SK Telecom’s Malware Mishap: A 3-Year Comedy of Errors Exposed
SK Telecom revealed its security breach began in 2022, exposing USIM data of 27 million users. The telecom giant detected the breach in April 2025, after malware had a three-year head start. They’re now swapping SIM cards and bolstering security like it’s an Olympic event, ensuring no unauthorized number porting occurs.

Hot Take:
SK Telecom’s malware breach is like finding out that your house has been haunted by ghosts for three years, and no one noticed! The telecom giant was apparently ghosting its own cybersecurity protocols since 2022, with malware having a house party inside their systems. If this was a game of hide-and-seek, the malware just won the championship. Who knew that the scariest thing about your phone bill might actually be the security practices behind it?
Key Points:
– SK Telecom’s breach began in 2022 but was only detected in April 2025.
– The breach exposed the USIM data of 27 million users.
– SK Telecom is replacing all SIM cards to counter SIM-swapping threats.
– The Personal Information Protection Committee mandated user notification of data compromise by May 9, 2025.
– A total of 25 types of malware were found across 23 infected servers.