Breeze in Busan

Independent journalism on the politics, economy, and society shaping Busan.

Contact channels

News Tips

[email protected]

Partnerships

[email protected]

Contribute

[email protected]

Information

[email protected]

Explore

  • Home
  • Latest News
  • Busan News
  • National News
  • Authors
  • About
  • Editor
  • Contact

Contribute

  • Send News
  • Contact
  • Join Team
  • Collaborate

Legal

  • Privacy Policy
  • Cookie Policy
  • Terms of Use
  • Editorial Policy
  • Correction & Rebuttal

Newsroom Details

30, Hasinbeonyeong-ro 151beon-gil, Saha-gu, Busan, Korea

+82 507-1311-4503

Busan 아00471

Registered: 2022.11.16

Publisher·Editor: Maru Kim

Juvenile Protection: Maru Kim

© 2026 Breeze in Busan. All Rights Reserved.

Independent reporting from Busan across politics, economy, society, and national affairs.

national-news
Breeze in Busan

No Patch for Complacency: What the SKT, Yes24, and SGI Hacks Reveal

A telecom giant, a cultural platform, and a state-backed financial guarantor—all paralyzed by basic cyberattacks. The real problem isn’t cutting-edge hackers. It’s a security culture that lags far behind the systems it’s meant to protect.

Jul 18, 2025
6 min read
Save
Share
Features Team

Features Team

Features Team

The Features Team produces in-depth, long-form stories, offering thorough investigations and narratives on issues that impact societies worldwide, beyond the headlines.

No Patch for Complacency: What the SKT, Yes24, and SGI Hacks Reveal
Breeze in Busan | Too Big to Fail, Too Slow to Secure

In the span of a single month, three pillars of South Korea’s digital infrastructure collapsed under cyberattack. SK Telecom, the country’s largest mobile carrier, Yes24, a major e-commerce and ticketing platform, and SGI Seoul Guarantee, a state-backed financial insurer, were all breached—one after another, across different industries, but with disturbingly similar results: systems paralyzed, user data compromised, and public trust shaken.

What initially seemed like isolated incidents now looks more like a pattern—a slow-motion failure of national cybersecurity that left critical institutions exposed not because attackers were especially advanced, but because the defenses were shockingly thin.

The Collapse, in Three Acts


The first breach to come to light was also the most deeply rooted. In April, SK Telecom acknowledged that its internal systems had been infiltrated by attackers who had quietly accessed subscriber identification data over a period that may stretch back as far as 2021. The scope was staggering: more than 26 million sets of SIM-related credentials—including USIM encryption keys, IMSI numbers, and device identifiers—had potentially been exposed. Experts warned that the leak opened the door to SIM-swap attacks, allowing hackers to intercept text-based verification codes and impersonate users across financial and government platforms. The breach remained undetected for years, raising pointed questions about the company's monitoring systems and internal safeguards.

In June, it was Yes24’s turn. The e-commerce and cultural content platform was hit by a ransomware attack that shut down its website, blocked access to eBook libraries, and froze ticket sales for concerts and events. Initially, the company posted vague notices about “maintenance,” but as user frustration mounted, it admitted more than a day later that its systems had been encrypted by an unidentified hacking group. While the company claimed no customer data had been confirmed as leaked, the Personal Information Protection Commission launched a formal investigation amid concerns over potential exposure of names, contact information, and purchase histories.

Just weeks later, in mid-July, SGI Seoul Guarantee—a key financial institution that backs everything from mobile device installments to housing lease loans—suffered a similar fate. A ransomware group believed to be affiliated with the GUNRA syndicate breached SGI’s internal systems, encrypting critical databases and bringing its operations to a standstill for nearly four days. During that time, banks were unable to issue new lease loans tied to SGI guarantees, forcing a last-resort workaround: allowing loans to go out without guarantees in place. Nearly 600 billion won in such “advance loans” were issued under emergency terms. The risk shifted downstream—to borrowers, to banks, and ultimately to the state.

