Hacker News new | past | comments | ask | show | jobs | submit login
Simjacker vulnerability exploited by surveillance companies (simjacker.com)
68 points by agazso on Jan 1, 2021 | hide | past | favorite | 18 comments



I'm for cool research, but I am also tired of the trend where security companies come up with a flashy name, logo, url, etc. for every exploit/vuln.


I'm the opposite. Security researchers have struggled for decades to get people to fix their stuff after discovering something is broken. When a vuln has a human-readable name that sounds vaguely scary, even nontechnical decision makers can ask good questions like "are we vulnerable to this 'heartbleed' thing?". Anecdotal, but I've definitely noticed people talking about them; I've seen articles in mainstream press referencing some of these named vulns and have even had friends who are otherwise uninterested in computers ask me about them!

Certainly there's a self-serving glamorous aspect to it on the part of security researchers, but fun names and logos brings attention to issues that otherwise result in eyes glazing over. As much as this stuff makes me cringe to read, I'm willing to bet the branding for this issue will result in more eyes on it and probably will result in a fix. That's ultimately what vuln disclosure is about, after all.


Yeah, the in-your-face advert right before the main text is very spammy too:

  "Do you know if attacks like like Simjacker or other next
  generation attacks are happening in your network?

  Book a meeting [with us to find out]."
The website feels like a con/ad rather than something legit.


Why?


It reeks of marketing, which is antithetical to the hacker spirit?


Good.. Instantly recognisable name for e-peen augmentation, enters lexicon of general public easily, media outlets can spam it easier, vendors hand forced to fix promptly.

This is hardly a bad thing.


If it's antithetical, why do open source projects tend to have cute little mascots?


Yeah the little SIM card face cringed me out


This is from September 2019. They haven't really bothered with updating the topic since then: https://www.adaptivemobile.com/search/3a08888ea06c35015d1248...


Dead link?


Yeah it's just a search for "simjacker" on their site, which encodes it in a string instead of common sense.



So which company, working for which government, and how to stop it? The article is just a talk-to-our-salesman piece?


Yep, it's all fluff. They were supposed to reveal more information on the matter in a conference back in October. But we still only have a "technical" paper with nice looking graphs and an unnamed boogie-man.


This product/company, for example: https://rayzone.com/geomatrix-geolocation-system/


Most likely: NSO Group


Less likely, NSO's expertise is in development of exploits for browsers and apps (ex: WhatsApp), not ss7 exploits


Circles is affiliated with NSO, and they use ss7 exploits.

Dont think they named directly who but they mentioned Circles, Rayzone in ChaosComputingClub a few days ago. THowever the link with the talk is dead for some reason - https://media.ccc.de/v/rc3-11511-watching_the_watchers_-_how...




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: