Company Details
lguplus
9
174
517
lguplus.com
0
LG _3288734
In-progress

LG Uplus Business Company CyberSecurity Posture
lguplus.com.
Company Details
lguplus
9
174
517
lguplus.com
0
LG _3288734
In-progress
Between 0 and 549

LUB Global Score (TPRM)XXXX

Description: **KT Corp Faces Regulatory Action After Femtocell Security Breach Exposes Thousands in South Korea** On December 30, 2025, South Korean authorities held KT Corp accountable for a major mobile payment breach stemming from critical security flaws in its femtocell infrastructure. Investigators found that KT used identical, long-term authentication certificates across its femtocells—valid for a decade—allowing unauthorized devices to repeatedly access the network without re-verification. The breach exposed identifiers of over **22,000 users**, with **368 individuals** falling victim to unauthorized transactions totaling **243 million won (≈$180,000 USD)**. Further scrutiny revealed that **94 KT servers** were infected with **over 100 types of malware**, underscoring systemic security failures in the company’s femtocell management. Regulators concluded that KT neglected its obligation to provide secure telecommunications services, ordering the company to submit **detailed prevention plans** by June 2026 for compliance review. Authorities also urged mobile operators to **rotate authentication server addresses regularly** and **block illegal network access** to mitigate future risks. While some hacking techniques resembled a prior breach at **SK Telecom**, no direct link between the two incidents has been established. KT acknowledged the findings, pledging **compensation for affected users** and **enhanced security measures** rather than contesting the results. In a separate case, **LG Uplus** is under police referral after investigators discovered that compromised servers were discarded, preventing a full technical analysis. The South Korean government emphasized that **robust cybersecurity is now a national priority**, particularly as the country seeks to solidify its position as a global leader in AI and digital innovation.


LG Uplus Business has 23.46% more incidents than the average of same-industry companies with at least one recorded incident.
LG Uplus Business has 26.58% more incidents than the average of all companies with at least one recorded incident.
LG Uplus Business reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
LUB cyber incidents detection timeline including parent company and subsidiaries

.


At Vodafone, we believe that connectivity is a force for good. If we use it for the things that really matter, it can improve people's lives and the world around us. Through our technology we empower people, connecting everyone regardless of who they are or where they live, we protect the planet a

We are an award-winning international communications company operating across the Middle East, North Africa and Southeast Asia. Serving consumers and businesses in 10 countries, we deliver a leading data experience through a broad range of content and services via our advanced, data-centric mob
We’re one of the world’s leading communications services companies. At BT Group, the solutions we sell are integral to modern life. Our purpose is as simple as it is ambitious: we connect for good. There are no limits to what people can do when they connect. And as technology changes our world, co

Lumen connects the world. We digitally connect people, data and applications – quickly, securely and effortlessly. Everything we do at Lumen takes advantage of our network strength. From metro connectivity to long-haul data transport to our edge cloud, security, and managed service capabilities, we

Fundada em 1975, a Telemont Engenharia de Telecomunicações S/A é líder na prestação de serviços de implantação, manutenção e operação de redes de telecomunicações. São 7,7 milhões de acessos de voz, 3 milhões de ADSL e dados e 63 mil km de fibra óptica operados pela empresa. Através da Telemont I

We are a forward-focused digital champion always been focused on innovation and evolution. Our purpose is to create and bring greater dimension and richness to people’s personal and professional lives. With stc, You will always be empowered to focus on delivering what’s next through collaborati

