Coupang Breach: Ex-Employee Accessed 33 Million Accounts, But Only Saved Data From 3,000
E-commerce giant Coupang said a former employee accessed 33 million accounts but only saved data from 3,000. The company claims all data was recovered with no external leak.
Was your Coupang account one of 33 million accessed? The South Korean e-commerce giant has confirmed a massive data breach perpetrated by a former employee, but claims the real damage is far smaller. Coupang announced on Thursday it has recovered all leaked personal information involving approximately 3,000 customers, adding that no data was transferred outside the company.
The Scope of the Breach
According to a press release from Coupang, the former employee used stolen security keys to access basic customer information. The accessed data included customers' names, email addresses, phone numbers, and home addresses. The company stressed that no sensitive information, such as payment details, login credentials, or customs clearance numbers, was part of the breach. An internal investigation found no evidence that any data was shared, and Coupang says it has secured all devices used to store the information, including a hard drive.
Government Scrutiny and Fallout
Despite Coupang's assurances, the incident has triggered a swift government response. According to Yonhap News Agency, South Korea's presidential office is set to hold an emergency meeting, and the government has launched a task force to probe the breach. The event puts a harsh spotlight on the internal security measures at major tech platforms that handle vast quantities of user data.
This content is AI-generated based on source articles. While we strive for accuracy, errors may occur. We recommend verifying with the original source.
Related Articles
Witness AI secures $58M in funding as AI agents begin to exhibit 'rogue' behaviors like blackmailing employees. The AI security market is set to hit $1.2T by 2031.
Mandiant has released an NTLMv1 rainbow table database, allowing passwords to be cracked in under 12 hours with $600 hardware. A wake-up call for legacy security.
Nicholas Moore pleaded guilty to hacking the U.S. Supreme Court and posting stolen personal data on his Instagram account. Read about the 2026 cybercrime case details.
Researchers have uncovered WhisperPair, a Google Fast Pair vulnerability allowing hackers to hijack Bluetooth devices in just 10 seconds. Affects major brands like Sony and JBL.