German Researcher Discovers SIM Card Encryption Flaw Exposing Smartphones
By exploiting the encryption hole, a remote attacker could easily figure out a SIM card's 56-digit key, and then use that key to send a virus to the SIM card through a simple text message. Karsten Nohl, founder of Security Research Labs, claims to have tested this out, saying he was then able to listen in on the caller, make purchases, and masquerade as the handset's owner, The New York Times reports. All that's required is a little know-how, a PC, and about two minutes time.
"We can remotely install software on a handset that operates completely independently from your phone," Nohl said. “We can spy on you. We know your encryption keys for calls. We can read your SMS’s. More than just spying, we can steal data from the SIM card, your mobile identity, and charge to your account."
Scary stuff, and according to Nohl, some 750 million phones could be vulnerable to this rather easy-to-exploit security hole. Phones affected are those that have SIM cards relying on the older D.E.S. (data encryption standard) protocol. Around 3 billion mobile phones use D.E.S. encryption, and while carriers have started using Triple D.E.S., many SIM cards still rely on the older standard.
(Update 7/22, 10:47AM: Headline changed to reflect exploit seen on some SIM cards but not all.)