Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»South Korean ISP Accused of Installing Malware on Devices of 600,000 Who Used Torrenting Services

    South Korean ISP Accused of Installing Malware on Devices of 600,000 Who Used Torrenting Services

    June 26, 2024

    South Korean telecommunications giant KT is under investigation for allegedly hacking the systems of customers who used torrent services such as web hard drives (Webhard), a popular file-sharing service in the country.

    The scandal, which has been ongoing for nearly five months, has affected an estimated 600,000 customers, with the police investigation revealing that KT may have operated a dedicated malware team.

    Malware Infiltrated Systems of Torrenting Subscribers

    The incident came to light in May 2020 when numerous web hard drives suddenly stopped working. Users flooded company forums with complaints about unexplained errors. An investigation revealed that malware had infiltrated the “Grid Program,” software that enables direct data exchange between users.

    Source: mnews.jtbc.co.kr

    The malware, which was designed to interfere with BitTorrent traffic, was allegedly used to monitor and control the internet activities of KT subscribers. The police believe that the motive behind this hacking was to reduce network-related costs, as torrent transfers can be costly for internet service providers. KT, however, claims that it was merely trying to manage traffic on its network to ensure a smooth user experience.

    KT instead stated that the Webhard services were malicious, however after the the Gyeonggi Southern District Office conducted raids on KT facilities, they believe the ISP may have violated communications and network laws. A police follow-up investigation stated that KT operated a dedicated team responsible for developing, distributing, and operating the malware program.

    The hacking was traced to  KT’s Bundang IDC Center, one of its data centers. Over five months, an estimated 20,000 PCs were infected daily. The malware reportedly created strange folders, made files invisible, and disabled web hard programs.

    Legal and Ethical Implications

    KT and Webhard companies have a history of conflict, including lawsuits. While a previous court ruled in KT’s favor regarding traffic blocking of grid services, the current situation differs significantly. KT was alleged to have planted malicious code on individual users’ PCs without consent or explanation.

    South Korean legal experts question KT’s methods, suggesting the company could have pursued formal procedures through its legal team instead of resorting to hacking. The incident raises serious concerns about privacy, corporate responsibility, and the extent to which internet service providers can control network traffic.

    The scandal has also raised concerns about the security of KT’s customers’ data, with many wondering what other sensitive information may have been compromised. The company’s CEO has since resigned, and the company’s reputation has taken a significant hit.

    Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAdding real-time ML predictions for your Amazon Aurora database: Part 2
    Next Article Polyfill Supply Chain Attack Compromises Over 100,000 Websites

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4610 – WordPress WP-Members Membership Plugin Stored Cross-Site Scripting Vulnerability

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Achieving Cybersecurity Goals Through GRC approach

    Development

    OpenAI reportedly uses Microsoft Azure to power Apple’s new AI features exclusively. Are the promised privacy and security still part of the package?

    Development

    Get Time taken to change between two elements

    Development

    Create a custom JavaScript sparkle cursor

    Web Development
    Hostinger

    Highlights

    Linux

    SteamOS su PC: Valve potrebbe portare il sistema operativo per giocatori sui computer desktop

    March 18, 2025

    SteamOS, il sistema operativo basato su GNU/Linux sviluppato da Valve, è diventato sempre più rilevante…

    This retro mechanical keyboard I’ve lusted after for so long finally has non-US layouts, and it’s everything I had always hoped

    March 16, 2025

    Top 20 Free ChatGPT Alternatives with Unlimited Usage in 2025

    January 29, 2025

    Russian Hacker Group APT28 Launches HeadLace Malware via Fake Car Ads to Target Diplomats

    August 7, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.