
Why can't we stop repeated personal data leaks first?

In modern society, personal information is equivalent to ‘oneself’. In almost every area of daily life, such as online shopping, financial transactions, and insurance contracts, we provide valuable personal information to companies.
Even a single personal information leak can cause companies to suffer from a decline in trust, legal liabilities, and financial losses. However, hacking incidents have recently been occurring in succession. This indicates that the level of personal information protection by companies is still insufficient.
So, to prevent repeated personal information leaks, let's find out the answers to the following three questions together.
What are the reasons for repeated personal information leaks?
What is the biggest problem with the current security system?
What is the most proactive response that companies can take to prevent personal information leaks?
In this article, we have analyzed the root causes of recent personal information leak incidents and summarized the specific security enhancement measures that companies can implement.
Recent Personal Information Breaches

■ Insurance Agency Hacking Incident
Causes of Personal Information Leakage: Exposure of administrator account information in the sales support system
Outcome: Malware infection in the computing solution → Potential for widespread damage to multiple solutions
Issues:
Holding a large amount of sensitive personal information, such as policyholders' health data
Risk of large-scale chain damage due to the use of the same solution among different companies
Concerns about additional hacking incidents due to poor management of internal administrator accounts
■ Telecom Company SIM Information Leakage Incident
Causes of Personal Information Leakage: Infiltration of stealth malware (BPFDoor) into the core server 'Home Subscriber Server (HSS)' managing subscriber information
Outcome: Circumstances suggesting leakage of SIM (USIM) related personal information (phone numbers, unique identifiers, etc.)
Issues:
Use of stealth malware that goes undetected for extended periods
Suspected association with a specific APT group → Concerns of ongoing and organized additional attacks
Risk of serious secondary damage such as identity theft and financial fraud
■ K Company Human Resources Information System Hacking Incident
Causes of Personal Information Leakage: Comprehensive breach of human resources information system
Outcome: Massive leakage of sensitive personal information of over 7,000 employees
Exposure of encrypted basic information (name, date of birth, last four digits of social security number, email, password, address, bank account number, phone number, etc.) + unencrypted employee photos, ID copies, bankbook copies, employment contracts, salary information, signature information, family relationship certificates, resident registration copies, marriage relationship certificates, etc.
Issues:
Beyond simple personal information, exposure of sensitive public documents
Concerns of serious secondary damage such as identity theft and voice phishing
As seen, recent hacking incidents not only inconvenience individuals but also cause serious social and economic damages. Especially for institutions handling sensitive information, such as telecom companies, or services connected to multiple systems, a single vulnerability can lead to significant security damage to the entire enterprise.
4 Major Causes of Data Breaches

The following fundamental issues are behind the constant personal information leaks.
1. Outdated, vulnerable security systems
: Reliance on external solutions, inadequate internal security structures
Many companies show excessive reliance on external programs and are often passive in building internal security systems. In particular, small companies may not even implement basic security measures properly due to a lack of professional security personnel and budget constraints.
2. Advancement in hacking techniques
: Emergence of stealth malware like BPFDoor, limitations in traditional defense systems
The emergence of high-performance malware that is difficult to detect over a long period and operates stealthily means that the existing defense systems are no longer sufficient to ensure safety. Attackers constantly find new vulnerabilities and develop sophisticated attack techniques to breach defenses.
3. Lax internal management
: Leaks of administrator accounts, authorization errors, poor password management, etc.
Poor internal management, such as leaks of administrator account information, incorrect authorization settings, and weak password management, can become serious security threats at any time. Regardless of how excellent a security system may be, a lack of security awareness among users can become the biggest vulnerability in the entire system.
4. Increased reliance on external services
: Security vulnerabilities in partner and external IT services transfer as direct risks
As the reliance on external IT services increases for cost savings, the overall security risk of connected systems also rises. It's important to keep in mind that a security vulnerability in a single partner company can cause a chain reaction of damage to your system and numerous customers.
Despite these repetitive causes leading to personal information leaks, many companies still tend to focus only on 'after-the-fact response' following incidents. However, what is necessary in this time of frequent breaches is a proactive security strategy that predicts and blocks risks before incidents occur.
5 Essential Strategies to Prevent Data Breaches

