South Korea is globally famous for its famous internet, covering the wide range near unwanted, as a leader in digital innovation, hosting global technology brands such as Hyundai, LG and Samsung. But this success, which made the country a major target for infiltrators and presented the fragility of cybersecurity.
The country refers to a series of prominent breaches, which affect credit card companies and communications to startups and government agencies, which affect vast areas of South Korean population. In each case, the ministries and organizers seemed to be parallel, and sometimes they postpone each other instead of moving in complete harmony.
Critics argue that the electronic defenses of South Korea are impeded by a system of ministries and government agencies, which often leads to slow and inactive responses, For all local media reports.
with There is no clear government agency that behaves in the name of “the first response” After an electronic attack, the country’s electronic defenses are fighting to keep pace with their digital ambitions.
“The government’s approach to cyber security is still largely interactive, as it treated it as a crisis management issue instead of being critical national infrastructure,” Brian Pak, CEO of Cyber Security Company in Seoul, told Techcrunch:
Back, who is also a consultant to the Special Committee of the Mother Company for Secretary of the SK Telecom for innovations on cybersecurity, said that because government agencies in charge of cybersecurity in silos, developing digital defenses and training skilled workers are often ignored.
The country also faces a severe shortage of skilled cybersecurity experts.
“This (this) is mainly because the current approach has stopped the development of the workforce. This lack of talent creates a vicious cycle. Without sufficient experience, it is impossible to build the proactive defenses required to maintain threats.”
Pak said that political stalemate has usually strengthened the search for clear “quick reforms” after each crisis, although the most difficult and long -term work to build digital flexibility is still marginalized.
This year alone, there was a major security incident in South Korea every month, which led to more concerns about the flexibility of South Korea’s digital infrastructure.
January 2025
- GS Retail, store operator and grocery markets throughout South Korea, certain Data breach, which revealed the personal details of about 90,000 customers, was attacked after their website between December 27 and January 4. The stolen information included names, birth dates, communication details, addresses and email addresses.
February 2025
April and May 2025
- South Korea’s part -time action platform Albamon was injured by a penetration attack on April 30. The penetration revealed the CV of more than 20,000 users, including names, phone numbers and email addresses.
- In April, South Korea Etisalat giant Sk Telecom was exposed to a major electronic attack. Snements stole personal data for about 23 million customers – that is, half of the country’s population. Many of the electronic attack continued until May, as millions of customers were displayed on a new SIM card after the breach.
June 2025
- Yes 24, the ticket and retail trading platform in South Korea, He was attacked ransom on June 9Which knocked on its services in a non -communication mode. The turmoil lasted for about four days, as the company returned online by mid -June.
July 2025
August 2025
- Yes 24 He faced a second attack of the ransom in August 2025That took its website and services in a few hours not connecting.
- The infiltrators stormed the Lotte Card for Financial Services in South Korea, which issued credit and discount cards between July 22 and August. The breach has been detected about 200 GB of data and it is believed to be almost an effect 3 million customers. The breach remained without anyone noticing it about 17 days ago, until the company discovered on August 31.
- Welcom Financial: August 2025, Welrix F & I, the financial lending arm, Ransom. The Russian -related piracy collection claimed that it was stolen on TERABYTE from internal files, including the customer’s sensitive data, and even the leaked samples on the dark web.
- The infiltrators associated with North Korea, believed to be a Kimsui group, were embodied on foreign embassies in South Korea for several months by hiding their attacks as routine diplomatic email. According to Trelix, the campaign was active Since March and targeted at least 19 embassies and foreign ministries In South Korea.
September 2025
- North Korea’s piracy group, Kimzoy, used Dibvik photos created by artificial intelligence in an attempt to manufacture spear against a South Korean military organization, according to the Genians Security Center. The group also targeted other South Korea institutions.
- KT, one of the largest communications operators in South Korea, has reported an electronic breach of the subscriber data from more than 5,500 customers. The attack was linked to illegal “fake base stations” that it took advantage of on the KT network, allowing the infiltrators to intercede the mobile phone movement, stealing information such as IMSI, IMEI, phone numbers, and even making small payments unauthorized.
In light of the recent increase in piracy accidents, the national security of the South Korean office interferes to tighten the defenses, Pressure for a cross -over effort in the middle that collects multiple agencies together in a coordinatorFull response from the government.
In September 2025, the National Security Office announced that it will be implemented “Comprehensive” electronic measures Through a plan between the agencies, led by the office of the South Korean President. The organizers also pointed to a legal change that gives government authority to launch investigations In the first sign of piracy – even if the companies do not submit a report. Both steps aim to address the lack of respondents, the first hindering electronic defenses of South Korea in a long time.
But the segmented South Korean regime leaves the accountability weak, which puts all power in the presidential “observation tower” that can risk “politicization” and transgression, according to PAK.
The best path may be the balance: a central body to develop strategy and coordinate crises, associated with independent supervision of energy conservation. In a hybrid model, such as expert agencies Bag He still deals with artwork – only with more rules and direct accountability, tell Pak Techcrunch.
When it was reached for the comment, a South Korean Ministry of Science spokesman said in information and communications technology that the ministry, with Kisa and other relevant agencies, said, “is committed to processing increasingly advanced and advanced Internet threats.”
The spokesman added: “We continue to work hard to reduce the potential damage of Korean companies and the public public.”
https://techcrunch.com/wp-content/uploads/2025/09/sk-telecom-breach-2211811483.jpg?resize=1200,840
Source link