Use promo code:T-Day to get 10% off and free shipping on Thanksgiving purchases over $500 in cart items.

thanksgiving promotion thanksgiving promotion

The use of GSM signal jammer will not damage the SIM card

Perfectjammer 2019-12-04

Recently, we had a question about our QA wiki service about vulnerable DES encrypted SIM cards and the means of protection. News about this feat has been webcast and Google is providing hundreds of thousands of hits for "750 Million Vulnerable SIM Cards". In this article, Perfectjammer will try to clarify the operation of this feat and is it really dangerous.

In fact, this vulnerability is not as dangerous as the media is trying to describe it. We must also explain that there is no virus capable of hacking SIM cards, simply because viruses can reproduce and spread more. If the DES vulnerability is successfully exploited, the compromised SIM card will not be able to infect others. So, basically, it's a remote attack method on your smartphone.....

OTA (Over-the-Air) support. It's a technology that allows you to remotely control a SIM card, sending it special binary messages. With the help of these binary messages, your operator can:

The SIM card must support PoR (Proof of Receipt) - a feature that responds to OTA commands and sends messages with results. Not just any SIM card has such a feature.

Read or send SMS, making calls is possible only if a victim SIM card supports the Java card. It is a special programming language that allows you to create standard programs for SIM cards. The cost of a Java-enabled SIM card is slightly higher than that of standard cards, so many operators do not use them.

So, now we have reached the point where I will try to provide you with a suitable solution to this problem, if you think that can affect you. First, we must say that malicious OTA messages can be blocked at the network level, using some kind of firewall, able to block messages with specific features, when they try to go through the SMS center . If the operators implement them, the malicious messages will not reach the victim's phone. But not just any operator will, for example, Verizon has already shown interest in the personal data of its users.

The second way is to update the SIM card with these OTA messages. Your operator can update your 3DES DES encryption algorithm and block the ability to install third-party Java applets. In addition, you can replace your SIM card with a better protected card, which does not have such a feat. Another solution is to use a cell phone jammer, if you suspect that your phone is compromised.

Fortunately, Karsten Nohl, who discovered this feat, is a so-called "white pirate". He did not publish the information on the exploit and passed it on to the GSM association, which informed all the main operators. We therefore hope that the mobile operators have taken steps to secure our private data, otherwise it will be our priority.