Tuesday, April 29, 2025
Homecyber securitySamsung Hacked: Customers Personal Information Exposed

Samsung Hacked: Customers Personal Information Exposed

Published on

SIEM as a Service

Follow Us on Google News

Samsung Electronics (U.K.) Limited has announced a cybersecurity incident, corroborating the exposure of customer data that originated in July 2019. 

The disclosure comes as the tech behemoth contends with the repercussions of illicit access to personal information.

Sequence of the Hack

The breach was formally confirmed in an email received by this reporter on the night of November 15. 

- Advertisement - Google News

Samsung traced the detection of the cyber incursion back to November 13. 

Although the specific third-party business application remains undisclosed, Samsung ascribes the breach to a flaw. 

Customers who made purchases between July 1, 2019, and June 30, 2020, are presumed to be impacted.

The compromised data encompasses a spectrum of personal information, including names, addresses, phone numbers, email addresses, and IP addresses. 

However, Samsung assures its user base that unauthorized parties do not access confidential financial data and passwords.

Root Cause: Third-Party Application Flaw

While particulars surrounding the third-party application and the specific flaw are sparse, Samsung took prompt action upon discovery. 

The implicated application’s operation was halted, and a thorough forensic review was initiated. 

Technical measures, including the patching of the identified flaw, have been implemented in response to the breach.

The breach appears to specifically affect users of the U.K. eCommerce site who made purchases during the specified timeframe. 

According to a Forbes report, Samsung advises users to remain alert against unsolicited communications requesting personal information and encourages adherence to cybersecurity best practices. 

Users are urged to avoid clicking on links or downloading attachments from dubious emails.

Response and Support

Samsung is actively addressing the situation and has offered support to concerned customers. 

The company recommends that users contact Samsung support via email at [support@samsunguk.zendesk.com] for further inquiries. 

As the investigation unfolds, Samsung users are advised to stay informed and follow guidance from reputable cybersecurity authorities.

Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories

Cybersecurity researchers at Hunt have uncovered a server hosting advanced malicious tools, including SuperShell...

Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software

A sophisticated cyberattack targeted senior members of the World Uyghur Congress (WUC), the largest...

Konni APT Deploys Multi-Stage Malware in Targeted Organizational Attacks

A sophisticated multi-stage malware campaign, potentially orchestrated by the North Korean Konni Advanced Persistent...

Outlaw Cybergang Launches Global Attacks on Linux Environments with New Malware

The Outlaw cybergang, also known as “Dota,” has intensified its global assault on Linux...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories

Cybersecurity researchers at Hunt have uncovered a server hosting advanced malicious tools, including SuperShell...

Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software

A sophisticated cyberattack targeted senior members of the World Uyghur Congress (WUC), the largest...

Konni APT Deploys Multi-Stage Malware in Targeted Organizational Attacks

A sophisticated multi-stage malware campaign, potentially orchestrated by the North Korean Konni Advanced Persistent...