Hackers entry delicate SIM card knowledge at South Korea’s largest telecoms firm


Thank you for reading this post, don't forget to subscribe!

Cell community operator SK Telecom, which serves roughly 34 million subscribers in South Korea, has confirmed that it suffered a cyber assault earlier this month that noticed malware infiltrate its inside methods, and entry knowledge associated to clients’ SIM playing cards.

The breach occurred at round 11pm native time, on the night time of Saturday 19 April 2025, in what’s believed to have been an assault deliberately timed to take advantage of a day and time when there could also be much less workers monitoring in place.

Responsibly, SK Telecom knowledgeable the Korean Web & Safety Company (KISA) the next day, and fulfilled its authorized obligation to inform the Private Info Safety Fee on Monday 21 April that there had been a possible knowledge breach.

Though no buyer names, delivery dates, or monetary particulars had been leaked, the knowledge figuring out SIM playing cards is taken into account extremely delicate – because it might allow a decided felony to hijack victims’ cellphone numbers in a “SIM Swap” assault.

SK Telecom says that its engineers detected and deleted the malware risk on its community, and took the compromised community servers offline as quickly because it realised {that a} knowledge breach could have occurred. Sadly, regardless of its greatest efforts – thousands and thousands of customers’ SIM particulars might have been put in danger, and should now be within the fingers of cybercriminals.

Though SK Telecom has not confirmed the overall variety of customers whose SIM particulars have been uncovered, it has acknowledged that thousands and thousands of people might be in danger.

The excellent news is that SK Telecom says it has seen no proof that the delicate knowledge has been exploited by cybercriminals. The unhealthy information is that it would not essentially know if it had been exploited or not.

Since its breach, SK Telecom has confronted some criticism for the way in which it has communicated information of the cyber assault to its clients. Though it up to date its web site and cell app with a safety advisory, some customers felt they need to even have proactively obtained an SMS alert informing them of the scenario.

Apologising for the breach and responding to complaints about its response to the incident, SK Telecom has apologised and begun to ship out SMS notifications to clients. As well as, the corporate has stated it’s strengthening its safety within the hope of stopping related incidents in future, and pledged to have a clear inquiry into what occurred.

Hacks like this are a wake-up name for telecoms companies worldwide that they need to safe their methods towards the specter of cybercriminals and state-sponsored hackers.

And all companies can be smart to study that hackers may try and strike at anytime, day or night time, not simply throughout weekday enterprise hours.

If a hacker can exploit a window of alternative – equivalent to late within the night on a weekend – to sneak into your community undetected, they will not have any qualms about doing so.

Companies which can be dealing with important or delicate knowledge ought to guarantee their alerting methods and incident response plans work by weekends and holidays simply as simply as every other day of the week.