80,000 Records Leaked: Shinsegae I&C Confirms Major Internal Data Breach
Shinsegae I&C reports a data breach affecting 80,000 employees and subcontractors. Compromised data includes IDs and IP addresses. No customer info was leaked.
80,000 personal records just vanished from the internal network of Shinsegae I&C. The IT arm of South Korea's retail giant confirmed that employee and subcontractor data was compromised, though they say customer info remains safe. It's a stark reminder that even the biggest players aren't immune to digital intruders.
Internal Intranet Under Siege
According to Yonhap, the breach affected roughly 80,000 staff members. Compromised data includes corporate ID numbers, names, departments, and even IP addresses. The leak occurred within the company's internal intranet system, a space usually reserved for secure employee communication and operations.
Malware Suspected in the Aftermath
Shinsegae I&C first detected the anomaly on Wednesday, December 24. By Friday afternoon, they had officially reported the incident to the Korea Internet & Security Agency (KISA). While the investigation is ongoing, early reports point to a malware infection as the primary culprit. The company's IT unit has launched an emergency inspection to patch vulnerabilities and prevent further exposure.
This content is AI-generated based on source articles. While we strive for accuracy, errors may occur. We recommend verifying with the original source.
Related Articles
Apple introduces new security feature limiting precise location data sharing with carriers on select iPhone and iPad models. A privacy win or just the beginning?
Outtake raises $40M Series B to automate digital identity fraud detection with AI. Why tech giants like Microsoft CEO Satya Nadella are personally investing.
CISA acting director accidentally shared sensitive documents on public ChatGPT, triggering multiple security warnings. Exposes gaps in government AI usage policies.
State-sponsored hackers used Anthropic's Claude AI to autonomously conduct 80-90% of espionage operations across 30 organizations. Why prompt injection isn't a bug—it's persuasion.
Thoughts
Share your thoughts on this article
Sign in to join the conversation