• 2025.09.10 (Wed)
  • All articles
  • LOGIN
  • JOIN
Global Economic Times
APEC2025KOREA가이드북
  • Synthesis
  • World
  • Business
  • Industry
  • ICT
  • Distribution Economy
  • Korean Wave News
  • Opinion
  • Arts&Culture
  • Sports
  • People & Life
  • Lee Yeon-sil Column
  • Ko Yong-chul Column
  • Photo News
  • New Book Guide
  • Cherry Garden Story
MENU
 
Home > Synthesis

SK Telecom Grapples with Years-Long Malware Intrusion, Raising Data Breach Concerns

Desk / Updated : 2025-05-19 21:46:11
  • -
  • +
  • Print

Seoul, South Korea – South Korean telecommunications giant SK Telecom (SKT) is facing mounting scrutiny following the revelation that its servers, including one storing sensitive International Mobile Equipment Identity (IMEI) numbers, were infected with malware as far back as three years ago. The alarming discovery, made in the wake of a recent USIM (Universal Subscriber Identity Module) hacking incident, has ignited concerns over potential data breaches and the security protocols employed by the nation's leading mobile carrier.

The joint public-private investigation team probing the SK Telecom cyber intrusion unveiled the findings of its second phase of inquiry today, confirming that a total of 23 servers within SKT's infrastructure were compromised by malicious software. This marks a significant increase from the initial report on April 29th, which identified five infected servers and four distinct strains of malware. The latest investigation has unearthed an additional 18 compromised servers and 21 new types of malicious code, bringing the total count to 25 unique malware variants.

Crucially, among the infected servers, 15 have undergone thorough forensic analysis. Of particular concern is the revelation that two of these compromised servers were directly linked to SKT's integrated customer authentication system. Investigators have confirmed the presence of personally identifiable information (PII), including IMEI numbers, names, dates of birth, and phone numbers, within temporary storage files on these interconnected servers.

The inclusion of IMEI-containing servers in the list of compromised systems is a significant development from the initial investigation. While the joint team stated that firewall logs from December 3, 2024, to April 24, 2025, showed no evidence of leakage of the 291,831 IMEI records present during that period, a critical gap in log data has emerged. The initial malware infection has been traced back to June 15, 2022, approximately three years prior to the USIM hacking incident that triggered the full-scale investigation. The absence of log records between June 15, 2022, and December 2, 2024, leaves a substantial window of uncertainty regarding potential data exfiltration during that extended timeframe.

During a separate press briefing, Ryu Jeong-hwan, Head of SK Telecom's Infrastructure Network Center, attempted to assuage public concerns, stating, "Based on all the records we have been able to review so far, we believe there has been no additional leakage." However, this assertion is likely to face skepticism given the prolonged period of undetected malware presence.

SK Telecom's admission that it only became aware of the three-year-old server compromise following last month's USIM hacking incident has drawn sharp criticism regarding its internal security monitoring and incident response capabilities. The fact that such a significant breach could remain undetected for such an extended period raises serious questions about the robustness of SKT's cybersecurity defenses.

Despite the confirmation of 18 infected servers, SK Telecom and government authorities have downplayed the immediate risk of widespread cloned phone incidents. Both parties cited assurances from mobile phone manufacturers that the creation of "twin phones" solely based on IMEI numbers is not feasible, as the crucial terminal authentication keys are proprietary to the manufacturers.

SK Telecom further emphasized its existing security measures, including the "Fraud Detection System (FDS)," which monitors and blocks abnormal authentication attempts across its subscriber base, and its USIM protection service. The company is also offering USIM card replacements to concerned customers as a precautionary measure. SKT has reiterated its commitment to taking full financial responsibility for any damages arising from illegal USIM or device cloning.

The ongoing investigation has also yielded insights into the nature of the malicious software involved. In addition to the "BPFDoor" family of malware, which is reportedly favored by Chinese hacker groups, a "web shell" variant was newly identified during the expanded probe. However, both authorities and SK Telecom have refrained from directly attributing the attack to any specific actor or nation-state, citing the ongoing nature of the investigation.

Ryu Je-myung, Director General of Network Policy at the Ministry of Science and ICT (Ministry of Science and ICT), highlighted the unusual characteristics of the cyber intrusion, noting, "This hacking has a different pattern from commercial and economic-purpose data theft from specific databases and trading on the dark web, so we are closely examining the motive." This statement suggests that the attackers' objectives may extend beyond simple financial gain or data resale, potentially hinting at more sophisticated espionage or disruptive motives.

