Researchers have responsibly disclosed details of this vulnerability to the GSM Association, the trade body representing the mobile operator community, as well as the SIM alliance that represents the main SIM Card/UICC manufacturers. Mobile operators can also immediately mitigate this threat by setting up a process to analyze and block suspicious messages that contain [email protected]
Browser commands. As a potential victim, it appears, there is nothing much a mobile device user can do if they are using a SIM card with [email protected]
Browser technology deployed on it, except requesting for a replacement of their SIM that has proprietary security mechanisms in place.