Wednesday, January 8, 2025
HomeData BreachSamsung Hacked - Breach Exposed Customer's Personal Information

Samsung Hacked – Breach Exposed Customer’s Personal Information

Published on

Samsung suffers a data breach for second time that exposes customer information in the US. The company notified its customers regarding the breach that revealed customers’ names, addresses, and other personal information.

“An unauthorized third party acquired information from some of Samsung’s U.S. systems. We determined through our ongoing investigation that the personal information of certain customers was affected”, Samsung

Samsung said that it has taken actions to secure the affected systems, and have engaged a leading outside cybersecurity firm, and is coordinating with law enforcement.

Samsung Data Breach

According to the reports, an unauthorized third party acquired information on July 2022. On August 4, 2022 Samsung found through ongoing analysis that personal information of certain customers was affected.

The data breach does not impact Social Security numbers or credit and debit card numbers, except in some cases, may have affected information such as name, contact and demographic information, date of birth, and product registration information. 

In this case, the attackers hacked identifiable personal information, such as names and birthdays. Samsung also mentions that “demographic information” was exposed, this probably refers to advertising or marketing data, which can include thousands of variables, including occupation, gender, income, race, or location.

Particularly this incident does not affect any consumer devices and Samsung have asked the customers to continue to use their products and services as usual.

The company ensured to inform its customers directly and promised to contact for further notification.

Steps to be Implemented

  • Remain cautious of any unsolicited communications that ask for your personal information or refer you to a web page asking for personal information
  • Avoid clicking on links or downloading attachments from suspicious emails
  • Review your accounts for suspicious activity

“We have engaged leading cybersecurity experts and are coordinating with law enforcement. We will continue to work diligently to develop and implement immediate and longer-term next steps to further enhance the security across our systems”, Samsung

Secure Azure AD Conditional Access – Download Free White Paper

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

How Nation-State Actors and Organised Hackers Involving in Their Ways of Cyber Attacks

The distinction between nation-state actors and organized cybercriminals is becoming increasingly blurred.Both groups...

Washington State Filed Lawsuit Against T-Mobile Massive Data Breach

Washington State Attorney General Bob Ferguson filed a consumer protection lawsuit against T-Mobile for...

Stalwart – All-in-One Open-Source Secure Mail Server with JMAP, IMAP4, POP3, and SMTP

Stalwart is an innovative open-source mail server solution that supports JMAP, IMAP4, POP3, and...

PriveShield – Advanced Privacy Protection with Browser Profile Isolation

A browser extension named PRIVESHIELD automatically creates isolated profiles to group websites based on...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Washington State Filed Lawsuit Against T-Mobile Massive Data Breach

Washington State Attorney General Bob Ferguson filed a consumer protection lawsuit against T-Mobile for...

Hackers Compromised Argentina’s Airport Security Payroll System

Hackers have successfully infiltrated Argentina’s Airport Security Police (PSA) payroll system, raising alarms about...

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury...