Coupang, South Korea’s largest e-commerce platform, confirmed on February 5, 2026 that an additional 165,000 user accounts were exposed in the massive data breach originally disclosed in November 2025. The total affected accounts now stand at approximately 33.9 million, making it one of the largest data breaches in South Korean history.

Incident overview

AttributeDetails
CompanyCoupang, Inc. (NYSE: CPNG)
Total accounts affected~33.9 million
Original disclosureNovember 2025
Additional accounts165,000 (February 2026)
Attack vectorFormer employee with valid auth keys
Detection delay~6 months
Compensation50,000 KRW ($34) per user
Market impact$8+ billion market cap loss

Timeline

DateEvent
Early 2025Unauthorized access begins (estimated)
Mid-2025Former employee exfiltrates data
November 2025Coupang discloses breach affecting 33.7M accounts
November 2025South Korean government launches investigation
December 2025National Assembly hearings begin
January 2026CEO resigns
February 2, 2026Hagens Berman announces securities class action
February 5, 2026165,000 additional accounts confirmed affected
February 7, 2026Interim CEO Harold Rogers faces police questioning

Data exposed

What was compromised

Data typeStatus
NamesExposed
Phone numbersExposed
Shipping addressesExposed
Address listsExposed

What was NOT compromised

Data typeStatus
Payment detailsNot exposed
Login credentialsNot exposed
Entrance passwordsNot exposed
Email addressesNot exposed
Order historiesNot exposed

While the breach scope is massive, Coupang emphasized that the most sensitive financial and authentication data remained protected.

Root cause: Insider threat

Attack mechanism

FactorDetails
Threat actorFormer employee
Access methodValid authentication keys
Key statusRemained active after departure
DetectionFailed for approximately 6 months
VulnerabilityCredential lifecycle management failure

Security failures

FailureImpact
No credential revocationFormer employee retained access
Insufficient monitoringAnomalous access undetected
Delayed detection6-month dwell time
Disclosure timingAllegations of investor notification delays

Corporate fallout

Leadership changes

PositionStatus
CEOResigned (January 2026)
Interim CEOHarold Rogers
Police questioningScheduled for February 7, 2026
Perjury allegationsUnder investigation

Financial impact

MetricImpact
Market cap loss$8+ billion
Compensation fund$1.2 billion
Per-user compensation50,000 KRW ($34)
Additional 165K compensationSame terms
ActionStatus
Securities class actionFiled (Hagens Berman)
AllegationMisleading investors about security
Government investigationOngoing
National Assembly hearingsConducted December 2025

Securities lawsuit details

Hagens Berman allegations

ClaimDetails
MisrepresentationTouted “proactive security” and “administrative safeguards”
RealityFailed to detect breach for 6 months
Disclosure delayAllegedly delayed informing investors
ImpactInvestors suffered losses when breach disclosed

Class period

AttributeDetails
Law firmHagens Berman Sobol Shapiro LLP
DeadlineFebruary 2026 (2-week alert issued)
Claim typeSecurities fraud
ExchangeNYSE: CPNG

Government response

Pan-government investigation

AgencyRole
Personal Information Protection CommissionData protection oversight
Seoul Metropolitan PoliceCriminal investigation
National AssemblyHearings and oversight
Financial regulatorsInvestor protection review

Regulatory implications

RegulationPotential violation
Personal Information Protection ActData security requirements
Securities disclosure rulesTimely investor notification
Corporate governance standardsExecutive accountability

Compensation program

Terms

AttributeDetails
Amount50,000 KRW (~$34) per user
FormCoupang vouchers
Original affected33.7 million
Additional affected165,000
Total liability~$1.2 billion

Criticism

ConcernIssue
Voucher vs. cashUsers must spend at Coupang
Adequacy$34 may not cover identity protection
Opt-in requiredUsers must claim compensation

Impact on foreign business in Korea

Regulatory scrutiny

The Coupang investigation has broader implications for foreign-owned businesses operating in South Korea:

FactorImpact
Heightened scrutinyData protection compliance
Disclosure expectationsFaster breach notification
Executive accountabilityPersonal liability concerns
Market perceptionTrust in foreign platforms

Recommendations

For Coupang users

PriorityAction
ImmediateClaim compensation vouchers
ImmediateMonitor for phishing using leaked contact info
HighUpdate account security settings
HighWatch for shipping address fraud
OngoingBe alert to targeted scams

For organizations

PriorityAction
CriticalRevoke credentials immediately upon employee departure
CriticalImplement privileged access management
HighMonitor for anomalous data access patterns
HighConduct regular access audits
MediumReview insider threat detection capabilities

For insider threat prevention

ControlPurpose
Just-in-time accessReduce standing privileges
Behavioral analyticsDetect anomalous access
Data loss preventionAlert on bulk data exports
Credential lifecycle automationEnsure prompt revocation
Separation of dutiesLimit single-point exposure

E-commerce sector implications

Common vulnerabilities

IssueRisk
Vast customer databasesHigh-value targets
Former employee accessCredential management gaps
Detection challengesLegitimate credentials used
Disclosure pressureBalancing transparency with investigation

Lessons learned

LessonApplication
Zero trust for insidersFormer employees are threat actors
Detection over preventionAssume breach, detect quickly
Credential hygieneAutomated revocation essential
Disclosure timingDelays compound damage

Context

The Coupang breach illustrates the devastating impact of insider threats combined with poor credential management. A single former employee with valid authentication keys accessed data on nearly 34 million users over approximately six months without detection.

The breach’s aftermath—CEO resignation, $8 billion in lost market value, class action lawsuits, and government investigations—demonstrates the catastrophic business consequences of security failures at scale.

For organizations worldwide, the key lesson is clear: credential revocation upon employee departure must be automatic and immediate. The Coupang breach was entirely preventable had authentication keys been revoked when the employee left the company.

The case also highlights the growing regulatory and legal exposure companies face for data breaches. Beyond operational remediation costs, Coupang faces securities fraud allegations, suggesting that breach disclosure timing is now a material investor concern.

South Korea’s aggressive investigation—including National Assembly hearings, police questioning of executives, and potential perjury charges—signals that governments globally are taking data protection enforcement seriously. Organizations operating internationally must prepare for multi-jurisdictional accountability.

For the 33.9 million affected users, the exposure of names, phone numbers, and shipping addresses creates ongoing risk for targeted phishing and fraud. While financial data was protected, the combination of personal information enables social engineering attacks that may persist for years.