcset=\"https:\/\/hkg01.com\/wp-content\/uploads\/2025\/03\/33e0caa0c00d31d72e76d1f4ca4e277d.jpg 602w, https:\/\/hkg01.com\/wp-content\/uploads\/2025\/03\/33e0caa0c00d31d72e76d1f4ca4e277d-232x300.jpg 232w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Telecom security researchers identify \u2018Simjacker\u2019 spyware, used to track SIM cards in Mexico, Colombia and Peru Hackers are exploiting a vulnerability in software embedded in the SIM cards of hundreds of millions of phones to track users\u2019 whereabouts\u2014a novel form of spyware targeting one of the most important bits of hardware in a mobile device&#8230;.<\/p>\n","protected":false},"author":1,"featured_media":274,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[132,131],"class_list":["post-271","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-sim","tag-simjacker"],"_links":{"self":[{"href":"https:\/\/hkg01.com\/index.php\/wp-json\/wp\/v2\/posts\/271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hkg01.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hkg01.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hkg01.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hkg01.com\/index.php\/wp-json\/wp\/v2\/comments?post=271"}],"version-history":[{"count":2,"href":"https:\/\/hkg01.com\/index.php\/wp-json\/wp\/v2\/posts\/271\/revisions"}],"predecessor-version":[{"id":279,"href":"https:\/\/hkg01.com\/index.php\/wp-json\/wp\/v2\/posts\/271\/revisions\/279"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hkg01.com\/index.php\/wp-json\/wp\/v2\/media\/274"}],"wp:attachment":[{"href":"https:\/\/hkg01.com\/index.php\/wp-json\/wp\/v2\/media?parent=271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hkg01.com\/index.php\/wp-json\/wp\/v2\/categories?post=271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hkg01.com\/index.php\/wp-json\/wp\/v2\/tags?post=271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}