Tuesday, April 1, 2025
HomeData BreachSamsung Hacked - Breach Exposed Customer's Personal Information

Samsung Hacked – Breach Exposed Customer’s Personal Information

Published on

SIEM as a Service

Follow Us on Google News

Samsung suffers a data breach for second time that exposes customer information in the US. The company notified its customers regarding the breach that revealed customers’ names, addresses, and other personal information.

“An unauthorized third party acquired information from some of Samsung’s U.S. systems. We determined through our ongoing investigation that the personal information of certain customers was affected”, Samsung

Samsung said that it has taken actions to secure the affected systems, and have engaged a leading outside cybersecurity firm, and is coordinating with law enforcement.

Samsung Data Breach

According to the reports, an unauthorized third party acquired information on July 2022. On August 4, 2022 Samsung found through ongoing analysis that personal information of certain customers was affected.

The data breach does not impact Social Security numbers or credit and debit card numbers, except in some cases, may have affected information such as name, contact and demographic information, date of birth, and product registration information. 

In this case, the attackers hacked identifiable personal information, such as names and birthdays. Samsung also mentions that “demographic information” was exposed, this probably refers to advertising or marketing data, which can include thousands of variables, including occupation, gender, income, race, or location.

Particularly this incident does not affect any consumer devices and Samsung have asked the customers to continue to use their products and services as usual.

The company ensured to inform its customers directly and promised to contact for further notification.

Steps to be Implemented

  • Remain cautious of any unsolicited communications that ask for your personal information or refer you to a web page asking for personal information
  • Avoid clicking on links or downloading attachments from suspicious emails
  • Review your accounts for suspicious activity

“We have engaged leading cybersecurity experts and are coordinating with law enforcement. We will continue to work diligently to develop and implement immediate and longer-term next steps to further enhance the security across our systems”, Samsung

Secure Azure AD Conditional Access – Download Free White Paper

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Massive 400GB X (Twitter) Data Leak Surfaces on Hacker Forums

A colossal 400GB trove containing data from 2.873 billion X (formerly Twitter) users has...

PortSwigger Launches Burp AI to Enhance Penetration Testing with AI

PortSwigger, the makers of Burp Suite, has taken a giant leap forward in the...

Chord Specialty Dental Partners Data Breach Exposes Customer Personal Data

Chord Specialty Dental Partners is under scrutiny after revealing a data breach that compromised...

Kentico Xperience CMS XSS Vulnerability Allows Remote Code Execution

Kentico Xperience CMS, a widely used platform designed for enterprises and organizations, is under...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Massive 400GB X (Twitter) Data Leak Surfaces on Hacker Forums

A colossal 400GB trove containing data from 2.873 billion X (formerly Twitter) users has...

Chord Specialty Dental Partners Data Breach Exposes Customer Personal Data

Chord Specialty Dental Partners is under scrutiny after revealing a data breach that compromised...

LensDeal Data Breach Exposes 100,000 Customers’ Personal Information

A major data breach involving LensDeal, a Netherlands-based contact lens supplier, has reportedly exposed...