The findings of the second investigation have triggered a strong backlash from opposition lawmakers. Members of the National Assembly's Science, Technology, Information and Broadcasting Communications Committee from the Democratic Party and the Rebuilding Korea Party issued a joint statement criticizing the results. They asserted that the incident unequivocally demonstrates "SK Telecom's overall poor information security management and the government's incompetence in neglecting it," signaling a potential for further political fallout and legislative scrutiny of the telecommunications giant's security practices.

The revelation of a years-long malware intrusion into SK Telecom's systems underscores the persistent and evolving threats facing critical infrastructure in the digital age. The incident serves as a stark reminder of the importance of proactive threat detection, robust security protocols, and timely incident response capabilities for organizations handling vast amounts of sensitive user data. As the investigation continues, the focus will likely shift towards determining the full scope of any potential data breach, identifying the perpetrators, and implementing stricter regulations and oversight to prevent similar incidents in the future, ensuring the security and privacy of millions of South Korean mobile subscribers.

[Copyright (c) Global Economic Times. All Rights Reserved.]

  • #NATO
  • #OTAN
  • #OECD
  • #G20
  • #globaleconomictimes
  • #Korea
  • #UNPEACEKOR
  • #micorea
  • #mykorea
  • #newsk
  • #UN
  • #UNESCO
  • #nammidongane
Desk
Desk

Popular articles

  • Despite Tariff Windfall, U.S. Federal Deficit Widens by $109 Billion

  • Mitsubishi Pulls Out of Japanese Offshore Wind Projects Amid Soaring Costs

  • Burger King Fined ₩300 Million by Fair Trade Commission for Forcing Franchisees to Use Specific Cleaning Products and Tomatoes

I like it
Share
  • Facebook
  • X
  • Kakaotalk
  • LINE
  • BAND
  • NAVER
  • https://www.globaleconomictimes.kr/article/1065617047482724 Copy URL copied.
Comments >

Comments 0

Weekly Hot Issue

  • U.S. Expresses Regret Over Israeli Airstrike in Qatar, Backs Goal of Eliminating Hamas
  • Lim Young-woong's Seoul Concert Sells Out, Proving His Immense Ticket Power
  • Samsung's AI Prowess Dominates South Korea, but Lags on the Global Stage
  • Paraguayan Ambassador to US Claims China is Attempting to Interfere in Domestic Affairs
  • “The Judiciary, Public Prosecutor's Office, and Political Sphere Have Been Captured and Subordinated”
  • Paraguay's Anti-Money Laundering Efforts: Banking Sector Sees Surge in Suspicious Transactions in 2025

Most Viewed

1
Sexual Misconduct Controversy in the Cho Kuk Innovation Party: The Repeated Lack of Self-Purification in the Political Sphere
2
Mitsubishi Pulls Out of Japanese Offshore Wind Projects Amid Soaring Costs
3
Brazil Weighs Legal Action as U.S. Tariffs Escalate Trade Tensions
4
Jung Hoo Lee's Heroics Propel Giants to Walk-Off Victory
5
US Ends 'De Minimis' Exemption Permanently, No Exceptions for Any Country
광고문의
임시1
임시3
임시2

Hot Issue

Apple Unveils 'iPhone Air,' the Thinnest iPhone Ever, Starting at ₩1.59 Million in South Korea

Samsung's AI Prowess Dominates South Korea, but Lags on the Global Stage

An infant was injured by a stone thrown by a chimpanzee at a zoo in China, sparking concern among visitors.

AI Boom Fuels Memory Market Growth

China’s online public opinion manipulation goes beyond Korea

Global Economic Times
korocamia@naver.com
CEO : LEE YEON-SIL
Publisher : KO YONG-CHUL
Registration number : Seoul, A55681
Registration Date : 2024-10-24
Youth Protection Manager: KO YONG-CHUL
Singapore Headquarters
5A Woodlands Road #11-34 The Tennery. S'677728
Korean Branch
Phone : +82(0)10 4724 5264
#304, 6 Nonhyeon-ro 111-gil, Gangnam-gu, Seoul
Copyright © Global Economic Times All Rights Reserved
  • 에이펙2025
  • 우리방송
  • APEC2025가이드북TV
Search
Category
  • All articles
  • Synthesis
  • World
  • Business
  • Industry
  • ICT
  • Distribution Economy
  • Korean Wave News
  • Opinion
  • Arts&Culture
  • Sports
  • People & Life
  • Lee Yeon-sil Column
  • Ko Yong-chul Column
  • Photo News
  • New Book Guide
  • Cherry Garden Story
  • Multicultural News
  • Jobs & Workers
  • APEC 2025 KOREA GUIDE