T-money homepage capture

T-money has completed its report to relevant agencies, including the Korea Internet & Security Agency (KISA), concerning the recent personal information leak incident. This incident occurred when an unidentified attacker attempted to access the T-money website using customer account information obtained in advance through a foreign IP.

T-money announced on its official website on 12th that it is presumed that the names and emails of some customers were leaked during the login attempt process. It is also noted that for customers with a history of entering past addresses or phone numbers, that information may have also been compromised.

The company has completed its investigation into the circumstances of the leak and is currently verifying the facts with relevant agencies. The technique used in the attack is suspected to be credential stuffing, which involves randomly inputting leaked account information to succeed in logging in and then collecting personal data.

Immediately after confirming the attack, T-money blocked the problematic IP and implemented response measures such as password resets, captcha application, and enhanced identity verification. Monitoring of related activities has also been strengthened.

T-money stated it will do its utmost to protect customer information and informed that victims of the leak may seek relief through the Personal Information Dispute Mediation Committee.

※ This article has been translated by AI. Share your feedback here.