6.11 million members
South Korean gaming giant Netmarble has confirmed it was the victim of a major data breach that occurred on November 22, 2025. The incident, reported publicly on November 30, compromised the personal data of 6.11 million members of its PC gaming portal. The breach exposed a combination of personally identifiable information (PII), including names, birthdates, and encrypted passwords. Data belonging to PC cafe franchise owners and company employees was also stolen. The company faced public criticism for a significant delay in reporting the breach to the Korea Internet & Security Agency (KISA), waiting almost three days after detection to notify the regulatory body.
On November 22, Netmarble detected an "external hacking attempt" that resulted in a large-scale data leak from its PC game portal infrastructure. The company stated that its mobile gaming platforms were not affected.
The compromised data is extensive and affects several groups:
Netmarble emphasized that more sensitive data, such as resident registration numbers (a unique government ID in South Korea), was not compromised.
This breach poses a significant risk to the affected individuals and the company.
The theft of a large database of encrypted passwords, even without the plaintext, provides threat actors with a valuable offline cracking target. If a weak or unsalted hashing algorithm like MD5 was used, a significant percentage of these passwords could be recovered.
While Netmarble detected the intrusion on the day it occurred, its response process appears to have had significant flaws.
Detection:
The company's statement of an "external hacking attempt" is vague, but such incidents are typically detected through:
D3-NTA: Network Traffic Analysis).Response:
The primary point of failure in Netmarble's response was the 72-hour delay in notifying the regulatory authority. Best-practice incident response frameworks and data protection regulations (like GDPR) mandate notification within a specific timeframe (e.g., 72 hours for GDPR). This delay suggests potential issues in their internal process, such as:
For Affected Users:
For Netmarble and Other Organizations:
Enforce the use of strong, salted hashing algorithms (e.g., Argon2, bcrypt) for all stored passwords to prevent offline cracking.
Implement database activity monitoring to detect and alert on anomalous data access patterns, such as a single user querying millions of records.
Strongly encourage or mandate MFA for all user accounts to mitigate the risk of credential stuffing from the leaked passwords.
Restrict database access to a minimal set of application servers and IP addresses to reduce the attack surface.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats