SKT hack task force investigating eight new malware strains
Published: 06 May. 2025, 16:17
![SK Telecom's logo is pictured at the firm's headquarters in Jung District, central Seoul. [NEWS1]](https://koreajoongangdaily.joins.com/data/photo/2025/05/06/dbca229d-6d51-47dd-b7cd-fe13161c8402.jpg)
SK Telecom's logo is pictured at the firm's headquarters in Jung District, central Seoul. [NEWS1]
A government-industry task force investigating the recent cyberattack on SK Telecom is examining the timing and origin of eight newly identified malware strains connected to the incident, the joint team said Tuesday.
The team is working to determine whether the newly disclosed malware variants were planted in the same home subscriber server (HSS) where four other strains were initially found or if they were planted on separate server equipment. The HSS system handles device authentication for both 4G and 5G voice subscribers.
SK Telecom first detected abnormal data traffic on March 18 at its security monitoring center. Subsequent investigation revealed malware embedded in its billing analysis systems and signs that files had been deleted.
The next day, the company confirmed that data had also been leaked from its HSS, deepening concerns about the scope of the breach.
The Korea Internet & Security Agency, which is part of the ongoing investigation, said in an advisory on Saturday that “attackers had targeted Linux systems,” and disclosed the newly identified eight additional malware samples.
The joint task force is currently conducting forensic analysis to track the location, entry point and creation time of the malicious code.
“We’re still verifying those details,” a spokesperson said of its results.
Some cybersecurity experts suspect that attackers may have exploited a vulnerability in virtual private network equipment made by IT software company Ivanti. However, it remains unclear whether SK Telecom’s Linux-based servers were using Ivanti hardware or products from other major vendors like Cisco.
The Ministry of Science and ICT, also involved in the investigation, met with the three major telecom providers as well as platform giants Naver, Kakao, Coupang and Woowa Brothers on Saturday to assess their cybersecurity readiness. The ministry urged these companies to thoroughly examine their systems for malware linked to the SK Telecom breach.
Translated from the JoongAng Ilbo using generative AI and edited by Korea JoongAng Daily staff.
BY JEONG JAE-HONG [[email protected]]
with the Korea JoongAng Daily
To write comments, please log in to one of the accounts.
Standards Board Policy (0/250자)