Feeds

Twelve million hit as Korea suffers ANOTHER massive data breach

KT Corp caught with its passwords down for third time in two years

Internet Security Threat Report 2014

The South Korean government was forced to launch an inquiry today after another massive data breach rocked the country, time the theft of account information belonging to 12 million customers of telco KT Corp.

The Incheon Metropolitan Police said on Thursday it arrested two hackers and the CEO of a telemarketing firm last week on suspicion of infiltrating the telco giant’s servers and stealing the data, according to Yonhap.

The data grab apparently went undetected by KT for an entire year with the suspects allegedly snatching up to 300,000 records in a single day. The nabbed details included names, registration numbers and bank account info.

The South Korean telecoms ministry has now launched a probe, apparently ordering KT to inform customers about what happened and to allow them to check if they’ve been affected on a special website.

This is the third time in two years that the country’s second biggest carrier has been hit with a major data breach.

In March 2012 internal employees at KT and SK Telecom sold data on 200,000 customers to telemarketers, while in July that year hackers grabbed info on 8.7 million punters and sold it on after breaching a customer sales system.

After the last incident, KT promised to tighten up its security to avoid a repeat.

The news comes just a couple of months after an insider at the Korea Credit Bureau made off with 20 million cardholders’ details.

Even this breach, however, pales in comparison with the megahack of SK Telecom’s Cyworld social networking site and the Nate web portal which exposed data on 35 million Koreans – nearly three-quarters of the population. ®

Secure remote control for conventional and virtual desktops

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.