Mobile TeleSystems OJSC ("MTS") is the leading telecommunications group in Russia, Eastern Europe and Central Asia, offering mobile and fixed voice, broadband, pay TV as well as content and entertainment services in one of the world's fastest growing regions. Including its subsidiaries, as of Decemb
We believe it’s people who give purpose to our technology. So we’re committed to staying close to our customers and providing them the best experience. And delivering the best tech. On the best network. Because our purpose is to build a connected future so everyone can thrive. We build techno
Our 15 000 talented colleagues serve millions of customers every day in one of the world’s most connected regions. With a strong connectivity base, we’re the hub in the digital ecosystem, empowering people, companies and societies to stay in touch with everything that matters 24/7/365 - on their ter
.png)
We offer real-time business news in Korea, including earnings, M&A, IPO and regulatory filings, in English.
Posted by Harry Baldock | Dec 8, 2025 | TECHNOLOGY, COMPANY NEWS, People, AI, Governance, Customer, Asia-Pacific, Security, News. LG Uplus's AI voice call...
A threat actor known as "888" has purportedly dumped sensitive data stolen from electronics giant LG Electronics, raising alarms in the...
Korea's top telecom companies — SK Telecom, KT and LG Uplus — are facing leadership turbulence following a series of massive hacking...
LG Uplus, one of South Korea's largest telecoms, reported a suspected data breach to the country's cybersecurity agency KISA,...
LG Uplus, one of South Korea's largest telecommunications providers, has confirmed to TechCrunch that it has reported a suspected data...
LG Uplus has confirmed a cybersecurity breach, joining SK Telecom and KT in South Korea's ongoing wave of telecom hacks.
LG Uplus confirmed a suspected data breach to Korea's cybersecurity watchdog KISA. □. All three major South Korean telecoms now hit by...
Korean telecom giant LG Uplus is the third major phone provider in the past six months to report a cybersecurity incident.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of LG Uplus Business is http://www.lguplus.com.
According to Rankiteo, LG Uplus Business’s AI-generated cybersecurity score is 549, reflecting their Critical security posture.
According to Rankiteo, LG Uplus Business currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, LG Uplus Business is not certified under SOC 2 Type 1.
According to Rankiteo, LG Uplus Business does not hold a SOC 2 Type 2 certification.
According to Rankiteo, LG Uplus Business is not listed as GDPR compliant.
According to Rankiteo, LG Uplus Business does not currently maintain PCI DSS compliance.
According to Rankiteo, LG Uplus Business is not compliant with HIPAA regulations.
According to Rankiteo,LG Uplus Business is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
LG Uplus Business operates primarily in the Telecommunications industry.
LG Uplus Business employs approximately 9 people worldwide.
LG Uplus Business presently has no subsidiaries across any sectors.
LG Uplus Business’s official LinkedIn profile has approximately 174 followers.
LG Uplus Business is classified under the NAICS code 517, which corresponds to Telecommunications.
No, LG Uplus Business does not have a profile on Crunchbase.
Yes, LG Uplus Business maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/lguplus.
As of December 31, 2025, Rankiteo reports that LG Uplus Business has experienced 1 cybersecurity incidents.
LG Uplus Business has an estimated 9,774 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $243 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with planned security upgrades, compensation arrangements, and communication strategy with public acknowledgment of findings, commitment to improvements..
Common Attack Types: The most common types of attacks the company has faced is Breach.
Average Financial Loss: The average financial loss per incident is $243.00 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are User Identifiers, Payment Information and .
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Planned security upgrades, compensation arrangements.
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Government order to submit prevention plans, compliance check in June 2026.
Key Lessons Learned: The key lessons learned from past incidents are Inadequate femtocell security management, prolonged certificate validity, and lack of regular authentication updates can lead to major breaches. Strong information security is critical for national AI leadership.
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Government of South Korea.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public acknowledgment of findings and commitment to improvements.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Government urges operators to prioritize security, warns of survival risks in AI-driven economy and Compensation arrangements and security upgrades to be announced by KT.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Submit Detailed Prevention Plans To Government, Implement Security Upgrades, Announce Compensation For Affected Users, Regularly Change Authentication Server Addresses, Block Illegal Network Access, .
Most Recent Incident Detected: The most recent incident detected was on 2025-12-30.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-12-30.
Highest Financial Loss: The highest financial loss from an incident was 243 million won (unauthorised payments).
Most Significant Data Compromised: The most significant data compromised in an incident were User identifiers and payment information.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were User identifiers and payment information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 22.0K.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Government order to submit prevention plans, compliance check in June 2026.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Inadequate femtocell security management, prolonged certificate validity, and lack of regular authentication updates can lead to major breaches. Strong information security is critical for national AI leadership.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Conduct regular security audits, Block illegal network access, Change authentication server addresses regularly, Enhance server malware protection and Improve femtocell security management.
Most Recent Source: The most recent source of information about an incident is Government of South Korea.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed (findings accepted by KT).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Government urges operators to prioritize security, warns of survival risks in AI-driven economy, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Compensation arrangements and security upgrades to be announced by KT.
.png)
Improper Input Validation vulnerability in qs (parse modules) allows HTTP DoS.This issue affects qs: < 6.14.1. SummaryThe arrayLimit option in qs does not enforce limits for bracket notation (a[]=1&a[]=2), allowing attackers to cause denial-of-service via memory exhaustion. Applications using arrayLimit for DoS protection are vulnerable. DetailsThe arrayLimit option only checks limits for indexed notation (a[0]=1&a[1]=2) but completely bypasses it for bracket notation (a[]=1&a[]=2). Vulnerable code (lib/parse.js:159-162): if (root === '[]' && options.parseArrays) { obj = utils.combine([], leaf); // No arrayLimit check } Working code (lib/parse.js:175): else if (index <= options.arrayLimit) { // Limit checked here obj = []; obj[index] = leaf; } The bracket notation handler at line 159 uses utils.combine([], leaf) without validating against options.arrayLimit, while indexed notation at line 175 checks index <= options.arrayLimit before creating arrays. PoCTest 1 - Basic bypass: npm install qs const qs = require('qs'); const result = qs.parse('a[]=1&a[]=2&a[]=3&a[]=4&a[]=5&a[]=6', { arrayLimit: 5 }); console.log(result.a.length); // Output: 6 (should be max 5) Test 2 - DoS demonstration: const qs = require('qs'); const attack = 'a[]=' + Array(10000).fill('x').join('&a[]='); const result = qs.parse(attack, { arrayLimit: 100 }); console.log(result.a.length); // Output: 10000 (should be max 100) Configuration: * arrayLimit: 5 (test 1) or arrayLimit: 100 (test 2) * Use bracket notation: a[]=value (not indexed a[0]=value) ImpactDenial of Service via memory exhaustion. Affects applications using qs.parse() with user-controlled input and arrayLimit for protection. Attack scenario: * Attacker sends HTTP request: GET /api/search?filters[]=x&filters[]=x&...&filters[]=x (100,000+ times) * Application parses with qs.parse(query, { arrayLimit: 100 }) * qs ignores limit, parses all 100,000 elements into array * Server memory exhausted → application crashes or becomes unresponsive * Service unavailable for all users Real-world impact: * Single malicious request can crash server * No authentication required * Easy to automate and scale * Affects any endpoint parsing query strings with bracket notation
A weakness has been identified in code-projects Refugee Food Management System 1.0. This affects an unknown part of the file /home/editfood.php. This manipulation of the argument a/b/c/d causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Refugee Food Management System 1.0. Affected by this issue is some unknown functionality of the file /home/editrefugee.php. The manipulation of the argument rfid results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be exploited.
Authentication Bypass Using an Alternate Path or Channel vulnerability in Mobile Builder Mobile builder allows Authentication Abuse.This issue affects Mobile builder: from n/a through 1.4.2.
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hiroaki Miyashita Custom Field Template allows Stored XSS.This issue affects Custom Field Template: from n/a through 2.7.5.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.