These three incidents differed in scope and visibility, but they shared one common theme: institutions that were too critical to fail, and yet dangerously underprepared to withstand the most basic forms of cyberattack.

Common Security Failures


Despite the different industries they serve, the recent breaches at SK Telecom, Yes24, and SGI Seoul Guarantee all trace back to the same underlying problem: basic security practices were either neglected, misapplied, or never put in place to begin with.

At SK Telecom, investigators pointed to aging VPN infrastructure and weak internal access controls. Attackers were able to move across internal systems for an extended period—potentially years—without detection. Logging protocols were incomplete, and in some systems, sensitive subscriber data was stored without encryption. What should have triggered alerts—unusual logins, unauthorized transfers—was instead buried in a system never built to watch itself closely.

Yes24 presented a different set of vulnerabilities, but no less avoidable. The company relied on older Windows servers and lacked a clear recovery strategy in the event of ransomware encryption. There were no offline backups that could be quickly restored. Once the attack began, the company had little choice but to shut everything down. Public communication was slow, vague, and reactive—fueling frustration among users who had no idea whether their personal information was at risk.

The most concerning case may be SGI Seoul Guarantee. As the primary guarantor for rental and installment loans in Korea, SGI handles sensitive data on millions of consumers. Yet at the time of the attack, it had not completed certification under Korea’s official ISMS-P security standards. Remote access protocols lacked key protections. Multi-factor authentication was inconsistently enforced, and administrator credentials appear to have been compromised through brute-force login attempts. There were no controls in place to limit access after repeated failed logins—a basic measure that should have been standard for any financial institution.

What ties these failures together is not technical complexity, but institutional complacency. These were not zero-day exploits or nation-state level intrusions. They were low-cost, widely available attacks that succeeded because the targets had left themselves exposed. Whether through legacy systems, poor monitoring, or deferred investment in security, each organization created the conditions for its own compromise.

Privacy and Legal Risks


The most lasting damage from these breaches may not lie in the downtime, but in what left the servers unnoticed. Each of the three companies handled large volumes of personal data, much of it sensitive. In some cases, that information may already be circulating beyond their control.

SK Telecom’s breach revealed something more alarming than usernames or passwords: it involved identifiers tied directly to mobile devices, such as USIM keys and IMSI numbers. These aren’t just technical codes. They’re the backbone of mobile identity in South Korea, used to verify everything from banking transactions to government logins. In the wrong hands, they open the door to SIM swap attacks—quiet, invasive takeovers that don’t need a password to do damage.

Yes24’s case was more ambiguous, at least at first. The company confirmed that ransomware had paralyzed its systems but was slower to say what, if anything, had been stolen. Regulators later launched an investigation into the possible exposure of names, email addresses, and transaction histories. If that’s confirmed, it could be enough to build accurate social profiles for fraud or target customers with high-credibility phishing.

SGI says no customer data was compromised, and that may be true. But the group believed to be behind the attack—GUNRA—is known for copying data before encrypting it. That’s a common tactic now. The threat isn’t just locking up files, but threatening to leak them. Even if nothing has surfaced yet, the risk lingers.

South Korea has legal protections on paper. Under the Personal Information Protection Act, companies are required to report breaches and notify affected users. But in practice, disclosures often come late, and the language is cautious at best. In all three cases, public confirmation of the breach followed after delays—first internally, then with regulators, and only later with the users whose data may have been affected.

What’s missing isn’t just speed, but accountability. There’s no real standard for what companies owe victims beyond vague assurances. Compensation is inconsistent. Government fines rarely exceed the cost of a marketing campaign. For users caught in the middle, the damage may be silent—but it’s personal, and often irreversible.

Regulatory Gaps and Structural Apathy


The failures exposed by these cyberattacks weren’t confined to server rooms or outdated code. They extended into the systems meant to prevent and respond to such breaches in the first place. Regulation existed, but it wasn’t enforced. Certifications were recommended, not required. And when things went wrong, the responses were more procedural than protective.

