Article Details
Scrape Timestamp (UTC): 2025-12-29 04:11:26.049
Source: https://www.theregister.com/2025/12/29/coupang_perpetrator_theft_details/
Original Article Text
Click to Toggle View
Accused data thief threw MacBook into a river to destroy evidence. Former staffer of Korean e-tailer Coupang accessed 33 million records but may have done less damage than feared. Korean e-tailer Coupang claims a former employee has admitted to improperly accessing data describing 33 million of its customers, but says the accused deleted the stolen data. In a post published on Christmas, Coupang revealed it worked with Mandiant, Palo Alto Networks, and Ernst & Young, to conduct a forensic investigation into the incident, and has also secured sworn statements from the alleged perpetrator. The investigation and testimony mean Coupang believes the perpetrator stole a security key while working at the company and later used it to access customer records. According to Coupang’s report, the alleged perp looked up “roughly 3,000” customers’ order histories and building access codes, a data point used so delivery workers can place packages inside apartment blocks. Investigators found the alleged perp accessed the data using a PC and a MacBook Air. The accused surrendered the PC, and investigators found the script used to run the attack on one of its hard drives. After media reported the attack, the accused decided to destroy evidence of his activity, and therefore smashed his MacBook Air, stuffed it in a Coupang canvas bag along with some bricks, and threw it into a river. An aside: In 2011, before joining The Register, your correspondent wrote a story about data recovery and spoke to a forensics expert who advised using salt water to destroy evidence because it does more damage to electronics than fresh water. That story may have been useful to the accused because after he revealed his actions, investigators found the laptop in the river and were able to read its serial number – which matched the serial number of the accused’s iCloud account. Coupang’s post says the alleged perpetrator “only” retained data describing roughly 3,000 accounts, never moved it off his PC and MacBook Air, and deleted it all after seeing news reports about his actions. “The investigative findings to date are consistent with the perpetrator’s sworn statements and found no evidence that contradicts these statements,” Coupang’s post states. Coupang’s account of the incident suggests its impact was relatively limited, a welcome assertion as South Korea’s population is around 52 million – meaning the attack affected more than half of the nation’s residents. Coupang remains in a world of pain. On Monday the company announced that it will gift 33 million customers whose data the alleged perp accessed a ₩50,000 ($35) voucher, an effort that will cost it $1.17 billion. South Korea’s government has commissioned an inquiry into the company’s operations, which – if the data leak at Korean carrier SK Telecom is a precedent – will result in substantial fines.
Daily Brief Summary
Coupang, a leading Korean e-tailer, reported a data breach involving unauthorized access to 33 million customer records by a former employee.
The breach affected over half of South Korea's population, but the company asserts the impact was limited to approximately 3,000 accounts with detailed data accessed.
The former employee allegedly used a stolen security key to access customer order histories and building access codes, primarily using a PC and a MacBook Air.
In a bid to destroy evidence, the accused threw a MacBook into a river, but investigators retrieved it and confirmed its link to the suspect through its serial number.
Coupang collaborated with Mandiant, Palo Alto Networks, and Ernst & Young for a thorough forensic investigation, which corroborated the suspect's sworn statements.
To mitigate customer dissatisfaction, Coupang is issuing ₩50,000 vouchers to the affected customers, resulting in an estimated $1.17 billion expense.
The South Korean government has initiated an inquiry into Coupang's operations, potentially leading to significant fines following the precedent set by a similar incident at SK Telecom.