[Analysis] Security Concerns Persist Over SK Telecom’s SIM Reset Service; German Researchers Warn of Potential Eavesdropping Risk

이준현 기자 / approved : 2026-01-12 01:30:04
  • -
  • +
  • 인쇄

Photo courtesy of Yonhap News

 

[Alpha Biz= Reporter Lee Joonhyun] Seoul, January 9, 2026 – SK Telecom’s SIM reset service, introduced after last year’s massive personal data breach, is facing renewed scrutiny as questions arise over its actual security effectiveness.

In the 2025 cyberattack, personal information of approximately 23 million subscribers—including phone numbers, International Mobile Subscriber Identities (IMSI), and SIM authentication keys—was compromised. In response, SK Telecom advised hundreds of thousands of subscribers to replace or reset their SIMs, claiming that SIM resets offered the same security protection as physical SIM replacements.

 

 

Photo courtesy of Yonhap News

 


However, at the recent 39C3 security conference in Germany, a research team from Berlin University of Technology presented findings suggesting that authentication keys remained unchanged after SIM resets, potentially allowing eavesdropping.

Dr. Shinjo Park and his team analyzed authentication tokens before and after the SIM reset and found that while the IMSI changed, the authentication key stayed the same. Because subscriber authentication relies on shared keys between the SIM and network, the unchanged keys mean that SIM duplication could still be possible if the IMSI is known, posing a risk of secondary breaches. Dr. Park described SIM resets as a temporary measure that merely buys time, rather than providing complete protection.

SK Telecom had introduced the SIM reset solution in May 2025, asserting it effectively updated network authentication information and offered the same protection level as physical SIM replacement. The German findings challenge this claim, raising concerns that eavesdropping could be technically feasible in LTE environments where IMSIs are transmitted in plain text.

 

Photo courtesy of Yonhap News


Professor Yeom Heung-yeol of Soonchunhyang University’s Department of Information Security stated, “If the authentication key does not change during a SIM reset, it represents a technical flaw in SK Telecom’s system.” He emphasized that with leaked keys, decrypting voice communications could be possible.

SK Telecom responded, noting that “the initial issues with authentication keys were identified and addressed, and the SIM reset service has since been updated, so there are currently no problems.”

The research highlights the need for transparency and verification of security measures, especially when companies publicly assure customers of protection levels.

 

 

 

Alphabiz 이준현 기자(wtcloud83@alphabiz.co.kr)

어플

주요기사

South Korea’s National Pension Fund Sees Nearly KRW 70 Trillion Gain in Equity Holdings in One Quarter2026.01.12
Aekyung Industrial Initiates Voluntary Recall of 2080 Toothpaste Products Due to Triclosan Detection2026.01.12
South Korea’s Textile Exports Fall Below $10 Billion for First Time in 38 Years2026.01.12
Government’s Stock Market Boost Policy Faces Challenge from LS Group’s Dual Listing Plans2026.01.12
HY Recalls Certain “Helicobacter Project Will-D-Balance” Products Due to E. coli Detection2026.01.12
뉴스댓글 >

건강이 보이는 대표 K Medical 뉴스

HEADLINE

PHOTO

많이 본 기사