Telecom networks are emerging as high-value targets for threat actors. South Korea, SK Telecom (SKT), the country’s leading mobile operator, has confirmed a breach involving the leakage of SIM (USIM) subscriber information.
This is the first time such data has been compromised at scale in South Korea, raising urgent questions about SIM card security and the risk of identity theft and SIM swapping fraud.
Let’s discuss what happened, what was exposed, and what SKT and its subscribers can do to respond.
Receive timely alerts and actionable insights with PurePrivacy's Dark Web Monitoring.
On April 19th, 2025, at around 11 PM KST, SK Telecom’s internal systems were infiltrated via a malicious code injection attack. The breach resulted in unauthorized access to sensitive SIM-related information, specifically the:
Although SKT confirmed that no personally identifiable information (PII), such as names, national IDs, or addresses, was leaked, the exposure of IMSI and IMEI numbers is serious.
These identifiers are used to authenticate users on mobile networks, and in the wrong hands, can be exploited to gain unauthorized control over phone lines.
The breach introduces several risks that customers and industry players must take seriously:
With access to IMSI and IMEI data, attackers may attempt to convince telecom operators to issue duplicate SIMs, gaining control over calls, SMS, and two-factor authentication codes.
If attackers manage to intercept two-factor authentication messages, they could gain access to banking, email, or social media accounts.
Leaked device identifiers could be used to impersonate legitimate users on the network, increasing the likelihood of targeted surveillance or data interception.
SK Telecom has taken the following measures:
If you are an SKT customer, take the following actions immediately:
Set a SIM PIN via your device settings:
Use two-factor authentication apps (like Google Authenticator or Authy) instead of SMS when possible.
A sudden loss of mobile service could indicate unauthorized SIM duplication.
If you are particularly concerned, replacing your SIM card can nullify the compromised IMSI/IMEI data.
Consider PurePrivacy Dark Web Monitoring to check whether your PII is being traded online after the breach.
Here's how you can use Dark Web Monitoring:
No. SKT confirmed that no PII was compromised; only SIM-related identifiers were a part of the breach.
IMSI and IMEI are not likely to enable SIM cloning on their own. Hackers usually require additional personal data for successful fraud attempts.
As of now, no financial compensation is being offered, but SIM protection services are free to subscribers.
Globally, SIM swapping incidents are increasing. In the U.S. alone, such attacks have risen by 400% between 2018 and 2021.
Telecom security infrastructure must be proactive when it comes to handling user data. While no personal data was leaked, the exposed IMSI and IMEI numbers can be used for larger fraud schemes. Stay vigilant, secure your SIM with a PIN, and monitor your mobile account for suspicious behavior.