1. Establishing and Separately Storing a Critical Data Management System
Store sensitive data such as customer personal information and financial data separately on a dedicated server.
Physically separate the work system and personal information database, and make browsing history a requirement.
Manage the storage location and access permissions in two layers according to sensitivity level.
2. Apply Dual Defense Systems for Admin and Operator Accounts
Apply MFA (Multi-Factor Authentication) to all admin accounts.
Prohibit public accounts and record access history by unique ID.
Restrict server access to internal network access through VPN only.
3. Check Security Levels and Manage Contracts for External Solutions and Partners
Conduct security checks at least once a year and submit reports when using external solutions.
Specify security levels and include liability for damages in contracts.
Minimize data transmission when integrating partner APIs.
4. Conduct Penetration Testing and Simulated Hacking at Least Annually
Perform penetration tests by white-hat hackers on web servers, database servers, VPNs, and cloud services.
Immediately improve any identified vulnerabilities and complete revalidation (Validation Test).
5. Establish an Emergency Response System for Personal Information Leaks
Prepare a report system to KISA within 24 hours in the event of an incident.
Prepare notification for affected customers and response scenarios for PR and legal teams in advance.
Document response protocols based on incident scenarios (under 5 cases vs mass leaks).
Based on these essential basic security strategies, companies need to systematically establish an overall security system.
An especially noteworthy strategy among these is the 'Penetration Test', which inspects the system from an attacker's perspective. It is not merely a check, but a process where white-hat hackers identify security vulnerabilities based on actual penetration scenarios, making it an effective method to preemptively identify hidden threats that are difficult to detect with existing defense systems.
How to Prevent Personal Data Breaches
White Hat Hacker's Ethical Hacking

What is a White Hat Hacker?
Experts who identify potential data leak points from an attacker's perspective
A white hat hacker is an 'ethical hacker' who works without malicious intent to discover and analyze vulnerabilities in a system, thus aiding in enhancing security. They conduct thorough checks of systems through the attacker's lens, uncovering hidden risks through practical simulation attacks like Penetration Tests.
Role of a White Hat Hacker
Intensive security checks on systems integrated with external programs: In complex systems connected to external applications like GA hacking cases, simple security audits may miss vulnerabilities that expert analysis by white hat hackers can uncover.
Effective response to advanced APT attacks: Intelligent persistent threats (APT) like BPFDoor used in telecom SIM data leaks are hard to detect and handle with regular security systems. White hat hackers understand these advanced attack trends and provide specialized detection and response strategies.
Three Key Values Provided by White Hat Hackers
Conduct deep penetration tests primarily on areas vulnerable to data leaks
Capable of professional response with knowledge of latest attack trends (AI hacking, stealth APT, etc.)
Offer custom risk prevention and response strategies for each company using years of project expertise
Key Summary
Let's summarize the answers to the three questions laid out in the introduction.
1. Why do personal information breaches keep occurring?
→ It is because outdated security systems and negligence in internal management persist while hacking techniques are continuously advancing.
2. What is the biggest issue with the current security systems?
→ It is because there is too much focus on responding after incidents rather than proactively predicting and blocking threats.
3. What is the most proactive measure a company can take to prevent data breaches?
→ Companies should identify vulnerabilities in advance and prepare response strategies through penetration testing and inspections by white-hat hackers tailored to the latest threats.
Customer personal information held by a company is not just simple data, but a valuable asset that must be protected. Investing in prevention costs can avert significant losses that may occur in the future. Protect your information assets securely with a penetration testing project that you can initiate immediately.

References
https://m.boannews.com/html/detail.html?idx=137004
https://n.news.naver.com/mnews/article/008/0005186545?sid=101
https://www.boannews.com/media/view.asp?idx=137021&kind=&sub_kind=
https://www.boannews.com/media/view.asp?idx=137017&kind=&sub_kind=
https://www.smarttoday.co.kr/news/articleView.html?idxno=79339
Popular Articles