logo
SK Group Chairman Chey apologises for massive data leak at SK Telecom

SK Group Chairman Chey apologises for massive data leak at SK Telecom

Reuters07-05-2025

SEOUL, May 7 (Reuters) - SK Group Chairman Chey Tae-won apologised on Wednesday for a massive data leak at South Korea's largest mobile carrier, SK Telecom, which has caused concern among its 23 million users over the possible theft of personal and financial information.
The data breach, which SK attributed to a malware attack, was detected on April 18 and subscribers have rushed to the carrier's outlets to replace mobile phone Universal Subscriber Identity Module (USIM) cards, which the company is offering free of charge.
Make sense of the latest ESG trends affecting companies and governments with the Reuters Sustainable Switch newsletter. Sign up here.
Advertisement · Scroll to continue
Speaking publicly for the first time since the news, Chey apologised for the concern and inconvenience to customers caused by the data breach and vowed to conduct a sweeping data security review involving outside experts.
"What I realised over this is that we've considered it an IT security matter and had people in that area handle it," Chey said when asked what he personally took away from the incident.
"I believe we need to look at this as a matter of national defence, not just (data) security."
SK Telecom has urged customers to sign up for its USIM Protection Service, which it said provided the same level of prevention as replacing a USIM card. Chey said he has signed up for the service but has not had his USIM card replaced yet.
Reporting by Jack Kim, Heekyong Yang Editing by Ed Davies
Our Standards: The Thomson Reuters Trust Principles. , opens new tab
Share X
Facebook
Linkedin
Email
Link
Purchase Licensing Rights

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Apple and Google passwords exposed
Apple and Google passwords exposed

Daily Mail​

timean hour ago

  • Daily Mail​

Apple and Google passwords exposed

Cybersecurity researchers have uncovered what they are calling the 'mother of all breaches.' They discovered a massive collection of 30 databases containing more than 16 billion individual records, including passwords, for government accounts, Apple, Google, Facebook, Telegram and more websites. Some of the datasets had vague names like 'logins' or 'credentials,' which made it hard for the team to figure out exactly what they contained. Others, however, gave clues about where the data came from. According to the researchers, the records were most likely compiled by cybercriminals using various infostealing malware , though they noted that some data may also have been collected by so-called 'white hat' hackers. The team at Cybernews, which found the records, said the information available to the wider internet was only briefly, before being locked down, but it is not possible to determine who owned the databases. With more than 5.5 billion people worldwide using the internet, researchers warned that a staggering number of individuals likely had at least some of their accounts compromised. They are now urging users across the globe to change their passwords immediately to protect their data from falling into the hands of cybercriminals. 'The inclusion of both old and recent infostealer logs makes this data particularly dangerous for organizations lacking multi-factor authentication or credential hygiene practices,' the researchers said. Cybernews noted that its researchers identified a database of 184 million records that was previously uncovered in May, found by data breach hunter and security researcher Jeremiah Fowler. 'It barely scratches the top 20 of what the team discovered,' Cybernews explained. 'Most worryingly, researchers claim new massive datasets emerge every few weeks, signaling how prevalent infostealer malware truly is.' The database of 184 million records not only contained secure login data for millions of private citizens, but also had stolen account information connected to multiple governments around the world. While looking at a small sample of 10,000 of these stolen accounts, Fowler found 220 email addresses with .gov domains, linking them to more than 29 countries, including the US, UK, Australia, Canada, China, India, Israel, and Saudi Arabia. 'This is probably one of the weirdest ones I've found in many years,' Fowler told WIRED . 'As far as the risk factor here, this is way bigger than most of the stuff I find, because this is direct access into individual accounts. This is a cybercriminal's dream working list,' the cybersecurity expert continued. In total, Fowler discovered 47 gigabytes of data with sensitive information for accounts on various sites, including Instagram, Microsoft, Netflix, PayPal, Roblox, and Discord. The best action to take right now is to change your passwords if you use any of these platforms and also activate Two-Factor Authentication, which adds another layer of security to logging in by sending a secure code to your phone or email. The unprotected database was managed by World Host Group, a web hosting and domain name provider founded in 2019. It operates over 20 brands globally, offering cloud hosting, domain services, and technical support for businesses of all sizes. Once Fowler confirmed that the exposed information was genuine, he reported the breach to World Host Group, which shut down access to the database. Seb de Lemos, CEO of World Host Group, told WIRED: 'It appears a fraudulent user signed up and uploaded illegal content to their server.' Fowler said 'the only thing that makes sense' is that the breach was the work of a cybercriminal because there's no other way to gain that much access to information from so many servers around the world. The cybersecurity expert warned that this particular breach also poses a major national security risk. Exploiting government email accounts could allow hackers and foreign agents access to sensitive or even top-secret systems. The stolen data could also be used as part of a larger phishing campaign, using one person's hacked account to gain private information from other potential victims.

