eSIM Cloning & Spying: What You Need to Know

eSIM Cloning Security

A newly disclosed vulnerability in embedded SIM (eSIM) technology has raised serious concerns across the IoT and telecom sectors. Security researchers at Poland-based firm Security Explorations recently demonstrated how eSIMs—specifically those running vulnerable versions of Java Card software—can be cloned, tampered with, and turned into spy tools, even from afar.

Their investigation focused on eUICCs (embedded Universal Integrated Circuit Cards), which are widely used in connected devices such as smart meters, wearables, industrial sensors, and more. What they found has implications for both device manufacturers and connectivity providers alike.

🔗 Read the original source at SecurityWeek


🕵️‍♂️ What Happened?

Using techniques more commonly associated with cyber-espionage, the researchers first extracted cryptographic keys from the eSIM’s Java Card platform by gaining physical access to the chip. With those keys in hand, they were then able to inject malicious applications into the SIM remotely — without further access to the device.

The outcome? They successfully cloned an eSIM profile and redirected communication traffic to another device, essentially allowing a third party to spy on activity or intercept data. The team even demonstrated how the eUICC could be bricked or corrupted completely during these attacks.


⚠️ Why This Matters for IoT and M2M Deployments

eSIMs have revolutionised how we connect and manage devices at scale. From electric vehicle charging points to smart farming systems, they simplify deployments with remote provisioning and global roaming. However, this flexibility also introduces new risks:

Common eSIM / IoT Security Challenges:

  • Physical Tampering: Industrial devices are often deployed in unguarded or public spaces.
  • Remote Attack Surface: OTA provisioning can be exploited if not properly secured.
  • Legacy Firmware: Many devices still use outdated Java Card stacks vulnerable to known exploits.
  • Silent Persistence: Rogue apps on eUICCs can operate undetected by traditional firewalls or antivirus tools.

This new research highlights that SIM security isn’t just about mobile phones anymore—in the IoT world, it can mean infrastructure disruption, data leaks, or permanent device failure.


🔐 Best Practices for Securing eSIM-Based Deployments

Whether you’re deploying 100 devices or 100,000, the following best practices can help reduce risk:

🛡️ Area🔧 Recommendation
Firmware & PlatformAlways deploy eSIMs with the latest certified Java Card OS and patches
Profile ManagementUse a GSMA-compliant SM-DP+ provider with secure OTA provisioning pipelines
Physical SafeguardsChoose ruggedised eUICCs with tamper resistance and install in protected enclosures
Key LifecycleEnforce key diversification and rotate critical credentials periodically
Vulnerability TestingInclude SIM-level pentesting in your security audits, not just device-level

🧭 The Bigger Picture

As eSIM adoption surges across industries—particularly in M2M and IoT—the attack surface is expanding. Most operators and device makers focus on network security, but forget that the SIM card itself is a miniature operating system with its own applications, permissions, and vulnerabilities.

What this research reveals is that SIM-level attacks are no longer theoretical. They can now be executed with off-the-shelf tools and a brief window of physical access—yet still deliver long-term remote control and monitoring.


🧠 Final Thoughts from euicc.co.uk

At euicc.co.uk, we help businesses deploy eSIM and eUICC solutions with security front and centre. From selecting trusted hardware vendors to building OTA pipelines with proper authentication and encryption, we can guide your project from concept to scale—safely.

If you’re concerned about eSIM security in your IoT rollout, we’re here to help evaluate your current setup and explore mitigation strategies.


Stay ahead. Stay secure.
Visit euicc.co.uk to learn more.