Carrier SKT mandated to suspend new subscriptions until SIM supply issue is rectified
Breaking News:
Travelers at Incheon International Airport on May 1 swarm the SK Telecom roaming center for new SIM cards.
The Saga Continues:
The SK Telecom data breach investigation carried on into May, with several critical updates since the initial discovery on April 18.
Government Intervention:
South Korea's Ministry of Science and ICT initiated a joint public-private investigation, aiming to uncover the root cause within a duration of 1-2 months. It was revealed that the breach originated from malware-infected billing equipment, with unusual data exfiltration detected at 11:20 p.m. on April 18. By April 19, SKT had isolated the infected systems and identified risks to their Home Subscriber Server (HSS), which facilitates 4G/5G authentication [1][2].
Initial Impact:
- Stolen Data: Approximately 9.7 GB of USIM-related subscriber data was leaked, the equivalent of around 9,000 books [1][2].
- Regulatory Action: The Ministry ordered SKT to halt new subscriptions and number transfers until USIM shortages are resolved [3].
- Legal Consequences: A class-action lawsuit, involving 50,000 members, has emerged, with four plaintiffs claiming 10 million won ($7,300) each [1].
React and Protect:
SKT is providing complimentary USIM replacements (valued at up to 200 billion won/$146 million) and a SIM protection service that blocks unauthorized device changes [1][2]. Over 72,000 users have enrolled in the protection service post-breach, though USIM shortages have resulted in service delays, particularly at high-traffic areas like airports [3].
Monetary Woes:
SKT has endured a $643 million loss in market capitalization and faces immediate expenses from replacements, fines, and legal claims [2][3]. The breach affects its 25 million subscribers, representing half of South Korea's population [3].
As of April 23, no confirmed cases of data misuse had surfaced, but ongoing investigations continue into potential exploitation [4].
- The new SIM cards at the SK Telecom roaming center at Incheon International Airport became a hotspot for travelers on May 1, due to the ongoing data breach investigation.
- With the international business community closely watching SK Telecom, the investigation into the data breach has revealed that the root cause was malware-infected billing equipment.
- To protect their customers, SK Telecom is offering complimentary USIM replacements and a SIM protection service that blocks unauthorized device changes, which has seen over 72,000 enrollments post-breach, particularly at high-traffic areas such as airports.
- As a result of the data breach, SK Telecom has suffered a $643 million loss in market capitalization and faces immediate expenses from replacements, fines, and legal claims.
- Amidst concerns over potential exploitation of the stolen data, descriptions of the technology used by SK Telecom and the specific airport systems could provide valuable insights to the ongoing investigations.
