What Did the Hacker Seek in the Successful SKT Breach Three Years Ago?

2025-05-20 08:32
Blockmedia
Blockmedia
What Did the Hacker Seek in the Successful SKT Breach Three Years Ago?

Image source: Block Media

SK Telecom Faces Major Data Breach Unnoticed for Three Years

SK Telecom, South Korea’s leading telecom company, experienced a complex cyberattack that remained undetected for three years, revealing significant gaps in its cybersecurity infrastructure. The breach targeted critical servers containing subscriber information stored in SIM modules, potentially exposing sensitive personal data, as confirmed by a joint investigation team of government and private sector experts.

Hackers infiltrated SK Telecom's systems using sophisticated malware, causing concern over the prolonged undetected attack and its potential ramifications. Forensic analysis indicated that malicious actors embedded hacking programs within key servers as far back as 2022.

Critical Servers Targeted for Subscriber Data

The investigation identified servers temporarily storing sensitive subscriber information such as International Mobile Equipment Identity (IMEI), names, birthdates, phone numbers, and email addresses. Despite no conclusive evidence of data exfiltration for the period from December 2022 to April 24, 2023, experts warn that gaps in server log records suggest IMEI data may have been stolen earlier.

A cybersecurity expert labeled the attack as an advanced persistent threat (APT), describing it as "a meticulously planned and sustained operation designed to evade detection while targeting organizational vulnerabilities." Inadequate defensive measures contributed to the extended exposure.

Discovery of Backdoors and Initial Entry via Web Shells

In-depth analysis by the investigative team revealed 23 infected Linux servers out of 30,000 examined during four rounds of inspections. Hackers used multiple tools, including BPFdoor, a stealthy backdoor program that infiltrates systems and extracts critical data. This backdoor activates only upon receiving a specific signal, making it nearly impossible to detect with standard security measures. Once activated, attackers could execute commands, gain unauthorized access, and exfiltrate data.

The initial attack vector involved web shells—malicious script files embedded within web systems. These scripts allowed hackers to remotely control servers through standard web browsers. Lee Dong-geun, director of the Digital Threat Response Bureau at the Korea Internet & Security Agency (KISA), noted that the use of web shells was crucial in determining the breach timeline and tracking initial compromises.

So far, 26.96 million records of subscriber identification numbers (IMSI) have been confirmed stolen. However, no IMEI details or critical personal information for phone cloning appear to have been leaked, according to the investigative team's findings.

Initial Intrusion Traced Back to 2022, Data at Risk for Three Years

Further investigations revealed critical developments surrounding the breach timeline. Malware found on two customer authentication-linked servers traced back to June 2022. These servers temporarily stored IMEI numbers and sensitive personal details, forming a potential treasure trove for hackers. However, firewalls recorded no evidence of data leaks from December 2022 through April 2023, leaving the previous two years with missing records.

Authorities and law enforcement are now analyzing the spread of IMEI data on darknet forums to determine if any stolen information has surfaced commercially. SK Telecom has reported investigating 390,000 customer complaints about potential misuse without uncovering further unauthorized leaks.

Commenting on the risks, cybersecurity experts speculate that the malware's entry into the system may predate June 2022, potentially extending the risk exposure timeline. "The prolonged intrusion suggests the breach may have extended deeper than currently disclosed, with more information possibly compromised," one expert stated.

Calls for Systemic Overhaul in Security Protocols

The incident highlights the urgent need for a comprehensive overhaul of cybersecurity protocols. Experts stress the importance of evaluating whether the compromised systems were classified as critical infrastructure and included in Information Security Management Systems (ISMS). Critics argue that existing security frameworks, designed during the 3G era, do not adequately address modern 5G technology challenges.

Professor Won Yoo-jae from Chungnam National University pointed out the shortcomings in private-sector responses. "Despite numerous incidents since the 2003 SQL Slammer worm crisis, private companies have not modernized security measures to meet evolving demands," he said.

Meanwhile, both SK Telecom and the investigative team have downplayed the risk of phone cloning. Ryu Je-myeong, director of the Network Policy Bureau at the Ministry of Science and ICT, stated, "IMEI is composed of a 15-digit number combination, and manufacturers agree that cloning phones using just these numbers is unlikely." He added that SK Telecom has expedited internal upgrades to its Fraud Detection System (FDS) to mitigate future risks.

Broader Implications for Corporate Cybersecurity

SK Telecom’s data breach underscores the increasing complexity of corporate cybersecurity threats, as attackers employ more sophisticated tactics and extended timelines. It serves as a stark reminder that cybersecurity cannot remain reactive but must evolve proactively, especially for companies managing critical infrastructure and sensitive data archives. Stakeholders across industries are now likely to revisit and reinforce their security frameworks to prevent similar incidents.

View original content to download multimedia: https://www.blockmedia.co.kr/archives/911006

Recommended News