Two Arrested For Hacking Personal Data of 8.7 Million Phone Users 43
An anonymous reader writes "South Korea's second largest wireless service provider has apologized after personal data of 8.7 millions of its mobile phone subscribers was stolen by hackers. The details are suspected to have been sold to marketing firms, netting the hackers close to $1 million. From the article: 'South Korean police have arrested two men who allegedly stole the personal information of about 8.7 million cellphone customers from KT Corp., the second biggest mobile carrier in South Korea. The company alerted police on July 13 after detecting traces of hacking attacks. The data was collected for the last five months, starting in February 2012.'"
Re: (Score:3)
Yes. I'm still wondering why Murdoch and his FOX ties to hacking haven't resulted in an arrest. Why are CEO's immune while 'regular' people are not?
Re: (Score:2)
Yes. I'm still wondering why Murdoch and his FOX ties to hacking haven't resulted in an arrest. Why are CEO's immune while 'regular' people are not?
They can usually erect a barrier of obfuscation between themselves and the lawbreaking. It's called plausible deniabilty.
Re: (Score:2)
It still sets a really bad precedent. If corporations are 'people', then they should be treated the same. This is one of those things that really infuriates me that corporations get away with some pretty nasty (illegal) activities, and pay a paltry fine and walk free, while average people are (rightly) jailed and prosecuted.
Re: (Score:2)
Re: (Score:2)
Yes. I'm still wondering why Murdoch and his FOX ties to hacking haven't resulted in an arrest. Why are CEO's immune while 'regular' people are not?
I believe the two in question are Asian 'regular' people.
And what happens to the marketing firms? (Score:5, Interesting)
I don't know anything about Korean law, but aren't they liable as well if they purchase goods that are stolen, or have a reasonable likelihood of being stolen?
Re: (Score:2, Funny)
They start marketing security tools would be my bet...
Re:And what happens to the marketing firms? (Score:4, Insightful)
Re: (Score:3)
I have no idea whether such laws apply to, as I would rather call it, inappropriately aquired data. After all, theft, stolen goods and handling stolen goods normally refer to physical goods. This is data we are talking about: the victims have not physically lost anything. They had data copied from their devices - which as I understand is illegal in Korea - but the device itself was not stolen.
It's an interesting point anyway; anyone has any idea how this works in other jurisdictions? Any real-world examples
Re: (Score:2)
But that's the IRS we're talking about, and if you dig a little deeper, it is qu
Re: (Score:2)
But that's the IRS we're talking about, and if you dig a little deeper, it is quite scary what powers they have in various countries. But for normal companies, using this data would be a big no-no under the kind of data protection and privacy acts we have around here.
Since you are talking about German IRS, they have the duty and huge powers to find out what your income is. They don't have any right to use this information except to get the right amount of tax from you, and possibly fine you or prosecute you for cheating on your taxes. I don't quite know what you would find scary about that.
Re: (Score:2)
But the IRS play by different rules. I doubt very m
Wtf? (Score:2)
"fter all, theft, stolen goods and handling stolen goods normally refer to physical goods"
Have you just stepped through a timewarp from the 1980s? In almost all western countries (and probably korea) theft now includes data including personal details.
"This is data we are talking about: the victims have not physically lost anything"
Christ, this argument was old in the 80s. If someone steals your personal data you have potentially lost something FAR more valuable than the physical machine they retrieved them
Re:Wtf? (Score:5, Funny)
After all if the owners had made the product available in a format and manner the would be buyers had wanted it they would not had to resort to this method to get the info.
Re: (Score:1)
No it doesn't.
Just because the popular media use terms like "stealing information", it doesn't mean that the law thinks of it that way.
English law has lots of stuff about unauthorised access to a computer system (Computer Misuse) and unauthorised processing of data (Data Protection), but nothing about "stealing" data. To "steal" is defined in the Theft Act as to commit theft, and committing theft is the dishonest appropriation of property belonging to another with intent to permanently deprive the other of
Re: (Score:1)
Didn't they loose their privacy?
Re: (Score:2)
Didn't they loose their privacy?
No, someone else loosed it.
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
I don't know anything about Korean law, but aren't they liable as well if they purchase goods that are stolen, or have a reasonable likelihood of being stolen?
My experience here in the UK is:
I used a popular car insurance comparison website when I was shopping around for cheaper car insurance. On this website I had to enter various personal details such as name, address, date of birth, claim history, etc. Soon afterwards I started receiving cold-calls in connection with the accidents in my claim history. These calls usually started by claiming to be from "the insurance company" and implying they were my insurer, without actually providing the name of the insur
Re: (Score:2)
Unfortunately they have so far declined to provide any evidence to support their position, I have no evidence to support mine, so it's my word against theirs.
No, it's not. If they have no proof you agreed, they are clearly in violation of your rights. On this respect, the burden of proof is on them, as long as you have proof that it was they who disclosed your data to third parties.
Then again, I don't really know how the enforcement of this works in the UK.
Re: (Score:2)
No, it's not. If they have no proof you agreed, they are clearly in violation of your rights.
I didn't say "they have no proof", I said "they haven't provided any proof". In any case, it hardly matters - the ICO has no interest in prosecuting.
Over 5 months in Korea? (Score:3)
Re: (Score:2)
I would imagine those users already had their personal details stolen back in July 2011 when 35 million people (practically the entire population of South Korea) had their details hacked [commandfive.com] from another telecommunications provider - SK Communications. Is this a systemic issue in South Korea?
With the South Koreans' over-reliance on Windows, yes. Added to that software monoculture are some terrible security practices. These practices are widespread in the Korean IT industry, and I'm sure would make any competent sysadmin run screaming to the hills. Part of that is there is still the old guard in play there, and due to South Korea's slow adaptation of challenging upper management due to cultural values, this problem will likely remain in place for some time still.
In America (Score:1, Interesting)
They have entire companies who do exactly this, thousands of some of the brightest minds dedicated to extracting as much data about you as possible through any measure.
they give them names like
Google
Facebook
Apple
Adobe Omniture
Comscore
Neilson
even re-defining a word for this covert spying called "analytics"
See if 1 or 2 people get your info, we call them hackers, if a gang of people under a collective name with TM symbol , then this its called a "business" in America and its actions are to be applauded.
Re: (Score:2)
we're quite far ways from facebook going and hacking my phone records -from my telephone operator- to match phonenumbers to all my contacts.
though that might be handy actually.
It's a shame really. (Score:2)
Making completely secure programs and services is possible, but it's far too expensive for today's short sighted folks.
Most say I'm a nutter for building my own OS from scratch, but I just can't find ANYONE who develops operating systems or applications with security as the highest priority. I try to exploit every line of code I write, and use a variety of unit tests involving input fuzzing, memchecks, etc to keep me honest. Sure development is slower (esp. refactoring), but I can sleep at night knowin
Re: (Score:2)
Is the code of your OS formally proven?
Nigerian hackers (Score:2)