Data leak: 270,000 Samsung customer tickets on the darknet

Criminals were able to access 270,000 data records from Samsung Germany's support database. These are now for sale on the darknet.

listen Print view
Computers in front of server cabinets with data leaks, surrounded by data thieves

(Image: Bild erstellt mit KI in Bing Designer durch heise online / dmk)

3 min. read

Around 270,000 customer records from Samsung Electronics Germany have surfaced on the darknet. After a break-in, criminals were able to copy this data from Samsung's support system.

The customer data records stolen from Samsung are for sale on the darknet.

(Image: Screenshot / cku)

The user with the handle “GHNA” offered the data for sale in a well-known underground forum. The perpetrator wants eight credits, the equivalent of two euros, for it. According to the darknet forum entry, the data should include customer satisfaction tickets and include full names, addresses and associated email addresses and more.

The IT security company Hudson Rock, which specializes in the collection and analysis of such data thefts, attributes the break-in to access data stolen using Infostealer. In 2021, the log-in data was stolen from a computer belonging to an employee of Spectos GmbH, which operates customer experience platforms, including Samsung's service ticket system with the URL http://samsung-shop.spectos.com.

Videos by heise

The access data to an administrative account had apparently not been changed for four years and could now be misused for extensive data theft. According to Hudson Rock, the company had the credentials in its data leak database, and they were leaked by the Raccoon Infostealer. The data copied from the ticket system is said to include email addresses, names, and addresses, as well as order details and internal communications. The data archive is said to contain customer interactions mainly from the current year 2025.

Cybercriminals can use the leaked data to launch convincing phishing campaigns, submit fake warranty claims or commit other crimes that require identity theft. Anyone who has recently been in contact with Samsung's support team should therefore be on their guard.

Samsung did not immediately respond to a request from heise online for confirmation of the data leak and the authenticity of the data. If there is an answer, it will be provided here.

Data leaks in several Apple iOS dating apps came to light on the weekend. Around 1.5 million private user photos from the BDSM People, Chica, Translove, Pink and Brish apps had been compromised. These included images with “explicit content” that users had sent to each other privately. The cause was that the provider M.A.D. Mobile Apps Developers published API keys, passwords, and encryption keys together with the source code of the apps.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.