Tuesday, January 7, 2025
HomeData BreachSamsung Hacked - Breach Exposed Customer's Personal Information

Samsung Hacked – Breach Exposed Customer’s Personal Information

Published on

Samsung suffers a data breach for second time that exposes customer information in the US. The company notified its customers regarding the breach that revealed customers’ names, addresses, and other personal information.

“An unauthorized third party acquired information from some of Samsung’s U.S. systems. We determined through our ongoing investigation that the personal information of certain customers was affected”, Samsung

Samsung said that it has taken actions to secure the affected systems, and have engaged a leading outside cybersecurity firm, and is coordinating with law enforcement.

Samsung Data Breach

According to the reports, an unauthorized third party acquired information on July 2022. On August 4, 2022 Samsung found through ongoing analysis that personal information of certain customers was affected.

The data breach does not impact Social Security numbers or credit and debit card numbers, except in some cases, may have affected information such as name, contact and demographic information, date of birth, and product registration information. 

In this case, the attackers hacked identifiable personal information, such as names and birthdays. Samsung also mentions that “demographic information” was exposed, this probably refers to advertising or marketing data, which can include thousands of variables, including occupation, gender, income, race, or location.

Particularly this incident does not affect any consumer devices and Samsung have asked the customers to continue to use their products and services as usual.

The company ensured to inform its customers directly and promised to contact for further notification.

Steps to be Implemented

  • Remain cautious of any unsolicited communications that ask for your personal information or refer you to a web page asking for personal information
  • Avoid clicking on links or downloading attachments from suspicious emails
  • Review your accounts for suspicious activity

“We have engaged leading cybersecurity experts and are coordinating with law enforcement. We will continue to work diligently to develop and implement immediate and longer-term next steps to further enhance the security across our systems”, Samsung

Secure Azure AD Conditional Access – Download Free White Paper

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Android Security Updates: Patch for Critical RCE Vulnerabilities

The January 2025 Android Security Bulletin has issued important updates regarding critical vulnerabilities that...

India’s Draft Digital Personal Data Protection Rules

India has unveiled its draft Digital Personal Data Protection Rules, designed to operationalize the...

Hackers Compromised Argentina’s Airport Security Payroll System

Hackers have successfully infiltrated Argentina’s Airport Security Police (PSA) payroll system, raising alarms about...

PoC Exploit Released for Critical OpenSSH Vulnerability (CVE-2024-6387)

An alarming new development emerged in the cybersecurity landscape with the release of a...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Hackers Compromised Argentina’s Airport Security Payroll System

Hackers have successfully infiltrated Argentina’s Airport Security Police (PSA) payroll system, raising alarms about...

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury...

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...