Feeds

Naver raver charged over 25 MEEELLION account breach palaver

£90,000 heist made possible after South Korean portal yields its secrets

Beginner's guide to SSL certificates

A 31-year-old South Korean has been charged with using stolen personal information to hack the online accounts of 25 million users of the country’s popular Naver portal.

The Asian nation’s National Police Agency said the suspect purchased the data – including names, addresses, internet IDs and passwords – back in August last year, according to the Korea Herald.

The man, surnamed Seo, apparently then used the details to hack the accounts and send out spam messages and other “illicit emails”, the content of which is not mentioned in the report.

Seo is said to have made 160 million won (£90,000) worth of ill-gotten gains.

Also nabbed was a hacker by the name of Hong who developed information slurping malware. Some of the personal info he lifted from Naver subscribers was apparently used by Seo to log-in to the accounts.

The police charged three accomplices of Seo and are broadening the investigation to 86 others who are said to have bought malware developed by Hong.

For the record, a Naver spokesman distanced the company from the attack, telling the paper that the problem was down to the ready availability of personal info on the black market in Korea and not the fault of the internet giant.

He’s got a point. South Korea has seen a spate of high profile mega-breaches of late, exposing the data of tens of millions of locals.

Earlier this month account information belonging to 12 million customers of telco KT Corp was half-inched.

In January it emerged that the personal details of around 20 million people may have been breached after an employee at the Korea Credit Bureau was arrested on suspicion of selling the data to marketing firms.

However, the biggest so far was the attack on social site Cyworld and the Nate web portal, which exposed personal details on as many as 35 million users. ®

Internet Security Threat Report 2014

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.