Samsung Data Breach: 216,000 Records Added to Have I Been Pwned Database

Mon 14th Apr, 2025

A recent security breach has compromised a significant number of customer records from Samsung, leading to the integration of approximately 216,000 stolen data entries into the Have I Been Pwned (HIBP) database. This incident follows the unauthorized access to a support database operated by Samsung's service provider, Spectos.

The data breach resulted in the leaking of about 270,000 records, which have reportedly been made available for purchase on the dark web. Troy Hunt, the creator of the HIBP project, confirmed that the newly added records include various sensitive information such as email addresses, names, addresses, purchase history, salutations, tracking numbers, and support ticket details.

While the stolen information does not directly facilitate identity theft, it poses a risk as cybercriminals could utilize these details for sophisticated phishing attempts. The presence of customer-specific information indicates that the individuals affected had previously engaged with Samsung support, potentially increasing the believability of fraudulent communications.

The breach was disclosed approximately two weeks prior, when it was revealed that data had been taken from Samsung's service provider. Initial reports suggested that the attackers gained access through outdated login credentials; however, Spectos later clarified that the breach stemmed from exploiting a vulnerability in a secondary server. This breach allowed the attackers to access various segments of the cloud infrastructure, while safeguards prevented access to the primary systems.

For individuals who have recently opened a support case with Samsung, there is an option to verify if their email addresses are part of this data breach by checking the HIBP website. However, anecdotal tests using data from support cases dating back over a year did not yield results linked to the current breach.

This incident underlines the ongoing challenges businesses face in safeguarding customer data against cyber threats. Users are advised to remain vigilant and consider enhancing their security measures, such as using unique passwords and enabling two-factor authentication where available.


More Quick Read Articles »