20 Million Credit Cards Compromised In South Korea

20 Million Credit Cards Compromised In South Korea

According to BBC, 20 million South Korean credit card details have been stolen in one of the biggest security robberies the country has faced, affecting almost half of the population. A contractor for the Korea Credit Bureau managed to gain access and copy 20 million unencrypted names, social security numbers and credit card details onto a USB stick.

The contractor, who has since been identified and put in custody, managed to take the information due to lack of encryption and no blockade between the contractor and the sensitive information, according to the Financial Services Commission, the financial regulator for South Korea.

Once the information had been copied, the contractor sold it to various marketing firms for unknown amounts, managers of these firms have also been arrested. The Korea Credit Bureau did not know information had been stolen until an investigation was carried out into the claims.

It is unknown where the information has got to at this point – since it involves credit card details and names, the price of this information will have skyrocketed, although security teams are now working with the bank to make sure no money is lost.

Affected users are being told to change their password and other sensitive information, to make it harder for any hackers or fraudulent criminals to gain access to their bank account.

KB Kookmin Card, Lotte Card, and NH Nonghyup Card are the three credit card groups involved with the Korea Credit Bureau, a company that produces credit scores for the three major banks. All three managers have apologized and said their bank will cover any losses. This is not the first time South Korea has been hit by cyber crime trouble, in the past two years KT Mobile has had 8.7 million subscribers’ details leaked and social-network Cyworld had a 35 million user information breach.

This is just the latest outbreak in technology security – just last week Target was hit by a major hack, compromising users data and affecting millions of customers and showing the vulnerabilities of old systems and lack of encryption.

By Walter Bailey

(Image Source: ShutterStock)

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from…