Feeds

Naver raver charged over 25 MEEELLION account breach palaver

£90,000 heist made possible after South Korean portal yields its secrets

Protecting users from Firesheep and other Sidejacking attacks with SSL

A 31-year-old South Korean has been charged with using stolen personal information to hack the online accounts of 25 million users of the country’s popular Naver portal.

The Asian nation’s National Police Agency said the suspect purchased the data – including names, addresses, internet IDs and passwords – back in August last year, according to the Korea Herald.

The man, surnamed Seo, apparently then used the details to hack the accounts and send out spam messages and other “illicit emails”, the content of which is not mentioned in the report.

Seo is said to have made 160 million won (£90,000) worth of ill-gotten gains.

Also nabbed was a hacker by the name of Hong who developed information slurping malware. Some of the personal info he lifted from Naver subscribers was apparently used by Seo to log-in to the accounts.

The police charged three accomplices of Seo and are broadening the investigation to 86 others who are said to have bought malware developed by Hong.

For the record, a Naver spokesman distanced the company from the attack, telling the paper that the problem was down to the ready availability of personal info on the black market in Korea and not the fault of the internet giant.

He’s got a point. South Korea has seen a spate of high profile mega-breaches of late, exposing the data of tens of millions of locals.

Earlier this month account information belonging to 12 million customers of telco KT Corp was half-inched.

In January it emerged that the personal details of around 20 million people may have been breached after an employee at the Korea Credit Bureau was arrested on suspicion of selling the data to marketing firms.

However, the biggest so far was the attack on social site Cyworld and the Nate web portal, which exposed personal details on as many as 35 million users. ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.