34 million
South Korean e-commerce leader Coupang has provided a stark illustration of the tangible financial consequences of a major cybersecurity incident. The company announced a net loss of $26 million for the fourth quarter of 2025, directly attributing the downturn to a massive data breach in November 2025 that affected 34 million customers. The breach, which exposed names, phone numbers, and shipping addresses, triggered a significant customer backlash, leading to a decline in active users and a negative free cash flow of $278 million for the quarter. A key driver of this was a $1.2 billion commitment to customer compensation vouchers. This case serves as a powerful example of how a data breach can directly translate into shareholder value destruction and operational disruption.
In November 2025, Coupang suffered a data breach that compromised the personal data of approximately 34 million customers. The exposed information included:
The company's investigation cited a targeted attack by a former employee as the cause, while South Korea's Science Ministry pointed to broader management failures. Regardless of the root cause, the public disclosure of the breach had a swift and severe impact on the business.
The financial and operational fallout from the breach has been substantial, demonstrating the cascading effects of losing customer trust.
Business Impact:
Reputational Impact:
This incident is a textbook case study for boards and executives on the direct line between cybersecurity posture and financial performance. The cost of preventing a breach is often dwarfed by the cost of remediation, lost business, and market value destruction.
The conflicting reports on the root cause—an insider threat versus management failure—point to two potential, and not mutually exclusive, attack paths.
Insider Threat Scenario (T1078.002 - Valid Accounts: Domain Accounts):
Management Failure Scenario (T1530 - Data from Cloud Storage Object):
In either case, the core failure was an inability to properly secure and monitor access to a critical data asset containing the personal information of millions of customers.
Detection:
Strategic Mitigations:
Tactical Mitigations:
Implement strict offboarding procedures to ensure all access for departing employees is immediately and completely revoked.
Enforce the principle of least privilege, ensuring accounts only have access to the data essential for their role.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats