A recent hacking incident compromised SK Telecom’s subscriber data, leading to the leak of sensitive information, including SIM card details. Users were required to change their SIM cards to secure their data after a major breach in April 2025. (Affected: SK Telecom, SKT Seven Mobile, subscribers)
Keypoints :
- SK Telecom was hacked, resulting in a significant data breach.
- Subscribers’ SIM card information was leaked due to the intrusion.
- Affected users were forced to replace their SIM cards for security.
- The hacking incident has raised concerns over user data safety.
- The malware used for the breach was analyzed for its encryption methods.
MITRE Techniques :
- T1027: Obfuscated Files or Information – The malware uses encryption routines to obscure its operations.
- T1071: Application Layer Protocol – The malware communicates over encrypted channels, making detection difficult.
- T1070: Indicator Removal on Host – Techniques were utilized to hide malicious activities post-infection.
Indicator of Compromise :
- The article mentions the use of specific malware hashes (MD5, SHA-1, SHA-256) associated with the hacking incident.
- References to IP addresses that were potentially used as Command and Control (C2) servers are indicated.
- The encryption functions (AES-NI) mentioned in the article suggest the malware’s use of sophisticated encryption techniques.
Full Story: http://wezard4u.tistory.com/429479
Views: 54