SIM card is the user identification module of mobile communication system, which is used to store user identity information and encryption keys. Previously exposed cases show that attackers can remotely obtain user location, steal text messages and even make phone calls by sending special text messages to activate the built-in browser of SIM card. This attack does not require physical contact with the device, but only exploits the unpatched vulnerability of SIM card software to control more than 1 billion mobile phones worldwide.
• Utilize system-level “zero-click” attacks to “silently activate” devices. The closed nature of smart terminal systems was once synonymous with security. However, there are cases where a company in a certain country deliberately provided a backdoor to the country's spy intelligence agency to implant spyware on the company's smartphones, and thousands of smartphones infected with malware have been found, including government staff from many countries. Attackers can exploit vulnerabilities in the instant messaging service built into a smartphone operating system to directly control the phone without user interaction.
• Use mobile phone software to "poison" and "sneak into the city" to steal secrets. Pre-installed software on mobile phones may contain secret-stealing channels. Previously exposed cases show that a certain operator illegally collected sensitive data such as user text messages and call records by pre-installing network diagnostic software on mobile phones. In 2015, foreign media revealed that the intelligence departments of the "Five Eyes Alliance" jointly launched the "Angry Corner" plan, which hijacked the download links of some representative app stores and "swapped" the applications downloaded or updated by users with applications that have been implanted with spyware, making hundreds of millions of users unknowingly the source of data leaks.
• Exploiting “forced downgrade” of mobile network layer to steal secrets. Mobile operator networks carry the function of exchanging critical information. Attackers can implant secret-stealing channels in every link of the signal "generation-transmission-reception" chain by hijacking backbone networks, forging base station signals, and infiltrating the operator's intranet. Attackers inject malicious code into 4G/5G signals, cooperate with fake base station clusters to force mobile phones to downgrade to 2G networks, and then use unencrypted communications to steal sensitive data.
All people work together to build a solid defense line for smart devices
In the face of the invisible "dark web" of smart devices stealing secrets, we can effectively prevent and resolve the risks of secret theft and leakage from smart terminals by building a full-dimensional security line covering hardware, systems, data, and ecology.