TL;DR
South Korea's Ministry of Science and ICT found that Korea Telecom deployed thousands of femtocells with weak security, enabling attackers to clone devices and intercept customer communications. The flaw was exploited to commit micropayments fraud worth about $169,000 and may have been used for broader surveillance; prosecutions are underway and the government demanded customer remedies.
What happened
A government probe concluded that Korea Telecom (KT) distributed large numbers of customer femtocells that shared a single certificate and were poorly configured. Security analysis found devices shipped without a root password, with private keys stored in plaintext and SSH left enabled, allowing intruders to extract the certificate and impersonate legitimate femtocells. Cloned units could connect to KT’s network and phones would attach to them automatically; investigators found attackers could read SMS messages and learn dialled numbers. KT discovered cloned-femtocell activity while examining unusual billing and traced micropayments abuse worth about $169,000 that affected 368 customers. Police reported multiple cloned femtocells, arrested 13 suspects and say a suspected ringleader is still at large with an Interpol Red Notice. Authorities also flagged links to previous leaks and missing military equipment as part of the ongoing probe.
Why it matters
- Poorly secured network devices can let attackers impersonate infrastructure and intercept customer communications.
- Carrier-side failures can enable both financial fraud and long-term privacy invasions without user action.
- Long certificate lifetimes and plaintext key storage increase the window for abuse and complicate detection.
- Regulatory and legal consequences can follow when consumer systems are found vulnerable at scale.
Key facts
- The Ministry of Science and ICT investigated KT’s femtocell deployments and reported widespread security shortcomings.
- Thousands of femtocells used the same certificate; keys and a certificate were accessible in plaintext on devices.
- Devices lacked a root password and had SSH enabled, making remote compromise straightforward for attackers.
- The shared certificate had a ten-year expiry, extending the period an attacker could exploit cloned devices.
- Investigators identified one fake femtocell that operated for about ten months across 2024 and 2025.
- KT traced cloned-femtocell activity in micropayments transactions totalling about $169,000 affecting 368 customers.
- Police uncovered multiple cloned femtocells, arrested 13 suspects, and reported a ringleader remains at large; an Interpol Red Notice has been issued.
- Police said one fake femtocell used a key linked to hardware previously used on a military base and reported missing in 2020.
- Authorities noted a possible connection to a prior breach involving BPFDoor malware that leaked carrier data beginning in 2022, though full links remain under investigation.
- South Korea’s government required KT to let customers terminate contracts without penalty in response to the findings.
What to watch next
- Progress of criminal prosecutions and whether additional arrests are made as police continue the investigation (confirmed in the source).
- Whether investigators can prove broader, long-term surveillance beyond the micropayments fraud — not confirmed in the source.
- KT’s technical remediation steps, firmware recalls or certificate replacements and any industry-wide changes to femtocell security — not confirmed in the source.
Quick glossary
- Femtocell: A small, customer-premises cellular base station that uses a wired broadband link to connect into a mobile operator’s network and improve local coverage.
- Certificate: A digital credential used to authenticate devices or services to a network; if exposed, it can let attackers impersonate legitimate equipment.
- SSH: Secure Shell, a protocol that provides remote command-line access to devices; if enabled without proper credentials it can be an attack vector.
- Micropayments: Small-value electronic transactions, often billed via mobile operators, used to pay for digital content and services.
Reader FAQ
Could attackers read customers' messages and call data?
According to the Ministry’s report, cloned femtocells allowed attackers to read SMS messages and learn called numbers.
How much financial loss was attributed to the cloned femtocells?
Investigators linked cloned-femtocell activity to about $169,000 in micropayments fraud affecting 368 customers.
Have suspects been arrested?
Police arrested 13 alleged participants; a suspected mastermind remains at large and is the subject of an Interpol Red Notice.
Did KT knowingly deploy insecure devices?
Not confirmed in the source.
Will KT replace or patch the affected femtocells?
Not confirmed in the source.

CYBER-CRIME Korean telco failed at femtocell security, exposed customers to snooping and fraud One cert, in plaintext, on thousands of devices, led to what looks like years of crime Simon…
Sources
- Korean telco failed at femtocell security, exposed customers to snooping and fraud
- KT held responsible in femtocell breach as South Korea …
- (Lead) Gov't says poor security of femtocells led to major …
- Gov't calls for KT to waive early termination fees
Related posts
- Reverse-Engineering Washing Machines: Insights from 39c3 Talk (Video)
- Hacking Washing Machines: Reverse-Engineering BSH and Miele Appliances
- MongoDB Server Security Update, December 2025 — CVE-2025-14847 (Mongobleed) Response