Samsung Germany Customer Service Ticket Data Leak: Infostealer Malware Breach Exposes 270,000 Records
- Rescana
- Apr 2
- 5 min read

The Samsung Tickets Data Leak is a significant cybersecurity incident involving the unauthorized release of 270,000 customer service tickets from Samsung Germany, as reported on March 30, 2025, by InfoStealers (source). The breach was a result of infostealer malware that initially compromised login credentials in 2021, which were then exploited by a hacker known as "GHNA" in 2025 to dump the data online (Forbes).
Specific Types of Data Compromised: - Personal Identifiable Information (PII): Full names, email addresses, and home addresses. - Transactional Details: Order numbers, model numbers, payment methods, prices, discounts, and tracking URLs. - Support Interactions: Ticket IDs, agent emails, customer communication details (SC Magazine).
Detailed Incident Timeline: - 2021: Initial credentials compromised via Raccoon Infostealer malware. - March 2025: Credentials exploited by "GHNA" to release 270,000 records online. - March 30, 2025: Incident reported by Hudson Rock and InfoStealers. - March 31, 2025: Samsung acknowledged the breach and started assessing the impact (Forbes).
Sector-Specific Implications and Impacts: - The incident highlights the risks associated with infostealer malware and the importance of credential hygiene and rotation. - It poses significant reputational damage and potential GDPR compliance issues for Samsung Germany, as sensitive customer information was exposed without consent (SC Magazine).
Official Disclosures and Technical Analyses: - Hudson Rock's Cavalier database had flagged the compromised credentials years prior, indicating a failure in preventive measures. - Samsung has issued a statement acknowledging the breach and is assessing the incident (Forbes).
This comprehensive report has been compiled using verified information from InfoStealers, Forbes, and SC Magazine to ensure accuracy and reliability in the analysis of the Samsung Tickets Data Leak incident.
Technical Analysis of the Samsung Tickets Data Leak Incident
Attack Vector Analysis: The Samsung Tickets Data Leak incident is primarily attributed to the use of infostealer malware, specifically the Raccoon Infostealer, which compromised login credentials in 2021. These credentials were exploited by a hacker known as "GHNA" in 2025 to release sensitive data online. The attack did not involve sophisticated zero-day exploits or insider threats but was a result of compromised credentials that were not rotated or monitored effectively (InfoStealers).
Specific Malware and Tools Identified: The Raccoon Infostealer was identified as the malware used in the initial compromise of credentials. This malware is known for silently harvesting login credentials from infected machines. Hudson Rock had flagged these compromised credentials in its Cavalier database, which tracks over 30 million infected machines (InfoStealers).
Historical Context of Threat Actor Activities: The threat actor "GHNA" is responsible for dumping the compromised data online in 2025. This activity is consistent with known tactics of infostealer-related breaches, where credentials are harvested and later exploited when not secured properly. Similar incidents were noted with Telefonica's ticketing system breach in January 2025 and Jaguar Land Rover's Jira breach earlier in the same year (InfoStealers).
Sector-Specific Targeting Patterns: The incident specifically targeted Samsung Germany's customer service operations, exposing 270,000 customer tickets. The leak included personal identifiable information (PII), transactional details, and support interaction data. This type of data is particularly valuable for crafting targeted phishing attacks and conducting fraudulent activities, posing significant risks to the affected individuals and Samsung's reputation (InfoStealers).
Technical Details of Attack Methods Mapped to the MITRE ATT&CK Framework: - Initial Access (T1078 - Valid Accounts): The attack leveraged compromised credentials harvested by the Raccoon Infostealer, which is a common technique for gaining unauthorized access to systems. - Credential Access (T1555 - Credentials from Password Stores): The Raccoon Infostealer is known for extracting credentials stored on infected machines. - Exfiltration (T1041 - Exfiltration Over Command and Control Channel): The credentials were likely exfiltrated over a command and control channel established by the Raccoon Infostealer. - Impact (T1490 - Inhibit System Recovery): By releasing the data online, "GHNA" ensured that the impact was maximized, preventing recovery of the exposed data.
These techniques are consistent with the patterns observed in other infostealer-related incidents, indicating a broader trend of exploiting compromised credentials that are not adequately secured or rotated.
Conclusion: The Samsung Tickets Data Leak incident underscores the critical importance of effective credential management and monitoring. Infostealers continue to be a prevalent threat, exploiting human error and inadequate security practices. Organizations must proactively hunt for compromised credentials and implement robust security measures to mitigate the risk of such breaches (InfoStealers).
Executive Summary
The Samsung Tickets Data Leak, first reported on March 30, 2025, is a significant cybersecurity incident involving the unauthorized release of 270,000 customer service tickets from Samsung Germany. The breach was the result of credentials initially compromised in 2021 through Raccoon Infostealer malware, later exploited by a hacker known as "GHNA" in 2025. This report consolidates verified information from InfoStealers, Forbes, and SC Magazine to provide a comprehensive analysis of the incident, highlighting the technical details, impacts, and lessons learned.
Incident Timeline
- 2021: Compromise of login credentials via Raccoon Infostealer malware.
- March 2025: Exploitation of credentials by "GHNA" to dump 270,000 records online.
- March 30, 2025: Incident reported by Hudson Rock and InfoStealers (InfoStealers).
- March 31, 2025: Samsung acknowledges the breach and begins impact assessment (Forbes).
Impact Assessment
The data leak involved the unauthorized exposure of sensitive information, including Personal Identifiable Information (PII), transactional details, and customer support interactions:
- PII: Full names, email addresses, and home addresses.
- Transactional Details: Order numbers, model numbers, payment methods, prices, discounts, and tracking URLs.
- Support Interactions: Ticket IDs, agent emails, and customer communication details (SC Magazine).
The exposure of this data poses significant reputational damage and potential GDPR compliance issues for Samsung Germany.
Technical Analysis
Attack Vector Analysis The incident was facilitated by the Raccoon Infostealer, which compromised login credentials in 2021. These credentials were not monitored or rotated effectively, leading to their exploitation by "GHNA" in 2025 (InfoStealers).
Specific Malware and Tools Identified Raccoon Infostealer is notorious for extracting login credentials from infected systems. The compromised credentials were flagged in Hudson Rock's Cavalier database (InfoStealers).
Threat Actor Activities The hacker "GHNA" released the data online, mirroring tactics seen in other infostealer-related breaches such as those impacting Telefonica and Jaguar Land Rover earlier in 2025 (InfoStealers).
MITRE ATT&CK Framework Mapping - Initial Access (T1078 - Valid Accounts): Use of compromised credentials. - Credential Access (T1555 - Credentials from Password Stores): Harvesting by Raccoon Infostealer. - Exfiltration (T1041 - Exfiltration Over Command and Control Channel): Likely through established channels. - Impact (T1490 - Inhibit System Recovery): Data release maximized impact (InfoStealers).
.png)


