Coupang data breach traced to ex-employee who retained system access
好的,我现在需要帮用户总结一篇关于Coupang数据泄露的文章,控制在100字以内。首先,我得通读整篇文章,抓住关键信息。 文章提到Coupang的数据泄露影响了3370万用户,泄露的信息包括姓名、邮箱、地址和订单信息。事件发生在2025年6月24日,但直到11月18日才被发现。调查发现,主要嫌疑人是前员工,43岁,中国籍,在2024年离职后仍保留访问权限。警方突击检查了公司办公室,并继续调查。 接下来,我需要将这些信息浓缩到100字以内。重点包括数据泄露的数量、泄露的信息类型、事件时间线、前员工的责任以及警方的行动。 然后,我得确保语言简洁明了,不使用复杂的结构。避免使用“这篇文章”或“内容总结”这样的开头词,直接描述事件。 最后,检查字数是否符合要求,并确保所有关键点都被涵盖。 </think> Coupang数据泄露事件影响3370万用户,前员工离职后仍保留访问权限导致信息外泄。警方突击检查公司办公室并展开调查。 2025-12-12 18:30:19 Author: www.bleepingcomputer.com(查看原文) 阅读量:5 收藏

Coupang

A data breach at Coupang that exposed the information of 33.7 million customers has been tied to a former employee who retained access to internal systems after leaving the company.

This was shared by the Seoul Metropolitan Police Agency with local news outlets, following an investigation that included a raid on the firm's offices earlier this week.

Coupang is South Korea's largest online retailer, employing 95,000 people and generating annual revenue of over $30 billion.

On December 1, 2025, the company announced that it had suffered a data breach that exposed the personal data of 33.7 million customers, including names, email addresses, physical addresses, and order information.

The breach occurred on June 24, 2025, but Coupang only discovered it on November 18, when it also launched an internal investigation.

On December 6, Coupang published an update on the incident, assuring its customers that the stolen information had not been leaked anywhere online.

Despite these assurances and the company's claimed full collaboration with the authorities, the police raided the company's offices on Tuesday to collect evidence for an independent investigation.

On Wednesday, the company's CEO, Park Dae-Jun, announced his resignation and apologized to the public for failing to stop what is the country's worst cybersecurity breach in history.

As the police continued their investigations in Coupang's offices for a second day, they uncovered that the primary suspect was a 43-year-old Chinese national who was a former employee of the retail giant.

According to JoongAng, the man, who joined Coupang in November 2022, was assigned to an authentication management system and left the firm in 2024. He is believed to have already left the country.

The Korean news outlet reports that the police were still at Coupang's offices yesterday, gathering records such as internal documents, logs, system records, IP addresses, user credentials, and access histories that could help explain how the rogue former employee gained access to the corporate systems.

Police transporting seized documents out of Coupang's office
Police transporting seized documents out of Coupang's office
Source: Korea JoungAng Daily

The police have stated that, while Coupang is treated as the victim, if negligence or other legal violations are found, the company and employees responsible for protecting customer data may be deemed liable.

In the meantime, the incident has sparked high-volume phishing activity in the country, affecting roughly two-thirds of its population, and the police have received hundreds of reports of Coupang impersonation since the start of the month.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/coupang-data-breach-traced-to-ex-employee-who-retained-system-access/
如有侵权请联系:admin#unsafe.sh