
A joint investigation by the Ministry of Science and ICT and the Korea Internet & Security Agency (KISA) found that the breach compromised more than 26.95 million subscriber identification numbers — a figure that exceeds the company’s reported 25 million customers.
The data breach, which was discovered last month, is believed to have gone undetected for nearly three years. Investigators determined that malicious code was first implanted on June 15, 2022, allowing attackers persistent access to SK Telecom’s internal systems through 23 compromised servers.
Officials said 25 types of malware were deployed in the attack, 24 of which exploited the Berkeley Packet Filter — a tool used to monitor network traffic that made the intrusions especially difficult to detect.
“The extracted database may include test data or temporary identifiers used by SK Telecom,” said Lee Dong-geun, head of the Korea Internet Security Center at KISA. He added that additional analysis is required to determine how many legitimate customer accounts were affected.
Initial findings from April 29 had pointed to five infected servers, but a broader investigation later revealed that 18 more systems had been compromised, significantly expanding the scope of the breach.
The revelation has raised national security concerns, with some experts arguing that the scale of the incident warrants government-level intervention beyond corporate responsibility.
Despite the scope of the intrusion, investigators said the stolen data could not be used to clone smartphones or gain physical access to mobile networks. However, SK Telecom has been directed to implement additional safeguards for potentially affected users.
The National Intelligence Service has launched security audits across central government agencies, local governments, and public institutions in response to the breach. As of Monday, no further intrusions had been detected in either public or private networks.
Copyright ⓒ Aju Press All rights reserved.