창간 80주년 경향신문

“The Coupang incident was an accident caused by poor management”···The scale of the personal data leak is likely to grow further



완독

경향신문

공유하기

  • 카카오톡

  • 페이스북

  • X

  • 이메일

보기 설정

글자 크기

  • 보통

  • 크게

  • 아주 크게

컬러 모드

  • 라이트

  • 다크

  • 베이지

  • 그린

컬러 모드

  • 라이트

  • 다크

  • 베이지

  • 그린

본문 요약

인공지능 기술로 자동 요약된 내용입니다. 전체 내용을 이해하기 위해 본문과 함께 읽는 것을 추천합니다.
(제공 = 경향신문&NAVER MEDIA API)

내 뉴스플리에 저장

“The Coupang incident was an accident caused by poor management”···The scale of the personal data leak is likely to grow further

입력 2026.02.10 20:54

  • By Noh Do-hyun, Lee Sung-hee

This article was translated by an AI tool. Feedback Here.

Choi Woo-hyuk, head of the Information Security and Network Policy Bureau at the Ministry of Science and ICT, announces the findings of the public-private joint investigation team on the Coupang breach at the Government Complex Seoul in Jongno-gu, Seoul, on the 10th. Reporter Moon Jae-won

Choi Woo-hyuk, head of the Information Security and Network Policy Bureau at the Ministry of Science and ICT, announces the findings of the public-private joint investigation team on the Coupang breach at the Government Complex Seoul in Jongno-gu, Seoul, on the 10th. Reporter Moon Jae-won

It was confirmed that the former Coupang employee who leaked a massive trove of personal information viewed the address list page, which contains names, phone numbers, and addresses, about 148 million times. From the ‘Edit My Information’ page alone, 33,673,817 name and email records were leaked, and the final, precise tally to be confirmed and announced by the Personal Information Protection Commission is expected to grow further. The government pointed to “Coupang’s poor management” as the cause of the incident.

On the 10th, the Ministry of Science and ICT announced the findings of the public-private joint investigation into the Coupang breach. The incident erupted when a former Coupang employee of Chinese nationality, referred to as Mr. A, leaked users’ personal information.

An analysis by the investigation team of 25.6TB of Coupang access logs from November 29, 2024 to December 31 of last year found that 33,673,817 name and email records were leaked from the Edit My Information page. This is similar to the government’s initial estimate of 33.7 million compromised accounts.

Mr. A viewed the address list pagewhich includes names, phone numbers, delivery addresses, and apartment entrance passwords masked with special charactersapproximately 148.05 million times in total (including duplicates). Because the address list contains numerous third-party details such as those of family members and friends in addition to the account holder’s own information, the pool of affected individuals could widen.

Choi Woo-hyuk, head of the Information Security and Network Policy Bureau at the Ministry of Science and ICT, said, “A view constitutes a leak,” while adding, “The Personal Information Protection Commission will make the final announcement on the precise scale of the personal information leak.” The address list page allows up to 20 delivery addresses to be registered and includes various data, making it difficult to calculate the scale of the leak.

The address list edit page that included unmasked apartment entrance passwords was viewed 50,474 times, and the order list page showing a user’s recent purchases was viewed 102,682 times. The investigation team stated, “No secondary damage attributable to the personal information leak has been identified to date.”

Starting in January of last year, Mr. A conducted attack tests based on vulnerabilities he had been aware of while employed at Coupang. From April 14 to November 8 of last year, he used automated web crawling attack tools to exfiltrate data on a large scale. He used a total of 2,313 IP addresses in the process. It has not been confirmed whether the data were transmitted to external cloud servers located overseas. Mr. A also sent two emails to Coupang, on November 16 and 25 of last year, notifying the company of the leak.

The investigation team cited Coupang’s poor management of its information protection system as the cause of the leak. Choi said, “This is clearly a management problem,” adding, “It is hard to view it as a sophisticated attack.”

Results of the analysis of the scale of Coupang’s data leak. Provided by the Ministry of Science and ICT

Results of the analysis of the scale of Coupang’s data leak. Provided by the Ministry of Science and ICT

Under normal access, a Coupang user goes through the login process to receive a kind of ‘electronic pass’. Coupang’s gateway server verifies whether the issued electronic pass is valid and, if nothing is amiss, allows access to the service.