Chinese EV maker Hozon enters bankruptcy proceedings, state media reports
Chinese EV maker Hozon enters bankruptcy proceedings, state media reports

Reuters

time2 hours ago

  • Reuters

Chinese EV maker Hozon enters bankruptcy proceedings, state media reports

BEIJING, June 20 (Reuters) - Zhejiang Hozon New Energy Automobile, the owner of Chinese electric vehicle brand Neta, officially entered bankruptcy proceedings on Thursday, China's state broadcaster CCTV reported on Friday. Multiple Neta stores in Shanghai have been closed, the report said. According to China's national corporate bankruptcy disclosure platform, a creditor last month filed a bankruptcy petition against the firm.

Japan plans deeper cut in super-long bond sales, no immediate buybacks eyed
Japan plans deeper cut in super-long bond sales, no immediate buybacks eyed

Reuters

time3 hours ago

  • Reuters

Japan plans deeper cut in super-long bond sales, no immediate buybacks eyed

TOKYO, June 20 (Reuters) - Japan's government plans to cut scheduled sales of super-long bonds more than initially planned in a revision to its bond issuance programme for the current fiscal year, a document released by the finance ministry showed. The revision to the annual issuance plan, coupled with the Bank of Japan's decision this week to slow its tapering of bond purchase from next fiscal year, reflects policymakers' all-out efforts to soothe market concerns after the surge in super-long yields to record highs last month. The revised issuance plan was presented to primary dealers, or financial institutions that act as market makers, for discussion at a meeting on Friday. A finance ministry official told reporters after the meeting that the ministry is not in the process right now of implementing buybacks of super-long JGBs issued in the past at low interest rates. The government will not rule out the future possibility of considering buybacks, but demand and the feasibility for such operations have to be discussed if such a step is taken, the official said. In the revised issuance plan, the government will reduce 20-year Japanese government bond (JGB) sales by 1.8 trillion yen ($12.38 billion) to 10.2 trillion yen for the year ending in March, while 30-year JGB sales will be cut by 900 billion yen, and 40-year JGB sales by 500 billion yen, according to the document. This means starting next month, sales of 20-year JGBs will be cut by 200 billion yen at every auction, larger than a reduction of 100 billion yen shown in the draft document seen by Reuters on Thursday. The planned cut for 20-year JGBs was larger to reflect opinions of market participants, the ministry official said. Total JGB sales for the year through next March are set to fall by 500 billion yen to 171.8 trillion yen, as the reductions in the super-long sector would be partly offset by increased issuance of shorter-term notes. The potential buyback of older bonds will enhance liquidity in those bonds, allowing bond dealers to trade their securities more easily and helping free up their balance sheets, which in turn help smooth issuance of new bonds. While buybacks of inflation-indexed bonds have been conducted regularly, the last time the finance ministry executed buyback operations for fixed-coupon JGBs was in fiscal year 2002 through 2008, when the government smoothed out the pace of massive redemptions scheduled for 2008. The step, similar to the buyback operations that the U.S. Treasury Department resumed last year, may take a while to be implemented as it may need a budget compilation for funding depending on the size of buybacks, as well as adjustments to the trading system. ($1 = 145.3700 yen)

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store