{
	"id": "44d939fe-5b51-4220-8794-426abccae42e",
	"created_at": "2026-04-06T00:12:32.03938Z",
	"updated_at": "2026-04-10T03:21:00.159164Z",
	"deleted_at": null,
	"sha1_hash": "d00f3051ff229ecacbb65552d06f9e63f7c09ebe",
	"title": "Investigation into SK Telecom data breach expands to KT, LG Uplus: sources",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 85440,
	"plain_text": "Investigation into SK Telecom data breach expands to KT, LG\r\nUplus: sources\r\nBy Kim Boram\r\nPublished: 2025-05-26 · Archived: 2026-04-05 17:17:30 UTC\r\nSEOUL, May 26 (Yonhap) -- A joint government-private investigation team looking into SK Telecom Co.'s recent\r\nlarge-scale data breach has extended its probe to the servers of two other major mobile carriers, KT Corp. and LG\r\nUplus Corp., but found no signs they have been compromised, industry sources said Monday.\r\nInitially, the team had asked local telecommunications and platform companies to conduct their own cybersecurity\r\ninspections. However, the approach was revised last week amid growing concerns that hackers using BPFDoor\r\nmalware variants may have also targeted other South Korean mobile carriers, according to the sources.\r\nFollowing the expanded investigation, no traces of hacking activity have yet been found on the servers of KT or\r\nLG Uplus, they added.\r\nIn a media briefing last week, the investigation team revealed interim findings indicating that 25 malware variants\r\nhad been discovered on 23 servers belonging to SK Telecom. These included 24 variants of the BPFDoor malware\r\nand one variant of WebCell.\r\nTwo of the affected servers had been used as temporary storage for personal data, such as names, birthdates, phone\r\nnumbers and email addresses, as well as international mobile equipment identity (IMEI) data.\r\nThe IMEI is a unique identifier for each device on a network and could potentially be exploited in financial\r\ntransactions.\r\nSK Telecom discovered the breach April 18.\r\nhttps://en.yna.co.kr/view/AEN20250526002700320\r\nPage 1 of 2\n\nThis file photo, provided by SK Telecom Co., shows its headquarters in downtown Seoul. (PHOTO\r\nNOT FOR SALE) (Yonhap)\r\nbrk@yna.co.kr\r\n(END)\r\nSource: https://en.yna.co.kr/view/AEN20250526002700320\r\nhttps://en.yna.co.kr/view/AEN20250526002700320\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://en.yna.co.kr/view/AEN20250526002700320"
	],
	"report_names": [
		"AEN20250526002700320"
	],
	"threat_actors": [],
	"ts_created_at": 1775434352,
	"ts_updated_at": 1775791260,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/d00f3051ff229ecacbb65552d06f9e63f7c09ebe.pdf",
		"text": "https://archive.orkl.eu/d00f3051ff229ecacbb65552d06f9e63f7c09ebe.txt",
		"img": "https://archive.orkl.eu/d00f3051ff229ecacbb65552d06f9e63f7c09ebe.jpg"
	}
}