• 2025.10.22 (Wed)
  • All articles
  • LOGIN
  • JOIN
Global Economic Times
APEC2025KOREA가이드북
  • Synthesis
  • World
  • Business
  • Industry
  • ICT
  • Distribution Economy
  • Korean Wave News
  • Opinion
  • Arts&Culture
  • Sports
  • People & Life
  • Lee Yeon-sil Column
  • Ko Yong-chul Column
  • Photo News
  • New Book Guide
  • Cherry Garden Story
MENU
 
Home > Synthesis

SK Telecom Grapples with Years-Long Malware Intrusion, Raising Data Breach Concerns

Desk / Updated : 2025-05-19 21:46:11
  • -
  • +
  • Print

Seoul, South Korea – South Korean telecommunications giant SK Telecom (SKT) is facing mounting scrutiny following the revelation that its servers, including one storing sensitive International Mobile Equipment Identity (IMEI) numbers, were infected with malware as far back as three years ago. The alarming discovery, made in the wake of a recent USIM (Universal Subscriber Identity Module) hacking incident, has ignited concerns over potential data breaches and the security protocols employed by the nation's leading mobile carrier.

The joint public-private investigation team probing the SK Telecom cyber intrusion unveiled the findings of its second phase of inquiry today, confirming that a total of 23 servers within SKT's infrastructure were compromised by malicious software. This marks a significant increase from the initial report on April 29th, which identified five infected servers and four distinct strains of malware. The latest investigation has unearthed an additional 18 compromised servers and 21 new types of malicious code, bringing the total count to 25 unique malware variants.

Crucially, among the infected servers, 15 have undergone thorough forensic analysis. Of particular concern is the revelation that two of these compromised servers were directly linked to SKT's integrated customer authentication system. Investigators have confirmed the presence of personally identifiable information (PII), including IMEI numbers, names, dates of birth, and phone numbers, within temporary storage files on these interconnected servers.

The inclusion of IMEI-containing servers in the list of compromised systems is a significant development from the initial investigation. While the joint team stated that firewall logs from December 3, 2024, to April 24, 2025, showed no evidence of leakage of the 291,831 IMEI records present during that period, a critical gap in log data has emerged. The initial malware infection has been traced back to June 15, 2022, approximately three years prior to the USIM hacking incident that triggered the full-scale investigation. The absence of log records between June 15, 2022, and December 2, 2024, leaves a substantial window of uncertainty regarding potential data exfiltration during that extended timeframe.

During a separate press briefing, Ryu Jeong-hwan, Head of SK Telecom's Infrastructure Network Center, attempted to assuage public concerns, stating, "Based on all the records we have been able to review so far, we believe there has been no additional leakage." However, this assertion is likely to face skepticism given the prolonged period of undetected malware presence.

SK Telecom's admission that it only became aware of the three-year-old server compromise following last month's USIM hacking incident has drawn sharp criticism regarding its internal security monitoring and incident response capabilities. The fact that such a significant breach could remain undetected for such an extended period raises serious questions about the robustness of SKT's cybersecurity defenses.

Despite the confirmation of 18 infected servers, SK Telecom and government authorities have downplayed the immediate risk of widespread cloned phone incidents. Both parties cited assurances from mobile phone manufacturers that the creation of "twin phones" solely based on IMEI numbers is not feasible, as the crucial terminal authentication keys are proprietary to the manufacturers.

SK Telecom further emphasized its existing security measures, including the "Fraud Detection System (FDS)," which monitors and blocks abnormal authentication attempts across its subscriber base, and its USIM protection service. The company is also offering USIM card replacements to concerned customers as a precautionary measure. SKT has reiterated its commitment to taking full financial responsibility for any damages arising from illegal USIM or device cloning.

The ongoing investigation has also yielded insights into the nature of the malicious software involved. In addition to the "BPFDoor" family of malware, which is reportedly favored by Chinese hacker groups, a "web shell" variant was newly identified during the expanded probe. However, both authorities and SK Telecom have refrained from directly attributing the attack to any specific actor or nation-state, citing the ongoing nature of the investigation.

Ryu Je-myung, Director General of Network Policy at the Ministry of Science and ICT (Ministry of Science and ICT), highlighted the unusual characteristics of the cyber intrusion, noting, "This hacking has a different pattern from commercial and economic-purpose data theft from specific databases and trading on the dark web, so we are closely examining the motive." This statement suggests that the attackers' objectives may extend beyond simple financial gain or data resale, potentially hinting at more sophisticated espionage or disruptive motives.

