Samsung has confirmed that it is investigating a potential cyberattack and data breach on an internal employee platform and several systems in South Korea.
According to a statement released by Genesis Day on January 17, they targeted Samsung following an “official ceremony marking the establishment of the Republic of Korea’s Diplomatic Mission to NATO.”
The group claimed responsibility for hacking the internal File Transfer Protocol service, internal employee system, and intranet of the Samsung Group in South Korea.
They also claimed that they would be disclosing the business data files of the Samsung Group in France, the internal MFA flow chart of Samsung, the internal demonstration video of Samsung Group, the necessary steps for Samsung internal system login, the employee access credentials for the Samsung intranet system, and all Samsung employee credentials.
Additionally, they have emphasised that a severe network crash in South Korea will only bother them if they continue to take deliberate measures.
“We are aware of the recent online posting and are in the process of verifying the claim,” a Samsung spokesperson said in an interview.
Genesis Day has forewarned South Korea that they would have to deal with something even more extreme if they continue collaborating with other countries and taking targeted actions.
In 2022, Samsung faced some of its most difficult challenges yet, as it was attacked twice. The first attack happened in March when the Lapsus$ extortion organisation breached its systems and stole vast amounts of data, including the source code for the Galaxy smartphone.
The second attack came a few months later when hackers exploited a vulnerability in their U.S.-based systems in July. On August 4, the company’s security team learned that customer information had been compromised.
Both attacks significantly impacted Samsung’s reputation as a secure and reliable technology provider.
With cybercrime on the rise, all companies and organisations must take the necessary steps to protect their systems and data from malicious actors.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...