Overview
- The breach, undetected since June 2022, compromised 23 SK Telecom servers, exposing 9.32 GB of USIM data, equivalent to 26.9 million IMSI entries.
- Investigators confirmed 291,831 IMEI numbers were exposed, raising concerns about device cloning risks, though manufacturers state cloning requires additional encryption keys.
- Two servers temporarily stored personal data, including names, birthdays, phone numbers, and email addresses; the full scope of this data is still under review.
- SK Telecom has offered free USIM replacements for 25 million subscribers and enrolled all users in a USIM protection service to mitigate fraud risks.
- Forensic analysis on 15 of the 23 infected servers has been completed, with the remaining eight servers expected to be analyzed by the end of May.