Sunday, March 23, 2025
HomeData BreachSamsung Hacked - Breach Exposed Customer's Personal Information

Samsung Hacked – Breach Exposed Customer’s Personal Information

Published on

SIEM as a Service

Follow Us on Google News

Samsung suffers a data breach for second time that exposes customer information in the US. The company notified its customers regarding the breach that revealed customers’ names, addresses, and other personal information.

“An unauthorized third party acquired information from some of Samsung’s U.S. systems. We determined through our ongoing investigation that the personal information of certain customers was affected”, Samsung

Samsung said that it has taken actions to secure the affected systems, and have engaged a leading outside cybersecurity firm, and is coordinating with law enforcement.

Samsung Data Breach

According to the reports, an unauthorized third party acquired information on July 2022. On August 4, 2022 Samsung found through ongoing analysis that personal information of certain customers was affected.

The data breach does not impact Social Security numbers or credit and debit card numbers, except in some cases, may have affected information such as name, contact and demographic information, date of birth, and product registration information. 

In this case, the attackers hacked identifiable personal information, such as names and birthdays. Samsung also mentions that “demographic information” was exposed, this probably refers to advertising or marketing data, which can include thousands of variables, including occupation, gender, income, race, or location.

Particularly this incident does not affect any consumer devices and Samsung have asked the customers to continue to use their products and services as usual.

The company ensured to inform its customers directly and promised to contact for further notification.

Steps to be Implemented

  • Remain cautious of any unsolicited communications that ask for your personal information or refer you to a web page asking for personal information
  • Avoid clicking on links or downloading attachments from suspicious emails
  • Review your accounts for suspicious activity

“We have engaged leading cybersecurity experts and are coordinating with law enforcement. We will continue to work diligently to develop and implement immediate and longer-term next steps to further enhance the security across our systems”, Samsung

Secure Azure AD Conditional Access – Download Free White Paper

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware

In a recent surge of sophisticated cyberattacks, threat actors have been utilizing fake CAPTCHA...

Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor

Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed...

Researchers Reveal macOS Vulnerability Exposing System Passwords

A recent article by Noah Gregory has highlighted a significant vulnerability in macOS, identified...

JumpServer Flaws Allow Attackers to Bypass Authentication and Gain Full Control

JumpServer, a widely used open-source Privileged Access Management (PAM) tool developed by Fit2Cloud, has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Infosys to Pay $17.5M in Settlement for 2023 Data Breach

Infosys, a leading IT services company, has announced that it has reached an agreement...

SpyX Data Breach Exposes Personal Information of Nearly 2 Million Users

SpyX, a company known for developing spyware, has experienced a data breach that compromised...

41% of Successful Logins Across Websites Involve Compromised Passwords

A recent analysis by Cloudflare reveals a concerning trend in online security: nearly 41%...