Mr. A stole the signing key of the user authentication system he had managed while employed, then forged and altered the electronic pass to bypass Coupang’s authentication framework. As a result, he was able to access Coupang’s services without going through the normal login process.

Coupang failed to detect or block access attempts that used forged or altered electronic passes. Its mechanism to verify whether an electronic pass had been issued through the proper process was inadequate. It also emerged that developers stored signing keys on laptops, creating risks of key leakage and misuse, and that there was no key history management system. Legal violations were also identified, including delayed incident reporting and noncompliance with data preservation orders. The investigation team has referred the deletion of web and application logs for criminal investigation.

Some have speculated that the government rushed to announce the findings ahead of a “Coupang hearing” in the U.S. House of Representatives examining alleged discrimination by the Korean government. In response, Choi drew a line, saying, “This has nothing to do with external factors.” He said, “We have never discriminated against any company,” and, “We have been adhering to the principle of disclosing results swiftly and transparently as soon as they are available.” Regarding Coupang’s own finding that Mr. A had stored a little over 3,000 items of personal information, he said, “That is merely the subject entity’s claim.”

Based on the findings, the Ministry of Science and ICT will have Coupang submit an implementation plan for recurrence prevention measures within this month and will review the results by July.

Coupang said that day, “We have never denied the previously cited scale of roughly 33.7 million affected accounts,” adding, “We have notified roughly 33.7 million people of the personal information leak and have provided a compensation plan (purchase vouchers).”

  • AD
  • AD
  • AD
뉴스레터 구독
닫기

전체 동의는 선택 항목에 대한 동의를 포함하고 있으며, 선택 항목에 대해 동의를 거부해도 서비스 이용이 가능합니다.

보기

개인정보 이용 목적- 뉴스레터 발송 및 CS처리, 공지 안내 등

개인정보 수집 항목- 이메일 주소, 닉네임

개인정보 보유 및 이용기간- 원칙적으로 개인정보 수집 및 이용목적이 달성된 후에 해당정보를 지체없이 파기합니다. 단, 관계법령의 규정에 의하여 보존할 필요가 있는 경우 일정기간 동안 개인정보를 보관할 수 있습니다.
그 밖의 사항은 경향신문 개인정보취급방침을 준수합니다.

보기

경향신문의 새 서비스 소개, 프로모션 이벤트 등을 놓치지 않으시려면 '광고 동의'를 눌러 주세요.

여러분의 관심으로 뉴스레터가 성장하면 뉴욕타임스, 월스트리트저널 등의 매체처럼 좋은 광고가 삽입될 수 있는데요. 이를 위한 '사전 동의'를 받는 것입니다. 많은 응원 부탁드립니다. (광고만 메일로 나가는 일은 '결코' 없습니다.)

뉴스레터 구독
닫기

닫기
닫기

뉴스레터 구독이 완료되었습니다.

개인정보 수집 및 이용
닫기

개인정보 이용 목적- 뉴스레터 발송 및 CS처리, 공지 안내 등

개인정보 수집 항목- 이메일 주소, 닉네임

개인정보 보유 및 이용기간- 원칙적으로 개인정보 수집 및 이용목적이 달성된 후에 해당정보를 지체없이 파기합니다. 단, 관계법령의 규정에 의하여 보존할 필요가 있는 경우 일정기간 동안 개인정보를 보관할 수 있습니다.
그 밖의 사항은 경향신문 개인정보취급방침을 준수합니다.

닫기
광고성 정보 수신 동의
닫기

경향신문의 새 서비스 소개, 프로모션 이벤트 등을 놓치지 않으시려면 '광고 동의'를 눌러 주세요.

여러분의 관심으로 뉴스레터가 성장하면 뉴욕타임스, 월스트리트저널 등의 매체처럼 좋은 광고가 삽입될 수 있는데요. 이를 위한 '사전 동의'를 받는 것입니다. 많은 응원 부탁드립니다. (광고만 메일로 나가는 일은 '결코' 없습니다.)

닫기