The exposure of email addresses of important or famous people has been getting the most attention in this attack,...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
but the breach of SIM card serial numbers (which are related to ICC-IDs and IMI numbers used in the cellular system) is potentially much more significant. These numbers are used for determining the location of the cell phone/device and could put people at higher risk of having their locations tracked by unknown persons via their cell phones. In order to track a SIM card the attacker would need access to the cellular network, but such access could be easily gained and would allow the attacker to track and target an individual cell phone. Enterprises should make sure they are aware of the risk to the physical security of their users who have been exposed as a result of this attack and take precautions, like advising high-risk employees to turn their phones off when not in use.
Dig Deeper on Smartphone and PDA Viruses and Threats-Setup and Tools
Related Q&A from Nick Lewis
The remote administration Ammyy Admin software was repeatedly found to be spreading different types of malware. Expert Nick Lewis explains how ...continue reading
The Keydnap malware has the ability to steal passwords stored in the Keychain Access app on Mac systems. Expert Nick Lewis explains how to mitigate ...continue reading
The CryptXXX ransomware has been spreading through compromised legitimate websites that redirect to malicious sites. Expert Nick Lewis explains how ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.