Somebody at Samsung may have a refresh on password hygiene. A hacker reportedly breached one of many firm’s databases utilizing a login that was stolen in 2021 however by no means modified.
Over the weekend, a hacker referred to as “GHNA” claimed to have stolen 270,000 buyer satisfaction tickets from a Samsung database in Germany. The information, which was uploaded on a hackers’ discussion board, consists of clients’ full names, e-mail addresses, and bodily addresses.
Cybersecurity vendor Hudson Rock, which displays stolen passwords collected from malware and circulated amongst hackers, investigated samples of the stolen data. They point out the info originated from “samsung-shop.spectos[.]com,” a website tied to buyer help supplier Spectos GmbH. Hudson Rock then regarded by way of its personal library of stolen login credentials and located a set belonging to the identical area—which was looted again in 2021.
Particularly, a Home windows-based Racoon Stealer malware secretly harvested the password, probably from an worker’s pc at Spectos, the cybersecurity vendor says.

(Credit score: Hudson Rock)
“These credentials sat dormant, till ‘GHNA’ received their fingers on them,” Hudson Rock provides. “Samsung might’ve acted, however they didn’t, and now the harm is finished.”
Samsung and Spectos didn’t instantly reply to a request for remark. However the findings spotlight how previous malware infections can hang-out firms and customers for years. In 2024, a hacker breached quite a few accounts at cloud storage supplier Snowflake by sourcing passwords from numerous strains of “infostealing” malware.
“Infostealers don’t must brute-force their manner in; they only await human error at hand them the keys,” Hudson Rock provides. “And when firms fail to watch or rotate credentials, it’s recreation over.”
Get Our Greatest Tales!
Like What You are Studying?
By clicking Signal Me Up, you affirm you might be 16+ and conform to our Phrases of Use and Privateness Coverage.
Thanks for signing up!
Your subscription has been confirmed. Control your inbox!
About Michael Kan
Senior Reporter
Learn the most recent from Michael Kan
