Can hackers use same methods if someone use torrent?
That could be interesting!
It would kill torrent quite quickly, unless there would be new protection procedures...
In the article they're using the word 'webhard' as a proper noun but from the context of the original article in Korean, that's not the case. 'Webhard's refer to cloud storage services in Korea, many of which are specialized in file searching/sharing features.
So basically KT is trying to mess with every user using cloud storage services if they work by p2p protocol.
600K+ suffering users every month and dozens of cloud service providers affected already. I'd rather believe this is kind of an internet myth...