Coupang CEO Finally Apologizes Over 33.7 Million Customer Data Breach
South Korea's largest e-commerce breach exposed personal data for two-thirds of the population. Former employee identified as perpetrator. National Assembly hearings scheduled.
Coupang founder and CEO Kim Bom-Suk issued his first public apology on Sunday over a data breach that exposed personal information for 33.7 million customers—roughly two-thirds of South Korea's entire population. The apology comes after weeks of intense criticism over the company's handling of what has become the largest e-commerce security incident in Korean history.
"The incident caused great concern and inconvenience to customers and the public," Kim said in his statement. He had previously faced backlash for declining to attend parliamentary hearings on the breach earlier this month.
What Was Exposed
The breach compromised the basics you'd expect from an e-commerce platform: names, phone numbers, email accounts, and delivery addresses. For a platform where 33.7 million people shop, that's a comprehensive dataset of the Korean consumer population.
According to investigations, approximately 3,000 customer records received more detailed exposure, including:
- Full name and contact information
- Order history
- Delivery addresses
- 2,609 building entrance codes
Those entrance codes are a uniquely concerning data point. In Korea's apartment-dominated housing landscape, entrance codes provide physical access to residential buildings. Their exposure creates real-world security implications beyond typical identity theft concerns.
How It Happened
This wasn't a sophisticated external attack. The perpetrator was a former Coupang employee who used stolen access keys to query customer data from overseas servers starting June 24, 2025.
Coupang detected the unauthorized access on November 18 and notified regulators within two days. The company initially reported that roughly 4,500 accounts were affected. The actual scope—33.7 million—emerged later.
Forensic analysis by Mandiant, Palo Alto Networks, and Ernst & Young identified the former employee. Once confronted, the individual confessed and provided details on the access methods used.
According to investigators, the perpetrator accessed basic customer information from 33 million accounts but only saved data from approximately 3,000. This distinction matters for understanding actual exposure, but it doesn't diminish the failure that enabled the access in the first place.
The Fallout
The breach has triggered consequences across multiple domains:
Legal: A securities class action lawsuit has been filed in the US, where Coupang trades on the NYSE. The suit seeks to represent investors who purchased shares between August 6 and December 16, 2025, alleging the company delayed disclosure of the incident.
Regulatory: South Korea's Ministry of Science and ICT expanded its inter-ministerial task force to include the Personal Information Protection Commission, Korea Communications Commission, Fair Trade Commission, and law enforcement. Potential fines could reach $900 million (1.2 trillion KRW).
Political: A National Assembly joint hearing is scheduled for December 30-31, involving six standing committees. Kim's repeated absences from earlier hearings intensified legislative scrutiny.
Leadership: The CEO of Coupang's South Korean e-commerce unit resigned on December 10 as the fallout intensified. South Korean police raided Coupang's Seoul offices the same day.
Why This Breach Matters
Scale alone makes this significant—33.7 million records from a country of 52 million represents penetration levels most breaches don't achieve. But several factors amplify the impact:
Insider threat validation: This wasn't a sophisticated hacking operation. A former employee with retained credentials accessed production databases. The attack surface was trust, and it failed.
Delayed scope disclosure: Coupang's initial 4,500-account estimate versus the eventual 33.7 million figure damaged credibility. Whether this reflects genuine confusion during investigation or deliberate minimization, the gap eroded public trust.
Physical security implications: Building entrance codes aren't just data points—they're access credentials for residential buildings. Their exposure creates risks that go beyond digital identity theft.
Regulatory test case: Korean regulators are treating this as a landmark case for data protection enforcement. The outcome will signal how seriously the country's legal framework treats corporate security failures.
What Coupang Customers Should Do
If you've used Coupang's services:
- Change your building entrance code if you've had packages delivered and the code was stored in your account
- Monitor for phishing attempts that reference your Coupang account or order history
- Be skeptical of unsolicited delivery notifications that could be social engineering attempts
- Review account activity for any unfamiliar orders or changes
- Consider the breach notification Coupang may be required to send for additional guidance
The company says it has deleted the leaked data, though how that claim was verified remains unclear. Data that leaves a controlled environment doesn't simply disappear because the source organization says so.
The Bigger Picture
Insider threats account for a significant portion of data breaches, yet organizations consistently underinvest in access controls, monitoring, and offboarding procedures. Coupang's breach is a reminder that the most sophisticated perimeter defenses mean nothing when a former employee retains production access keys.
The December 30-31 hearings will likely produce additional details about how access controls failed and what Coupang knew, when. For now, 33.7 million Koreans are left with their personal data in unknown hands and a belated apology from a CEO who took weeks to acknowledge the severity of what happened.
Related Articles
17.5 Million Instagram Accounts Leaked on BreachForums
A threat actor shared Instagram user data including emails and phone numbers for free. Users report receiving suspicious password reset emails within hours of the leak.
Jan 10, 2026Hacker Selling 139GB of US Utility Engineering Data
Pickett USA breach exposes LiDAR scans, transmission line surveys, and substation layouts for Tampa Electric, Duke Energy Florida, and American Electric Power. Asking price: 6.5 BTC.
Jan 9, 2026ASML Breach Claim: 154 Databases and Encryption Keys Leaked
Threat actor '1011' posted alleged data from the semiconductor equipment giant to a Russian cybercrime forum. Security researchers are verifying the files.
Jan 7, 2026Blue Shield California Exposes Member Health Data in Portal Error
System enhancement gone wrong allowed members to view other members' names, diagnoses, and medications. The insurer is offering affected individuals credit monitoring.
Jan 7, 2026