Other

SK Telecom BPFDoor Malware Breach - 27 Million SIM Records

πŸ“… 2025-04-18 🦠 BPFDoor; Tiny Shell
Primary Source β†—

Incident Details

SK Telecom (South Korea’s largest mobile carrier, ~27 million subscribers) officially confirmed a breach on April 19, 2025, after detecting malware on April 18 targeting its Home Subscriber Server (HSS). A joint public-private forensic investigation of 42,605 servers found 28 servers infected with 33 malware strains, including 27 BPFDoor variants, 3 Tiny Shell variants, and additional tools. The breach traced back to approximately 2022, meaning attackers had persistent covert access for nearly 3 years. Exfiltrated data included USIM records with phone numbers and IMSI (International Mobile Subscriber Identity) values for approximately 27 million subscribers β€” sufficient to theoretically clone SIM cards or intercept SMS-based 2FA. South Korean regulators imposed a record 134 billion won ($96.5M USD) fine and ordered a cybersecurity overhaul. Breach costs caused a 90% drop in SK Telecom’s operating profit. Threat actor and initial access method not publicly attributed.

Technical Details

Initial Attack Vector
Multiple strains of malware (including 27 variants of BPFDoor backdoor, Tiny Shell, and other tools) installed on SK Telecom's internal servers; went undetected for approximately 3 years (2022–2025)
Malware Family
BPFDoor; Tiny Shell

Timeline

  1. 2025-04-18 Breach occurred
  2. 2025-04-19 Publicly disclosed
  3. 2025-05-01 Customers notified