Overview
- Seoul police said they obtained the IP used in the intrusion and are analyzing server logs, with investigators probing whether a former employee is involved and verifying nationality and location.
- Coupang confirmed the leak exposed names, phone numbers, email and delivery addresses and some order histories, while payment data and login credentials were not accessed.
- The company detected suspicious activity on November 18 after access believed to have begun June 24, and it initially reported about 4,500 affected accounts before revising the total to 33.7 million.
- A joint public–private investigation led by KISA, the Personal Information Protection Commission and the Science and ICT Ministry is assessing possible violations that could bring fines of up to 3% of revenue.
- Officials and Coupang warned users to watch for phishing, with no confirmed secondary harm reported, as consumer groups prepare compensation demands and potential class actions.