Friday, March 14, 2025
Homecyber securitySamsung Hacked: Customers Personal Information Exposed

Samsung Hacked: Customers Personal Information Exposed

Published on

SIEM as a Service

Follow Us on Google News

Samsung Electronics (U.K.) Limited has announced a cybersecurity incident, corroborating the exposure of customer data that originated in July 2019. 

The disclosure comes as the tech behemoth contends with the repercussions of illicit access to personal information.

Sequence of the Hack

The breach was formally confirmed in an email received by this reporter on the night of November 15. 

Samsung traced the detection of the cyber incursion back to November 13. 

Although the specific third-party business application remains undisclosed, Samsung ascribes the breach to a flaw. 

Customers who made purchases between July 1, 2019, and June 30, 2020, are presumed to be impacted.

The compromised data encompasses a spectrum of personal information, including names, addresses, phone numbers, email addresses, and IP addresses. 

However, Samsung assures its user base that unauthorized parties do not access confidential financial data and passwords.

Root Cause: Third-Party Application Flaw

While particulars surrounding the third-party application and the specific flaw are sparse, Samsung took prompt action upon discovery. 

The implicated application’s operation was halted, and a thorough forensic review was initiated. 

Technical measures, including the patching of the identified flaw, have been implemented in response to the breach.

The breach appears to specifically affect users of the U.K. eCommerce site who made purchases during the specified timeframe. 

According to a Forbes report, Samsung advises users to remain alert against unsolicited communications requesting personal information and encourages adherence to cybersecurity best practices. 

Users are urged to avoid clicking on links or downloading attachments from dubious emails.

Response and Support

Samsung is actively addressing the situation and has offered support to concerned customers. 

The company recommends that users contact Samsung support via email at [support@samsunguk.zendesk.com] for further inquiries. 

As the investigation unfolds, Samsung users are advised to stay informed and follow guidance from reputable cybersecurity authorities.

Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...