Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

eSIM Hack Allows for Cloning, Spying 

Posted on July 10, 2025July 10, 2025 By CWS

Previous Java Card vulnerabilities resurface in eSIMs

Analysis specializing in eSIM safety has led to the invention of a hacking methodology that would have severe implications.

Embedded SIMs, or eSIMs, have turn into more and more frequent. They get rid of the necessity for bodily SIM playing cards in cell phones and different IoT units that require mobile communications. One essential element of the eSIM ecosystem is the embedded Common Built-in Circuit Card (eUICC), which allows distant SIM provisioning and the usage of a number of profiles for connecting to totally different cell networks. 

Safety Explorations, the analysis lab of Poland-based AG Safety Analysis, has carried out an intensive evaluation of eSIMs and eUICC and located vulnerabilities that may very well be exploited to clone a goal’s eSIM and spy on their cell communications.

The analysis has centered on a extensively used Kigen eUICC card. Kigen, which claims to have enabled two billion SIMs in IoT units, has been notified of the findings and it has taken steps to mitigate the danger of assaults. 

The corporate has printed an advisory describing the potential affect of the vulnerabilities, in addition to mitigations. Whereas Kigen has categorized the difficulty as having medium affect, Safety Explorations famous that it obtained a $30,000 reward from the corporate for its work.

GSMA, the group that represents the pursuits of cell community operators around the globe, has shared steering for profile homeowners, eUICC producers, machine distributors, and utility builders in response to the eSIM hacking analysis.

It’s value noting that whereas the Safety Explorations venture centered on Kigen merchandise, eUICC/eSIM chips from a number of different distributors could also be susceptible to related assaults because the underlying challenge is said to a collection of vulnerabilities present in Oracle’s Java Card expertise.

The Java Card flaws had been disclosed by Safety Explorations in 2019, however Oracle and SIM card producers utilizing the expertise downplayed their potential affect on the time. Commercial. Scroll to proceed studying.

Constructing on that analysis, Safety Explorations seemed into the safety of eSIM over the course of a number of months.

To be able to conduct an assault, the attacker wants non permanent bodily entry to the machine with the focused eSIM. The aim is to extract a key that permits the set up of a malicious Java Card utility. 

Adam Gowdiak, the CEO and founding father of AG Safety Analysis, defined for SecurityWeek that after the keys are obtained, they can be utilized to put in malicious apps utilizing over-the-air (OTA) mechanisms and bodily entry is not required, as demonstrated by a proof-of-concept he created.

As soon as a malicious utility has been put in, it will possibly allow the attacker to compromise the safety of the chip, which was constructed with the idea that it can’t be compromised.

The attacker can acquire eSIM profile information (utilized by totally different cell operators for authentication on their community), which will be leveraged by well-resourced risk actors (eg, nation state hackers) to snoop on communications, Gowdiak warned.

It’s additionally attainable for an attacker to obtain eSIM profiles in clear textual content and use them for eSIM cloning. The researcher demonstrated the potential affect by cloning an Orange Poland eSIM profile, which led to messages and calls going to the machine with the cloned eSIM relatively than the unique machine. Different cell community operators are possible impacted as nicely.

Gowdiak additionally famous that it could be attainable for an attacker to create a backdoor on an eSIM chip, and cell operators and telephone distributors would possible don’t have any technique of detecting it.

Lastly, an attacker might also be capable to use the exploit to brick eSIM chips — the researcher mentioned he broken 5 playing cards throughout his analysis. 

Oracle doesn’t appear very involved in regards to the newest analysis both, in response to Safety Explorations. Nevertheless, the safety agency believes the newest assault could have been prevented if Oracle had taken the 2019 bugs extra severely. 

Safety Explorations has created a toolset for figuring out whether or not a Java Card VM utilized by an eSIM is susceptible to assaults. The toolset additionally allows the extraction of the required key, however this performance is particular to Kigen playing cards, and a customized exploitation methodology is probably going wanted for one another kind of eUICC card. 

Associated: Microsoft DRM Hacking Raises Questions on Vulnerability Disclosures

Associated: Microsoft DRM Hack Might Enable Film Downloads From Standard Streaming Companies

Security Week News Tags:Cloning, eSIM, Hack, Spying

Post navigation

Previous Post: Ingram Micro Restores Systems Impacted by Ransomware
Next Post: Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord

Related Posts

Critical OpenPGP.js Vulnerability Allows Spoofing Security Week News
SimpleHelp Vulnerability Exploited Against Utility Billing Software Users Security Week News
Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift Security Week News
Ox Security Bags $60M Series B to Tackle Appsec Alert Fatigue  Security Week News
Australian Human Rights Commission Discloses Data Breach Security Week News
McDonald’s Chatbot Recruitment Platform Leaked 64 Million Job Applications Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • First Rowhammer Attack Targeting NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • First Rowhammer Attack Targeting NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News