Skip to main content
  • Home
  • Financial
  • Lotte Card Hit by Another Massive Breach a Decade After 2014, Security Controls Under Scrutiny

Lotte Card Hit by Another Massive Breach a Decade After 2014, Security Controls Under Scrutiny

Picture

Member for

9 months 1 week
Real name
Matthew Reuter
Bio
Matthew Reuter is a senior economic correspondent at The Economy, where he covers global financial markets, emerging technologies, and cross-border trade dynamics. With over a decade of experience reporting from major financial hubs—including London, New York, and Hong Kong—Matthew has developed a reputation for breaking complex economic stories into sharp, accessible narratives. Before joining The Economy, he worked at a leading European financial daily, where his investigative reporting on post-crisis banking reforms earned him recognition from the European Press Association. A graduate of the London School of Economics, Matthew holds dual degrees in economics and international relations. He is particularly interested in how data science and AI are reshaping market analysis and policymaking, often blending quantitative insights into his articles. Outside journalism, Matthew frequently moderates panels at global finance summits and guest lectures on financial journalism at top universities.

Changed

Malicious code infiltration confirmed on August 26
Security breach occurred just after ISMS-P certification
Regulatory shortcomings perpetuate repeated damage

malicious code infiltration was detected at Lotte Card, a company with 9.7 million members. While the firm stated that no core data was leaked externally nor that ransomware infections occurred, the incident follows the SK Telecom hack that exposed over 26 million subscriber records, intensifying concerns over Korea’s cybersecurity regime. Despite repeated sanctions in prior years, most punitive measures against card issuers have been limited to warnings or fines, raising questions over the effectiveness of enforcement.

Lotte Card suffered a hacking incident that resulted in the leak of 1.7GB of data

According to financial industry and security sources on September 2, Lotte Card reported the cyberattack to the Financial Supervisory Service (FSS) the previous morning. The firm had initially identified malicious code on several servers during maintenance checks on August 26. A subsequent audit revealed three compromised servers infected with two malware strains and five types of web shells—tools that allow hackers to gain administrator privileges. These were immediately removed. On August 31, traces of attempted data exfiltration amounting to roughly 1.7 gigabytes were detected from its online payment server.

Web shells, widely employed in cyberattacks, are notoriously difficult to detect as they enable unauthorized command execution on servers while erasing logs to cover tracks.

While Lotte Card, with the aid of external investigators, has yet to find evidence of customer data leaks or ransomware infections, Korea’s Personal Information Protection Act requires firms to promptly disclose confirmed breaches to affected parties. Regulators, including the FSS and the Financial Security Institute, have launched investigations into the incident.

At the Lotte Card headquarters in Yeouido, Seoul, on August 12, Choi Yong-hyuk, Chief Information Security Officer (CISO) of Lotte Card (left), and Oh Joong-hyo, Head of the Autonomous Security and Digital Strategy Division at the Financial Security Institute, pose for a commemorative photo following the company’s acquisition of the Information Security Management System for Personal Information (ISMS-P) certification / Photo = Lotte Card

Fresh Breach Just Two Weeks After ISMS-P Certification

The case echoes the catastrophic 2014 data breach at KB Kookmin Card, NH Nonghyup Card, and Lotte Card, when an outsourcing contractor leaked 105.8 million records, triggering CEO resignations, fines, and regulatory reforms. Though subsequent measures mandated ISMS-P compliance, stricter outsourcing oversight, and enhanced internal controls, the latest attack demonstrates the persistent vulnerabilities in financial IT infrastructure.

Compounding the controversy, Lotte Card had secured ISMS-P certification only two weeks earlier, on August 12. Granted under the Information and Communications Network Act and the Personal Information Protection Act by the Korea Internet & Security Agency (KISA), the ISMS-P and ISMS accreditations are intended to validate corporate preparedness against hacks, insider leaks, and system failures. SK Telecom, which recently suffered a breach of 23 million users’ data, also held this certification.

Lotte Card passed assessments across 101 criteria in three domains—system establishment and operations, security safeguards, and personal data processing requirements—to earn the credential. The firm had previously obtained ISO27001 in 2008 and PCI DSS in 2017, both regarded as international security benchmarks.

Korean Card Data Sells for $15 Per Record, Penalties Remain Lax

Security experts warn that stolen data fuels downstream crimes such as financial fraud and insurance scams. According to AhnLab, postings on ten dark web platforms revealed hundreds of listings of Korean personal data, often in bulk volumes ranging from thousands to hundreds of thousands of records. Korean credit card data was reportedly selling at around $15 per record, including card type, holder nationality, membership tier, and PIN details.

Korean personal information commands a “premium” of three to ten times over foreign data, reflecting the country’s extensive digital financial infrastructure, which provides hackers with broad avenues of exploitation through online banking and identity verification systems.

Yet regulatory penalties remain weak. FSS disclosures show that major card firms such as Hana Card and Hyundai Card faced more than three sanctions in the past five years for similar breaches. Hyundai Card alone received 14 citations, but enforcement was limited to “management advisories” or “improvement recommendations.” Even after the 2014 debacle, penalties rarely exceeded partial business suspensions or fines in the tens of thousands of dollars.

A decade on, systemic weaknesses persist. Notably, the 2014 breach was perpetrated by an outsourcing contractor who illicitly exported customer data on storage devices. Still, oversight of third-party vendors remains inadequate. Research by Sangmyung University highlights that as outsourcing relationships between card firms and subcontractors grow more complex, accountability for data protection becomes even more critical. Yet audits and reporting structures at Korean issuers remain conspicuously deficient.

Picture

Member for

9 months 1 week
Real name
Matthew Reuter
Bio
Matthew Reuter is a senior economic correspondent at The Economy, where he covers global financial markets, emerging technologies, and cross-border trade dynamics. With over a decade of experience reporting from major financial hubs—including London, New York, and Hong Kong—Matthew has developed a reputation for breaking complex economic stories into sharp, accessible narratives. Before joining The Economy, he worked at a leading European financial daily, where his investigative reporting on post-crisis banking reforms earned him recognition from the European Press Association. A graduate of the London School of Economics, Matthew holds dual degrees in economics and international relations. He is particularly interested in how data science and AI are reshaping market analysis and policymaking, often blending quantitative insights into his articles. Outside journalism, Matthew frequently moderates panels at global finance summits and guest lectures on financial journalism at top universities.