SK Telecom says malware breach lasted 3 years, impacted 27 million numbers
SK Telecom在2025年4月检测到恶意软件感染,追溯至2022年6月,导致约2700万用户的敏感数据泄露,包括USIM信息和短信记录。此次事件增加了SIM卡交换攻击风险,公司已为受影响用户更换SIM卡并加强安全措施。 2025-5-20 17:15:18 Author: www.bleepingcomputer.com(查看原文) 阅读量:7 收藏

Sim cards

SK Telecom says that a recently disclosed cybersecurity incident in April, first occurred all the way back in 2022, ultimately exposing the USIM data of 27 million subscribers.

SK Telecom is the largest mobile network operator in South Korea, holding roughly half of the national market.

On April 19, 2025, the company detected malware on its networks and responded by isolating the equipment suspected of being hacked.

This breach allowed attackers to steal data that included IMSI, USIM authentication keys, network usage data, and SMS/contacts stored in the SIM.

This exposure increased the risk of SIM-swapping attacks, so the company decided to issue SIM replacements for all subscribers while strengthening security measures to prevent unauthorized number porting actions.

On May 8, 2025, a government committee investigating the incident declared that the malware infection compromised 25 data types.

At the time, SK Telecom announced it would stop accepting new subscribers as it struggled to manage the fallout.

An update SK Telecom published yesterday informs that they will soon notify 26.95 million customers that they are impacted by the malware infection, which exposed their sensitive data.

The telecom firm mentions that it identified 25 distinct malware types in 23 compromised servers, so the extent of the breach is far more extensive than initially anticipated.

Simultaneously, a joint public-private investigation team examining SK Telecom's 30,000 Linux servers says the initial web shell infection was on June 15, 2022.

This means that malware went undetected in the company's systems for nearly three years, during which the attackers introduced several payloads across 23 servers.

That investigation claims that 15 of the 23 infected servers contained personal customer information, including 291,831 IMEI numbers, though SK Telecom explicitly denied this in its latest press release.

The investigation team also noted that SK Telecom started logging activity on the impacted servers on December 3, 2024. Therefore, any data exfiltration that may have occurred from June 2022 until then would not have been detected.

SK Telecom continues to support its subscribers with SIM card replacements and elevated security measures activated automatically to protect their accounts, reporting that any malicious attempts launched against them are being effectively blocked.

"We are technically ensuring that illegal USIM and device changes are completely blocked. However, if any damage does occur despite these efforts, we will take 100% responsibility," announced SK Telecom

H/T - @mstoned7


文章来源: https://www.bleepingcomputer.com/news/security/sk-telecom-says-malware-breach-lasted-3-years-impacted-27-million-numbers/
如有侵权请联系:admin#unsafe.sh