Possible Samsung Cloud security hole results in Korean celebrity blackmails (report)

Samsung Galaxy Note 10
(Image credit: Future)

Multiple A-list South Korean celebrities are being extorted out of hundreds of thousands of dollars. 

The reason could be an unidentified security hole in Samsung Galaxy phones or the company’s cloud service. Alternately, it could be that the celebrities are reusing account passwords that have been compromised by other means.

According to the South Korean site Nate.com, K-pop stars, actors, and even famous chefs are being extorted for quantities that go from 50 million won ($43,000) up to 1 billion won ($862,000). If they don’t comply, the extortionists threaten to release compromising chat threads, pictures, and videos.

So far, "more than 10 extortion cases" have been identified and confirmed by the authorities. In one case, the unidentified extortionists published private conversations involving famous South Korean actor Jo Jin-mo after Jo declined to pay them.

Other stars have reportedly paid ransoms after the extortionists proved they had compromised material. South Korean celebrities are highly susceptible to disgrace and public embarrassment. 

The extortionists -- described as "hackers" by Nate.com, although it's not yet clear how the private material was obtained -- also contacted friends and family of the celebrities, warning them about what would happen if a celebrity didn’t comply with their demands.

Would 2FA prevent this?

The issue may involve Samsung Cloud, which backs up personal data and device settings from Samsung Galaxy phones and tablets to Samsung's servers so that users can quickly transfer to new Galaxy phones. 

Nate.com corresponded with an unidentified individual who claimed to be among the people apparently stealing data from celebrities' Samsung Cloud accounts. The "hacker," who did not seem to be a native speaker of Korean, implied that they were downloading the data on Samsung Cloud accounts to new phones.

It's not clear how the "hacker" would have gotten access to Samsung Cloud accounts, but if the targeted celebrities had not activated two-factor authentication (2FA) on their Samsung accounts, then only the username/email address and password would have been required to transfer the Samsung Cloud data to a new phone.

If a targeted celebrity's credentials for another account was part of a large data breach, then an attacker could try those credentials to access the celebrity's cloud accounts. If the celebrity reused passwords, and did not have 2FA enabled, then the attacker would probably succeed.

Nate.com experimented with this method and was able to transfer a user's Samsung Cloud backups to a new phone with only the username and password.

This apparent situation is similar to what Apple faced in 2014 when multiple celebrities’ private images and videos leaked into the internet, apparently taken from Apple's iCloud service. The incidents, dubbed "The Fappening" by online snarks, prompted Apple to make enabling 2FA easier.

Samsung has yet to take that step -- we couldn't find any instructions on how to enable 2FA on a Samsung account, although it is certainly possible. Here's a YouTube video showing how.

TOPICS
Jesus Diaz

Jesus Diaz founded the new Sploid for Gawker Media after seven years working at Gizmodo, where he helmed the lost-in-a-bar iPhone 4 story and wrote old angry man rants, among other things. He's a creative director, screenwriter, and producer at The Magic Sauce, and currently writes for Fast Company and Tom's Guide.

Read more
A hacker typing on a computer
FBI issues serious warning to iPhone and Android users — stop doing this ASAP
Green skull on smartphone screen.
Hackers are spreading info-stealing malware and taking over accounts using fake wedding invitations — how to stay safe
Google Play logo on an android smartphone with corner hole punch camera
At least 5 North Korean spy apps have been found on Google Play — what you need to know
Google Pixel 9 held in the hand.
Google just fixed a zero-day kernel flaw used by hackers and 47 other vulnerabilities — update your Android phone right now
Green skull on smartphone screen.
This Android banking trojan steals passwords to take over your accounts — and all it takes is a single text message
A hacker typing quickly on a keyboard
Hackers are posing as Apple and Google to infect Macs with malware — don’t fall for these fake browser updates
Latest in Online Security
A magnifying glass on top of the Steam logo in a web browser
Valve just pulled a malicious game demo spreading info-stealing malware from Steam
A man filing his taxes electronically on a laptop
AI-powered tax scams are here - how to stay safe from deepfakes, phishing and more this tax season
MacBook Pro 2023
New Mac attack is tricking users into thinking their computer is locked — how to stay safe
Hacker using a stolen social security card
Your Social Security number is a literal gold mine for scammers and identity thieves — here’s how to keep it safe
An open lock depicting a data breach
Half a million teachers hit in major data breach with SSNs, financial data and more exposed — what to do now
Green skull on smartphone screen.
Malicious Android apps with 60 million installs bombarding phones with ads and phishing attacks — how to stay safe
Latest in News
Apple Watch Series 10
Future Apple Watch models could get a surprising new feature — what we know
iPhone 16 Pro vs iPhone 16 Pro Max in hand showing displays
Forget iPhone 17 — iPhone 18 could get this huge upgrade
The new Husqvarna iQ series robot lawn mower.
Husqvarna’s new robot mowers offer GPS for less
Rendered images of rumored foldable iPhone.
Foldable iPhone report just revealed key details — here's what we know
NYTimes Connections
NYT Connections today hints and answers — Sunday, March 23 (#651)
NYT Strands on a cellphone
NYT Strands today — hints, spangram and answers for game #385 (Sunday, March 23 2025)