Arrested South Korean Hackers Made Nearly $1M Off 8.7M Accounts
July 30, 2012 12:23 PM
comment(s) - last by
Pair is accused of terrorizing South Korea's second largest carrier
In February 2012 a pair of hackers allegedly developed a "sophisticated" software platform designed to hack the databases of KT Corp. (
), the second largest mobile carrier in South Korea.
The hackers obtained details on over half the carrier's customers, gaining information on 8.7 million of approximately 16 million accounts on the carrier. The hackers allegedly then sold their software and the records -- including customers' names, phone numbers, residential registration numbers, and contract details -- to several telemarketing firms for $878K USD (1 billion Won). The telemarketers used the information to solicit customers to switch to other carriers.
But the joy ride appears to be over as the pair who sold the information is allegedly in custody. Seven other individuals who purchased the software and illegally copied data were also arrested.
KT Corp. emphasizes that the intrusion was very sophisticated,
, "It took nearly seven months to develop the hacking program and (the suspects) had very sophisticated hacking skills. In light of this incident, we will strengthen the internal security system and raise awareness of security among all employees to prevent causing inconvenience to customers."
KT Comms was victimized by hackers and now faces class action lawsuits.
[Image Source: Slashgear]
They add that they are sincerely sorry for the impact on customers, stating, "We deeply bow our head in apology for having your precious personal information leaked... we'll try our best to make such things never happen again."
The carrier is facing a class action lawsuit from customers for the hack, despite its openness about the breach and its apology. The company first detected the breach on July 13 and alerted authorities immediately.
While the exact methodology of the attack has not been widely publicized, it's possible the South Korean hackers exploited weakness in the link to the SQL database -- a popular means of grabbing internet-accessible data.
While many companies have tightened security on the databases themselves, the links remain vulnerable as many popular corporate software packages have certain well-known errors where they mishandle strings. These errors allow hackers to execute disallowed commands, gaining the same access as company employees. The method is known as
as it involves "injecting" the command into an otherwise harmless string of text.
Recent American companies to fall victim to that attack methodology include NVIDIA Corp. (
forums accounts were compromised
, and Yahoo! Inc. (
news accounts were compromised
Last year South Korea the nation's largest carrier, SK Comms (
) recently announced that over
35 million records had been illegally copied
from its database by hackers in China. And in Nov. 2011 Nexon Korea Corp., one of the nation's top online gaming companies, had 13 million user records illegally copied.
This article is over a month old, voting and posting comments is disabled
RE: why is this sort of thing still happening?
7/31/2012 4:19:06 AM
It's not as simple as either of you make it seem. New vulnerabilities are always popping up. Have you ever used any open source content management systems? You have to patch the core and every module on nearly a daily basis because of the constant flood of vulnerabilities being discovered all the time. The bad guys are working every bit as hard to get in as the good guys are trying to keep them out.
Security is a huge ball of wax and NEVER 100% no matter how much money or manpower you put into it.
RE: why is this sort of thing still happening?
8/3/2012 3:58:46 AM
Been using Drupal for 5 years now, and there have not been any wide-open and obvious security holes in that time. No SQL injection vulnerabilities at all in Drupal 5, 6 and 7 core. And while there have been lots of cross-site scripting vulnerabilities found, most were limited to users with special permissions so were no issue. Sure there have been many other kinds of mistakes and vulnerabilities, many highly critical in the right circumstances, so yes, it is important to monitor their security advisory and keep your version updated.
But the point was about the most obvious and stupid vulnerability - SQL injection, and how widespread it is yet how easy it is to avoid if the coder cared to understand it.
"You can bet that Sony built a long-term business plan about being successful in Japan and that business plan is crumbling." -- Peter Moore, 24 hours before his Microsoft resignation
NVIDIA: We've Been Hacked, User Records Lost
July 13, 2012, 6:00 PM
Yahoo Loses 453,000 User Passwords to Hackers
July 12, 2012, 4:45 PM
Nokia is the Victim of SQL Injection, Loses Developer Records
August 29, 2011, 8:37 AM
Chinese Hackers Score Heist of 35 Million South Koreans' Personal Info
July 28, 2011, 9:43 AM
Retiree Sues Apple For $7,500 for Wiping Honeymoon Photos From His iPhone
November 30, 2015, 10:23 AM
iPhone 7 May Pack 3-4 GB Memory, More Storage; 4-Inch Comeback is Rumored
November 20, 2015, 10:12 PM
OnePlus One, OnePlus 2 Will Receive Android Marshmallow in Q1 2016
November 16, 2015, 9:58 AM
Lenovo Whoa: Motorola Droid MAXX 2 and Turbo 2 Break Cover in Leaks
October 26, 2015, 3:12 PM
Leak: Apple Preps for First Real Android App Foray With New Apple Music App
October 24, 2015, 1:59 PM
Pepsi Smartphone? Empty Calories Coming Soon to the Midrange
October 12, 2015, 11:41 PM
Latest Blog Posts
Sceptre Airs 27", 120 Hz. 1080p Monitor/HDTV w/ 5 ms Response Time for $220
Dec 3, 2014, 10:32 PM
Costco Gives Employees Thanksgiving Off; Wal-Mart Leads "Black Thursday" Charge
Oct 29, 2014, 9:57 PM
"Bear Selfies" Fad Could Turn Deadly, Warn Nevada Wildlife Officials
Oct 28, 2014, 12:00 PM
The Surface Mini That Was Never Released Gets "Hands On" Treatment
Sep 26, 2014, 8:22 AM
ISIS Imposes Ban on Teaching Evolution in Iraq
Sep 17, 2014, 5:22 PM
More Blog Posts
Copyright 2016 DailyTech LLC. -
Terms, Conditions & Privacy Information