A timeline of South Korean telco giant SKT’s data breach

Tech Crunch - May 8th, 2025
Open on Tech Crunch

In April, South Korea's telecom giant SK Telecom (SKT) suffered a cyberattack resulting in the theft of personal data of approximately 23 million customers. At a National Assembly hearing, SKT CEO Young-sang Ryu revealed that 250,000 customers switched to other providers, with potential losses of up to $5 billion if cancellation fees are waived. The breach is the most significant in the company's history, prompting a joint investigation to identify those responsible. The Personal Information Protection Committee confirmed the compromise of 25 types of data, heightening the risk of SIM swapping and surveillance.

The attack was detected on April 18, with suspicious activity found in the company's home subscriber server. SKT has been working to mitigate damage, offering SIM card protection and replacements despite supply shortages. While no secondary damages have been reported, the breach has raised concerns about security vulnerabilities, especially involving Ivanti VPN equipment used by SKT and others, allegedly exploited by China-backed hackers. This incident underscores the critical need for robust cybersecurity measures in telecom industries, especially in light of global threats linked to state-sponsored actors.

Story submitted by Fairstory

RATING

6.8
Fair Story
Consider it well-founded

The article provides a comprehensive overview of the SK Telecom data breach, detailing the scale of the incident, the company's response, and the ongoing investigation. It is timely and relevant, addressing issues of public interest such as data security and corporate accountability. However, the article could benefit from a more balanced representation of perspectives, including those of affected customers and independent experts. While the language is clear and the structure logical, the reliance on company statements without sufficient independent verification affects the overall accuracy and source quality. Enhancing the article with diverse viewpoints and more transparent methodology would improve its engagement and impact potential.

RATING DETAILS

7
Accuracy

The story provides a detailed account of the cyberattack on SK Telecom, including specific figures and timelines. It claims that personal data of approximately 23 million customers were compromised, which aligns with some sources, though discrepancies exist with other reports suggesting 25 million. The story also discusses the potential financial impact if cancellation fees are waived, estimated at $5 billion, a figure that requires further verification. Additionally, the claim that no secondary damage has been reported is consistent with the company's statements, yet it remains unverifiable without independent confirmation.

6
Balance

The article primarily presents the perspective of SK Telecom, with statements from the company's CEO and spokesperson. It lacks viewpoints from affected customers or independent cybersecurity experts, which could provide a more balanced view. The inclusion of comments from the Personal Information Protection Committee and local media adds some balance, but the article could benefit from a broader range of perspectives, particularly from consumer advocacy groups or cybersecurity analysts.

8
Clarity

The article is generally well-structured, with a logical flow of information from the initial breach discovery to the ongoing investigation and response efforts. The language is clear and concise, making the complex subject matter accessible to a general audience. However, the inclusion of technical terms like 'IMSI numbers' and 'USIM data' without explanation may hinder comprehension for some readers unfamiliar with telecommunications jargon.

7
Source quality

The article references credible sources such as SK Telecom's CEO, a company spokesperson, and the Personal Information Protection Committee. However, the reliance on statements from the company itself may introduce bias. The article would benefit from additional independent sources, such as cybersecurity experts or third-party analysts, to corroborate the company's claims and provide a more comprehensive view of the incident.

6
Transparency

The article provides a clear timeline of events and details about the data breach and SK Telecom's response. However, it lacks transparency regarding the methodology used to estimate financial losses and the potential involvement of China-backed hackers. The article could improve transparency by disclosing how these figures and claims were derived and by providing more context on the investigation process.

Sources

  1. https://www.bleepingcomputer.com/news/security/sk-telecom-cyberattack-free-sim-replacements-for-25-million-customers/
  2. https://teampassword.com/blog/2025-sk-telecom-breach
  3. https://www.usfk.mil/Media/Newsroom/News/Article/4169759/sk-telecom-breach-cyber-threat-advisory/
  4. https://www.youtube.com/watch?v=s4iTmwvE0Jg