DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Kr: PIPC Sanctions LG U+ Telecom, Imposes Administrative Penalty of $5.3 Million for Breach Along with Corrective Orders

Posted on July 15, 2023 by Dissent

Press Release

July 12, 2023

(This is an unofficial translation of a press release, originally prepared in Korean.)

On July 12, the Personal Information Protection Commission (PIPC) held a plenary meeting and reached a decision to impose an administrative penalty of KRW 6.8 billion (USD 5.3 million) and an administrative fine of KRW 27 million won (USD 21,000) against telecommunications service provider LG Uplus Corp. (“LG U+”) for violations of Korea’s data privacy law that included leakage of personal data. It also issued corrective orders to prevent recurrence, including implementation of system-wide inspections and improvements aimed at reducing vulnerabilities.

It was reported in January 2023 that LG U+ had been hit by a hacking attack when the personal data of approximately 600,000 (about 300,000 when duplicates are removed) current and former customers were exposed on illegal online marketplace. The PIPC has since been conducting an in-depth investigation.

Upon analysis of the exposed data, the PIPC found that a total of 297,117 individuals had their personal data leaked in the incident. Twenty-six types of data had been stolen, including mobile phone numbers, names, addresses, birth dates, email addresses, IDs, and Universal SIM numbers. Among a multiple of systems LG U+ had in place, the Compound Authorization System (“CAS”) was found to be the one storing the sets of data that most closely matched those exposed on the dark web. The LG U+ CAS is mainly used to verify the identity of customers when they add or cancel add-on services, such as a “child protection” service. It was found that the breach took place in or around June of 2018.

The following explains major violations found as a result of the investigation on the telecommunications company’s failure to comply with the Personal Information Protection Act (PIPA).

1. Vulnerability in security infrastructure, particularly in the CAS

It was found that the service operation infrastructure and security environment around the CAS were highly vulnerable to intrusion by hackers at the time of the incident, and remained largely unchanged until when the investigation began in January this year.

Specifically, as of June 2018, most of the commercial software installed within the CAS was discontinued, or technical support for the software was terminated. These include the operating system (OS), database management system (DBMS), web server and web application server (WAS) of the CAS.

The security infrastructure required to prevent attacks, such as firewall, intrusion prevention system (IPS) and web firewall, was not adequately installed, or even when installed, corresponding security policy was not properly applied to, with some of them no longer receiving technical support at all.

In particular, pieces of malicious code called web shells that were uploaded to the CAS through its development tool in 2009 and 2018 remained undeleted until the investigation began in 2023. This revealed the failure of the system to detect web shells as well as to apply the appropriate detection and blocking policies of the IPS.

2. Failure to remove personal data after use for testing purposes

The actual operational data, including personal data, managed by the operation tool of the CAS was transferred to the development and quality validation tools for the purpose of conducting tests, but some of these data were left behind after the testing and validation. As a result, the personal data of over 10 million individuals, including those generated in 2008, remained unattended until the time of the investigation in 2023.

3. Poor data control and management practices

While dealing with a vast amount of personal data, LG U+ failed to put in place proper data control and management schemes, leaving the system vulnerable to attacks. For example, the access permissions granted to those handling personal data within the company and their access logs were not properly controlled or managed. The lack of control allowed abnormal behavior to go unnoticed, including the large-volume extraction and transmission of personal data.

The PIPC explained that LG U+ was being fined for its failure to comply with the PIPA, based on the findings of the months-long investigation. In addition to the financial penalty, corrective orders were issued on the following:

● Reinforcing the roles and responsibilities of the Chief Privacy Officer (CPO);

● Scaling up and enhancing the capabilities of the internal team designated for data protection matters;

● Reshaping the corporate strategy and plan for effective management of personal data; and

● Improving overall system dealing with personal data to reduce vulnerable areas.

As a major telecommunications company providing both wired and wireless services, LG U+ is responsible for processing a large amount of personal data of citizens. As such, the company is expected to have stringent data privacy practices in place. However, the results of the investigation indicated that the company’s overall management of the CAS did not meet the requirements for safeguarding personal data, and that it has made insufficient investment to ensure data protection and security, ultimately contributing to the incident of a massive data breach.

The PIPC expressed hope that today’s decision will serve as a turning point for businesses that typically hold and process large volumes of personal data to recognize the need to invest sufficient amount of budget and manpower for data protection. The PIPC added that this measure will provide an opportunity for businesses to reconsider the crucial role of the Chief Privacy Officer (CPO) and the relevant organization in running their business

* A PDF version of this article is attached below. 

Attachment[press release] LG Uplus sanctioned for data breach including personal information.pdf

Source: PIPC (KR)


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Hungarian police arrest suspect in cyberattacks on independent media
  • British institutions to be banned from paying ransoms to Russian hackers
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
Category: Business SectorCommentaries and AnalysesHackNon-U.S.

Post navigation

← Payroll Services Provider UKG Agrees to $6 Million Settlement in Data-Breach Lawsuit
Eleventh Circuit Requests Refined Class Definition For Data Breach Class Action →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hackers post stolen St. Paul data online as efforts to reset city employee passwords surge forward
  • Justice Department Announces Coordinated Disruption Actions Against BlackSuit (Royal) Ransomware Operations
  • NL: Hackers breach cancer screening data of almost 500,000 women
  • Violent Crypto Crimes Surge in 2025 Amid Massive Data Leaks
  • Why Ransomware Attacks Are Decreasing in 2025
  • KR: Yes24, the largest Internet bookstore in Korea, suffered its second ransomware attack in two months
  • Korea wins world’s top hacking contest for 4th consecutive year
  • 7-Zip Vulnerability Lets Hackers Write Files and Run Malicious Code
  • Connex Credit Union notifies 172,000 members of hacking incident
  • Federal judiciary says it is boosting security after cyberattack; researcher finds new leaks (CORRECTED)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Navigating Privacy Gaps and New Legal Requirements for Companies Processing Genetic Data
  • Germany’s top court holds that police can only use spyware to investigate serious crimes
  • Flightradar24 receives reprimand for violating aircraft data privacy rights
  • Nebraska Attorney General Sues GM and OnStar Over Alleged Privacy Violations
  • Federal Court Allows Privacy Related Claims to Proceed in a Proposed Class Action Lawsuit Against Motorola
  • Italian Garante Adopts Statement on Health Data and AI
  • Trump administration is launching a new private health tracking system with Big Tech’s help

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.