Coupang Faces Fallout Over Major Data Breach and CEO Resignation

Coupang data breach Coupang user data Coupang CEO resignation South Korea data breach cybersecurity incident Zero Trust Architecture
Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
December 18, 2025 2 min read
Coupang Faces Fallout Over Major Data Breach and CEO Resignation

TL;DR

Coupang has disclosed a major data breach affecting 33 million users, with unauthorized access to shipping addresses and phone numbers. The incident has led to the resignation of CEO Park Dae-jun and an ongoing investigation by South Korean authorities, including a raid on their headquarters. The company faces potential fines and increased scrutiny over its cybersecurity practices.

Coupang Data Breach: 33 Million Users Affected

Coupang has disclosed a significant data breach affecting approximately 33 million customers to US regulators, according to an 8-K report filed with the Securities and Exchange Commission (SEC). The company became aware of the cybersecurity incident involving unauthorized access to customer accounts on November 18.

Upon discovering the incident, Coupang activated its incident-response procedures, blocked the threat actor’s unauthorized access, reported the incident to relevant Korean regulatory and law enforcement authorities, and notified customers whose data may have been accessed.

Leadership Change at Coupang

Park Dae-jun, Coupang's chief executive officer, has resigned following the data breach. Harold Rogers, chief administrative officer for Coupang Inc., has been appointed as interim head.

The company stated that Rogers will focus on addressing customer concerns and stabilizing the company. This leadership change comes less than seven months after a previous restructuring that made Park the sole CEO of Korean operations.

Investigation and Potential Penalties

South Korean police raided Coupang’s Seoul headquarters as part of an investigation into the data breach. Officials believe the breach occurred over five months due to bypassed cybersecurity systems. President Lee Jae Myung expressed concern over the prolonged period of unauthorized access.

The company faces a potential fine of up to 1 trillion won ($681 million) regarding the incident. Founder Bom Kim has been summoned to appear before a parliamentary hearing on December 17.

Details of the Data Breach

The data breach affected nearly two-thirds of the South Korean population, granting unauthorized access to shipping addresses and phone numbers. During a parliamentary grilling, Park stated that a Chinese national, a former employee who had worked on the authentication system and later returned to China, was involved in the attack.

Gopher Security's AI-Powered Zero-Trust Architecture

In light of these breaches, Gopher Security offers an AI-powered post-quantum Zero-Trust cybersecurity architecture. Our platform converges networking and security across devices, apps, and environments—from endpoints and private networks to cloud, remote access, and containers—using peer-to-peer encrypted tunnels and quantum-resistant cryptography. This architecture ensures that every access request is verified, preventing unauthorized access and mitigating the risk of data breaches.

Enhance your organization's cybersecurity posture with Gopher Security. Contact us today to learn more about our AI-powered, post-quantum Zero-Trust solutions.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

Amazon Warns of Russian GRU Cyber Threats to Critical Infrastructure
GRU cyber tactics

Amazon Warns of Russian GRU Cyber Threats to Critical Infrastructure

Discover how Russian GRU is exploiting misconfigured network devices to breach critical infrastructure. Learn defense strategies now! Stay protected.

By Brandon Woo December 17, 2025 7 min read
Read full article
Shannon: Autonomous AI Tool for Effective Penetration Testing
AI penetration testing

Shannon: Autonomous AI Tool for Effective Penetration Testing

Discover how AI-powered tools like Shannon & PentestGPT are automating penetration testing, finding critical web app vulnerabilities faster. Learn more!

By Jim Gagnard December 16, 2025 2 min read
Read full article
Building Ransomware Resilience: Prepare, Protect, and Recover
ransomware resilience

Building Ransomware Resilience: Prepare, Protect, and Recover

UK's ransomware payment ban signals a shift. Discover how to build robust resilience against attacks. Learn best practices for backups, incident response, and more. Secure your organization today!

By Edward Zhou December 15, 2025 6 min read
Read full article
React2Shell Vulnerability CVE-2025-55182: Exploitation Threats and Trends
React2Shell vulnerability

React2Shell Vulnerability CVE-2025-55182: Exploitation Threats and Trends

Critical React2Shell RCE vulnerability exploited by threat actors. Learn about attacker techniques, observed payloads like crypto miners, and how to protect your systems. Read now!

By Divyansh Ingle December 12, 2025 8 min read
Read full article