Go to Top

Go to Top

개인정보가 네트워크를 통해 외부로 유출되는 장면
개인정보가 네트워크를 통해 외부로 유출되는 장면
개인정보가 네트워크를 통해 외부로 유출되는 장면
개인정보가 네트워크를 통해 외부로 유출되는 장면

Security Insights

Security Insights

Security Insights

How should companies respond to personal data breaches?

How should companies respond to personal data breaches?

How should companies respond to personal data breaches?

엔키화이트헷 심볼
엔키화이트헷 심볼

EnkiWhiteHat

EnkiWhiteHat

May 19, 2025

May 19, 2025

May 19, 2025

Content

Content

Content

Why can't we stop repeated personal data leaks first?

개인정보 유출 왜 막을 수 없을까요? 목차 이미지

In modern society, personal information is equivalent to ‘oneself’. In almost every area of daily life, such as online shopping, financial transactions, and insurance contracts, we provide valuable personal information to companies.

Even a single personal information leak can cause companies to suffer from a decline in trust, legal liabilities, and financial losses. However, hacking incidents have recently been occurring in succession. This indicates that the level of personal information protection by companies is still insufficient.

So, to prevent repeated personal information leaks, let's find out the answers to the following three questions together.

  1. What are the reasons for repeated personal information leaks?

  2. What is the biggest problem with the current security system?

  3. What is the most proactive response that companies can take to prevent personal information leaks?

In this article, we have analyzed the root causes of recent personal information leak incidents and summarized the specific security enhancement measures that companies can implement.

Recent Personal Information Breaches

유출 사고 심각성 사례3가지

■ Insurance Agency Hacking Incident

  • Causes of Personal Information Leakage: Exposure of administrator account information in the sales support system

  • Outcome: Malware infection in the computing solution → Potential for widespread damage to multiple solutions

  • Issues:

    • Holding a large amount of sensitive personal information, such as policyholders' health data

    • Risk of large-scale chain damage due to the use of the same solution among different companies

    • Concerns about additional hacking incidents due to poor management of internal administrator accounts

■ Telecom Company SIM Information Leakage Incident

  • Causes of Personal Information Leakage: Infiltration of stealth malware (BPFDoor) into the core server 'Home Subscriber Server (HSS)' managing subscriber information

  • Outcome: Circumstances suggesting leakage of SIM (USIM) related personal information (phone numbers, unique identifiers, etc.)

  • Issues:

    • Use of stealth malware that goes undetected for extended periods

    • Suspected association with a specific APT group → Concerns of ongoing and organized additional attacks

    • Risk of serious secondary damage such as identity theft and financial fraud

■ K Company Human Resources Information System Hacking Incident

  • Causes of Personal Information Leakage: Comprehensive breach of human resources information system

  • Outcome: Massive leakage of sensitive personal information of over 7,000 employees

    • Exposure of encrypted basic information (name, date of birth, last four digits of social security number, email, password, address, bank account number, phone number, etc.) + unencrypted employee photos, ID copies, bankbook copies, employment contracts, salary information, signature information, family relationship certificates, resident registration copies, marriage relationship certificates, etc.

  • Issues:

    • Beyond simple personal information, exposure of sensitive public documents

    • Concerns of serious secondary damage such as identity theft and voice phishing

As seen, recent hacking incidents not only inconvenience individuals but also cause serious social and economic damages. Especially for institutions handling sensitive information, such as telecom companies, or services connected to multiple systems, a single vulnerability can lead to significant security damage to the entire enterprise.

4 Major Causes of Data Breaches

개인정보 유출 주요원인 4가지

The following fundamental issues are behind the constant personal information leaks.

1. Outdated, vulnerable security systems

: Reliance on external solutions, inadequate internal security structures

Many companies show excessive reliance on external programs and are often passive in building internal security systems. In particular, small companies may not even implement basic security measures properly due to a lack of professional security personnel and budget constraints.

2. Advancement in hacking techniques

: Emergence of stealth malware like BPFDoor, limitations in traditional defense systems

The emergence of high-performance malware that is difficult to detect over a long period and operates stealthily means that the existing defense systems are no longer sufficient to ensure safety. Attackers constantly find new vulnerabilities and develop sophisticated attack techniques to breach defenses.

3. Lax internal management

: Leaks of administrator accounts, authorization errors, poor password management, etc.

Poor internal management, such as leaks of administrator account information, incorrect authorization settings, and weak password management, can become serious security threats at any time. Regardless of how excellent a security system may be, a lack of security awareness among users can become the biggest vulnerability in the entire system.

