Friday, February 21, 2025
HomeData BreachSamsung Hacked - Breach Exposed Customer's Personal Information

Samsung Hacked – Breach Exposed Customer’s Personal Information

Published on

SIEM as a Service

Follow Us on Google News

Samsung suffers a data breach for second time that exposes customer information in the US. The company notified its customers regarding the breach that revealed customers’ names, addresses, and other personal information.

“An unauthorized third party acquired information from some of Samsung’s U.S. systems. We determined through our ongoing investigation that the personal information of certain customers was affected”, Samsung

Samsung said that it has taken actions to secure the affected systems, and have engaged a leading outside cybersecurity firm, and is coordinating with law enforcement.

Samsung Data Breach

According to the reports, an unauthorized third party acquired information on July 2022. On August 4, 2022 Samsung found through ongoing analysis that personal information of certain customers was affected.

The data breach does not impact Social Security numbers or credit and debit card numbers, except in some cases, may have affected information such as name, contact and demographic information, date of birth, and product registration information. 

In this case, the attackers hacked identifiable personal information, such as names and birthdays. Samsung also mentions that “demographic information” was exposed, this probably refers to advertising or marketing data, which can include thousands of variables, including occupation, gender, income, race, or location.

Particularly this incident does not affect any consumer devices and Samsung have asked the customers to continue to use their products and services as usual.

The company ensured to inform its customers directly and promised to contact for further notification.

Steps to be Implemented

  • Remain cautious of any unsolicited communications that ask for your personal information or refer you to a web page asking for personal information
  • Avoid clicking on links or downloading attachments from suspicious emails
  • Review your accounts for suspicious activity

“We have engaged leading cybersecurity experts and are coordinating with law enforcement. We will continue to work diligently to develop and implement immediate and longer-term next steps to further enhance the security across our systems”, Samsung

Secure Azure AD Conditional Access – Download Free White Paper

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Raymond IT Systems Hit by Cyber Attack, Authorities Investigating

Textile and apparel conglomerate Raymond Limited confirmed a cybersecurity breach affecting portions of its...

Zacks Investment Data Breach Exposes 12 Million Emails and Phone Numbers

A cybersecurity incident at Zacks Investment Research has exposed sensitive data belonging to 12...

Indian Post Office Portal Leak Exposes Thousands of KYC Records

The Indian Post Office portal recently exposed the sensitive Know Your Customer (KYC) data...