Exploit via Radio Interfaces
The mobile device may be targeted for exploitation through its interface to cellular networks or other radio interfaces.
Baseband Vulnerability Exploitation
A message sent over a radio interface (typically cellular, but potentially Bluetooth, GPS, NFC, Wi-Fi or other) to the mobile device could exploit a vulnerability in code running on the device.
Malicious SMS Message
An SMS message could contain content designed to exploit vulnerabilities in the SMS parser on the receiving device. An SMS message could also contain a link to a web site containing malicious content designed to exploit the device web browser. Vulnerable SIM cards may be remotely exploited and reprogrammed via SMS messages.
|S0289||Pegasus for iOS|
|M1006||Use Recent OS Version|
- Gal Beniamini. (2017, April 4). Over The Air: Exploiting Broadcom's Wi-Fi Stack. Retrieved November 8, 2018.
- D. Pauli. (2015, November 12). Samsung S6 calls open to man-in-the-middle base station snooping. Retrieved December 23, 2016.
- R. Weinmann. (2012, August 6-7). Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks. Retrieved December 23, 2016.
- Andy Greenberg. (2009, July 28). How to Hijack 'Every iPhone In The World'. Retrieved December 23, 2016.
- SRLabs. (n.d.). SIM cards are prone to remote hacking. Retrieved December 23, 2016.
- Bill Marczak and John Scott-Railton. (2016, August 24). The Million Dollar Dissident: NSO Group’s iPhone Zero-Days used against a UAE Human Rights Defender. Retrieved December 12, 2016.