4. Increased reliance on external services

: Security vulnerabilities in partner and external IT services transfer as direct risks

As the reliance on external IT services increases for cost savings, the overall security risk of connected systems also rises. It's important to keep in mind that a security vulnerability in a single partner company can cause a chain reaction of damage to your system and numerous customers.

Despite these repetitive causes leading to personal information leaks, many companies still tend to focus only on 'after-the-fact response' following incidents. However, what is necessary in this time of frequent breaches is a proactive security strategy that predicts and blocks risks before incidents occur.

5 Essential Strategies to Prevent Data Breaches

개인정보 유출 방지 기본 대응 전략

1. Establishing and Separately Storing a Critical Data Management System

  • Store sensitive data such as customer personal information and financial data separately on a dedicated server.

  • Physically separate the work system and personal information database, and make browsing history a requirement.

  • Manage the storage location and access permissions in two layers according to sensitivity level.

2. Apply Dual Defense Systems for Admin and Operator Accounts

  • Apply MFA (Multi-Factor Authentication) to all admin accounts.

  • Prohibit public accounts and record access history by unique ID.

  • Restrict server access to internal network access through VPN only.

3. Check Security Levels and Manage Contracts for External Solutions and Partners

  • Conduct security checks at least once a year and submit reports when using external solutions.

  • Specify security levels and include liability for damages in contracts.

  • Minimize data transmission when integrating partner APIs.

4. Conduct Penetration Testing and Simulated Hacking at Least Annually

  • Perform penetration tests by white-hat hackers on web servers, database servers, VPNs, and cloud services.

  • Immediately improve any identified vulnerabilities and complete revalidation (Validation Test).

5. Establish an Emergency Response System for Personal Information Leaks

  • Prepare a report system to KISA within 24 hours in the event of an incident.

  • Prepare notification for affected customers and response scenarios for PR and legal teams in advance.

  • Document response protocols based on incident scenarios (under 5 cases vs mass leaks).

Based on these essential basic security strategies, companies need to systematically establish an overall security system.

An especially noteworthy strategy among these is the 'Penetration Test', which inspects the system from an attacker's perspective. It is not merely a check, but a process where white-hat hackers identify security vulnerabilities based on actual penetration scenarios, making it an effective method to preemptively identify hidden threats that are difficult to detect with existing defense systems.

How to Prevent Personal Data Breaches

White Hat Hacker's Ethical Hacking

화이트해커 컨설팅 서비스

What is a White Hat Hacker?

Experts who identify potential data leak points from an attacker's perspective

A white hat hacker is an 'ethical hacker' who works without malicious intent to discover and analyze vulnerabilities in a system, thus aiding in enhancing security. They conduct thorough checks of systems through the attacker's lens, uncovering hidden risks through practical simulation attacks like Penetration Tests.

Role of a White Hat Hacker

  • Intensive security checks on systems integrated with external programs: In complex systems connected to external applications like GA hacking cases, simple security audits may miss vulnerabilities that expert analysis by white hat hackers can uncover.

  • Effective response to advanced APT attacks: Intelligent persistent threats (APT) like BPFDoor used in telecom SIM data leaks are hard to detect and handle with regular security systems. White hat hackers understand these advanced attack trends and provide specialized detection and response strategies.

Three Key Values Provided by White Hat Hackers

  • Conduct deep penetration tests primarily on areas vulnerable to data leaks

  • Capable of professional response with knowledge of latest attack trends (AI hacking, stealth APT, etc.)

  • Offer custom risk prevention and response strategies for each company using years of project expertise

Key Summary

Let's summarize the answers to the three questions laid out in the introduction.

1. Why do personal information breaches keep occurring?

→ It is because outdated security systems and negligence in internal management persist while hacking techniques are continuously advancing.

2. What is the biggest issue with the current security systems?

→ It is because there is too much focus on responding after incidents rather than proactively predicting and blocking threats.

3. What is the most proactive measure a company can take to prevent data breaches?

→ Companies should identify vulnerabilities in advance and prepare response strategies through penetration testing and inspections by white-hat hackers tailored to the latest threats.

Customer personal information held by a company is not just simple data, but a valuable asset that must be protected. Investing in prevention costs can avert significant losses that may occur in the future. Protect your information assets securely with a penetration testing project that you can initiate immediately.

엔키화이트헷 심볼
엔키화이트헷 심볼

EnkiWhiteHat

EnkiWhiteHat

ENKI Whitehat
ENKI Whitehat

Offensive security experts delivering deeper security through an attacker's perspective.

Offensive security experts delivering deeper security through an attacker's perspective.

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.