SHARE
Facebook X Pinterest WhatsApp

Hacker Leaks 270,000 Samsung Customer Records—Stolen Credentials Were Left Unchecked for Years

In a troubling security breach, a hacker exposed the personal data of over 270,000 Samsung customers in Germany, freely dumping it on the internet. The hack, attributed to a cybercriminal operating under the alias “GHNA,” occurred when the attacker accessed a system used by Samsung’s German customer service.  According to cybersecurity firm Hudson Rock, the […]

Apr 2, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

In a troubling security breach, a hacker exposed the personal data of over 270,000 Samsung customers in Germany, freely dumping it on the internet. The hack, attributed to a cybercriminal operating under the alias “GHNA,” occurred when the attacker accessed a system used by Samsung’s German customer service. 

According to cybersecurity firm Hudson Rock, the hack was made possible by a set of stolen credentials compromised in 2021. This malware, known as “Raccoon Infostealer,” took these credentials after infecting an employee of Spectos GmbH, a company that works with Samsung to monitor service quality.

Although Hudson Rock flagged the credentials years ago, Samsung reportedly failed to rotate or secure them, allowing the hacker to access the system years later, in 2025, and release the data.

“At Hudson Rock, we flagged these compromised credentials years ago in our Cavalier database, which tracks over 30 million infected machines,” said Alon Gal, co-founder of Hudson Rock. “Samsung could’ve acted, but they didn’t, and now the damage is done.”

What’s in the leak?

The dumped data isn’t just a list of customer tickets — it’s a full snapshot of customers’ interactions with Samsung. Here are some of the details found in the leak:

  • Full names, email addresses, and home addresses.
  • Order numbers and product details (such as TV models).
  • Payment methods (though no direct credit card data).
  • Tracking links for deliveries.
  • Customer complaints and Samsung’s responses.

This wealth of information creates numerous opportunities for cybercriminals. “This isn’t just a list of names—it’s a roadmap to people’s lives,” Gal noted. 

How can malicious actors exploit this?

Cybersecurity experts warn that this data could be weaponized in several dangerous ways, including:

  • Hyper-targeted phishing scams: With names, emails, and order details, hackers can send highly convincing fake emails pretending to be Samsung customer support.
  • Warranty fraud: Criminals can use leaked order numbers to file fake warranty claims for product replacements.
  • Identity theft and account takeover: By impersonating customers using leaked support tickets, hackers can gain unauthorized access to accounts.
  • Physical theft (Porch piracy): Attackers could track high-value orders using leaked tracking numbers and intercept deliveries.

A wake-up call for companies

Samsung customers who have contacted Samsung Germany’s support team should be cautious and stay vigilant for suspicious emails, avoiding any unknown links. Additionally, all users should use strong, unique passwords and enable two-factor authentication whenever possible to enhance their online security.

The incident highlights a recurring problem in cybersecurity: the failure to secure and rotate credentials properly. Gal, who first reported the breach, emphasized that this attack is entirely preventable with proper credential hygiene and active monitoring.

“Infostealers don’t need to brute-force their way in; they just wait for human error to hand them the keys,” Gal explained. “When companies fail to monitor or rotate credentials, it’s game over.”

The breach has sparked alarm in the cybersecurity community, with experts warning that using AI tools to sift through and exploit such leaks could turn this chaotic data dump into a goldmine for cybercriminals. AI could automate identifying high-value targets and launching attacks, making it easier for malicious actors to exploit large data dumps like this one at scale.

For Samsung, the breach has raised serious questions about its data security practices. With this information now widely available for free online, the risk of exploitation is high — both for the company and its affected customers.

AA

Aminu Abdullahi is an experienced B2B technology and finance writer. He has written for various publications, including TechRepublic, eWEEK, Enterprise Networking Planet, eSecurity Planet, CIO Insight, Enterprise Storage Forum, IT Business Edge, Webopedia, Software Pundit, Geekflare and more.

Recommended for you...

From LinkedIn to Lies: What a Job Scam Looks Like Now
Aminu Abdullahi
May 21, 2025
Fake AI Video Tools Spreading New “Noodlophile” Malware, Targets Thousands on Facebook
Aminu Abdullahi
May 12, 2025
RSA Conference 2025: Top Announcements and Key Takeaways from the Cybersecurity World’s Biggest Stage
NVIDIA: Agentic AI Is Reshaping Cybersecurity Defense
Aminu Abdullahi
Apr 30, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.