The findings of the second investigation have triggered a strong backlash from opposition lawmakers. Members of the National Assembly's Science, Technology, Information and Broadcasting Communications Committee from the Democratic Party and the Rebuilding Korea Party issued a joint statement criticizing the results. They asserted that the incident unequivocally demonstrates "SK Telecom's overall poor information security management and the government's incompetence in neglecting it," signaling a potential for further political fallout and legislative scrutiny of the telecommunications giant's security practices.

The revelation of a years-long malware intrusion into SK Telecom's systems underscores the persistent and evolving threats facing critical infrastructure in the digital age. The incident serves as a stark reminder of the importance of proactive threat detection, robust security protocols, and timely incident response capabilities for organizations handling vast amounts of sensitive user data. As the investigation continues, the focus will likely shift towards determining the full scope of any potential data breach, identifying the perpetrators, and implementing stricter regulations and oversight to prevent similar incidents in the future, ensuring the security and privacy of millions of South Korean mobile subscribers.

[Copyright (c) Global Economic Times. All Rights Reserved.]

  • #NATO
  • #OTAN
  • #OECD
  • #G20
  • #globaleconomictimes
  • #Korea
  • #UNPEACEKOR
  • #micorea
  • #mykorea
  • #newsk
  • #UN
  • #UNESCO
  • #nammidongane
Desk
Desk

Popular articles

  • Korean Gold Rush Overheats as 'Kimchi Premium' Hits Dangerous Levels

  • KOSPI Sensitive to Global Headwinds Ahead of Holiday Break

  • Seoul Launches Driverless Shuttle Service in City Center

I like it
Share
  • Facebook
  • X
  • Kakaotalk
  • LINE
  • BAND
  • NAVER
  • https://globaleconomictimes.kr/article/1065617047482724 Copy URL copied.
Comments >

Comments 0

Weekly Hot Issue

  • LG Electronics Launches 'ThinQ ON' AI Home Hub to Lead Smart Home Market
  • Supersonic 'Hyperloop' Poised to Shrink South Korea, Cutting Seoul-Busan Trip to 20 Minutes
  • Traffic Congestion Levy Stifles Support for Small Businesses
  • S. Korea Ramps Up Cybersecurity with Sweeping Measures
  • Gmarket Challenges E-Commerce Leaders Coupang and Naver with 700 Billion Won Investment and Alibaba Synergy
  • Arc Flash Horror: Uncertified Adapter Blamed for Fiery Tesla Charging Explosion in Canada

Most Viewed

1
The Imminent Reality: Donald Trump's Unlikelihood for the Nobel Peace Prize as a Destroyer of International Order
2
Renewable Energy Covers 100% of Global Electricity Demand Growth in H1 2025, Marking a Turning Point in the Fossil Fuel Era
3
Early Winter Chill Grips South Korea as Seoraksan Sees First Snow
4
McDonald's 'Subtle Racism' Controversy: Korean American Denied Order After 70-Minute Wait
5
A Chemical Revolution, the Era of Metal-Organic Frameworks (MOFs) Begins: 2025 Nobel Prize in Chemistry
광고문의
임시1
임시3
임시2

Hot Issue

Chinese Researchers Unveil Ultra-Fast Analog Chip, Targeting 1,000x Nvidia Speed

Melody in the OR: Parkinson's Patient Plays Clarinet During Brain Surgery

South Korean Chip Titans Clash Over Next-Gen HBM4 Memory

South Korea to Launch Government-Led AI Certification to Combat Market Confusion

Let’s recycle the old blankets in Jeju Island’s closet instead of incinerating them.

Global Economic Times
korocamia@naver.com
CEO : LEE YEON-SIL
Publisher : KO YONG-CHUL
Registration number : Seoul, A55681
Registration Date : 2024-10-24
Youth Protection Manager: KO YONG-CHUL
Singapore Headquarters
5A Woodlands Road #11-34 The Tennery. S'677728
Korean Branch
Phone : +82(0)10 4724 5264
#304, 6 Nonhyeon-ro 111-gil, Gangnam-gu, Seoul
Copyright © Global Economic Times All Rights Reserved
  • 에이펙2025
  • APEC2025가이드북TV
  • 세종시
Search
Category
  • All articles
  • Synthesis
  • World
  • Business
  • Industry
  • ICT
  • Distribution Economy
  • Korean Wave News
  • Opinion
  • Arts&Culture
  • Sports
  • People & Life
  • Lee Yeon-sil Column
  • Ko Yong-chul Column
  • Photo News
  • New Book Guide
  • Cherry Garden Story
  • Multicultural News
  • Jobs & Workers
  • APEC 2025 KOREA GUIDE