South Korea has long promoted its digital infrastructure as among the most advanced in the world. But while user-facing services have grown fast, the systems that support them — the legal frameworks, security protocols, oversight bodies — haven’t kept pace.

Institutions like SGI Seoul Guarantee handle enormous amounts of sensitive financial data, yet aren't subject to the same mandatory security certifications that apply to banks or telecoms. At the time of the attack, SGI had not completed its ISMS-P certification, a national standard for information security and privacy. The lack of such a basic safeguard didn’t violate any rule — because none required it.

Yes24 had the certification, but that didn’t prevent the attack or improve the company’s handling of the aftermath. Certification alone isn’t a firewall. Its value depends on how seriously companies treat it — whether it shapes their investment in cybersecurity or is treated as just another checkbox for compliance.

Regulatory bodies were slow to react in every case. Notifications were made, but only after delays. Investigations were launched, but no immediate action was taken. There’s no centralized system that compels companies to report intrusions in real time or to coordinate with each other in the event of widespread threats. Much of the burden still falls on individual organizations, many of which lack the capacity — or incentive — to prepare for large-scale digital threats.

The result is a patchwork: some institutions over-secure, some under-protect, and many simply wait for trouble before acting. Without clear minimum standards, enforcement with consequences, or coordinated threat intelligence across sectors, the country’s digital ecosystem remains fragmented — fast-moving on the surface, but brittle underneath.

Without clear minimum standards, enforcement with consequences, or coordinated threat intelligence across sectors, the country’s digital ecosystem remains fragmented — fast-moving on the surface, but brittle underneath.

The Weekly Breeze

Keep pace with Busan's deep narratives.
Delivered every Monday morning.

Independent journalism, directly to your inbox.

Strategic Partner
Breeze Editorial
Elevate Your
Brand's Narrative

Connect your core values with a community of
thoughtful and discerning readers.

Inquire Now
Related Topics
National News

Share This Story

Knowledge is most valuable when shared with the community.

Previous Article
Why Korea’s Premium Apartment Services Are Disappearing After Move-In
Next Article
How South Korea’s Credit-Based High School System Went Off Track

💬 Comments

Please sign in to leave a comment.

    Related Coverage

    Continue with related reporting

    Follow adjacent reporting from the same newsroom file, with linked coverage that extends the current story's desk and context.

    Abolishing South Korea’s Prosecution Service May Not End Prosecutorial Power
    Mar 11, 2026

    Abolishing South Korea’s Prosecution Service May Not End Prosecutorial Power

    Draft laws to abolish the prosecution service promise a historic break with concentrated prosecutorial power, but unresolved warrant authority, supplemental investigation rules and inter-agency transfer mechanisms could preserve old leverage in a new legal structure.

    When Judicial Language Obscures Legal Reasoning
    Feb 20, 2026

    When Judicial Language Obscures Legal Reasoning

    As court decisions circulate through digital research systems and shape future precedent, disciplined reasoning becomes more than professional habit. It becomes a condition of institutional reliability.

    Why the Winter Olympics Feels Less Visible in South Korea
    Feb 4, 2026

    Why the Winter Olympics Feels Less Visible in South Korea

    Exclusive broadcasting rights, failed sublicensing talks, and the limits of universal access rules have reshaped how the Games reach the public.

    More from the author

    Continue with the author

    Stay with the same line of reporting through more work from this byline.

    Growth No Longer Guarantees Street-Level Recovery in Busan
    Mar 3, 2026

    Growth No Longer Guarantees Street-Level Recovery in Busan

    KOSPI at 6,000: Can Korea’s AI Boom Deliver a Structural Rerating?
    Feb 24, 2026

    KOSPI at 6,000: Can Korea’s AI Boom Deliver a Structural Rerating?