The exposure of email addresses of important or famous people has been getting the most attention in this attack,...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
but the breach of SIM card serial numbers (which are related to ICC-IDs and IMI numbers used in the cellular system) is potentially much more significant. These numbers are used for determining the location of the cell phone/device and could put people at higher risk of having their locations tracked by unknown persons via their cell phones. In order to track a SIM card the attacker would need access to the cellular network, but such access could be easily gained and would allow the attacker to track and target an individual cell phone. Enterprises should make sure they are aware of the risk to the physical security of their users who have been exposed as a result of this attack and take precautions, like advising high-risk employees to turn their phones off when not in use.
Dig Deeper on Smartphone and PDA Viruses and Threats-Setup and Tools
Related Q&A from Nick Lewis
Latentbot malware has layers of obfuscation that makes it hard to detect. Expert Nick Lewis explains how its process works, beginning with a phishing...continue reading
A hard to detect type of Linux malware, Rekoobe, can download files to user systems. Expert Nick Lewis explains the malware's key functionality and ...continue reading
Pro POS, a new type of POS malware, has simple operations and is easy to obtain. How was it so successful against businesses? Expert Nick Lewis ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.