2026 Futuriom 50: Highlights →Explore

Executive Summary

In June 2024, Coupang suffered a major data breach that exposed the personal information of approximately 33.7 million customers. The incident was traced to a former employee who maintained unauthorized access to internal systems after leaving the company. The ex-employee exploited residual system credentials to retrieve sensitive data, which included names, addresses, and contact details. Coupang discovered the breach during a security review and promptly notified regulatory authorities, emphasizing no financial information or passwords were accessed. Immediate actions included revoking all unnecessary access and tightening access control policies.

This breach underscores the persistent issue of insider threats and the dangers of insufficient deprovisioning of system access. As remote work and rapid staff turnovers continue, organizations face heightened pressures to implement robust identity and access management to prevent similar incidents.

Why This Matters Now

This incident highlights the urgent need for organizations to address insider threat risks and deprovision access for departing personnel. With increasing regulatory scrutiny and frequent staff changes, businesses must ensure comprehensive identity governance to mitigate exposure and reduce the window for unauthorized system access.

Attack Path Analysis

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The breach resulted from inadequate user deprovisioning and lack of robust identity and access management controls to promptly remove departing employees' access.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Aviatrix CNSF controls such as Zero Trust Segmentation, East-West Traffic Security, Egress Policy Enforcement, and Multicloud Visibility would have contained lateral movement, restricted exfiltration pathways, and enabled rapid detection of anomalous insider activity. Least privilege and microsegmentation could have severely constrained the former employee’s ability to access and move data outside of designated roles.

Initial Compromise

Control: Zero Trust Segmentation

Mitigation: Access from departed users is blocked at the network and identity layer.

Privilege Escalation

Control: Multicloud Visibility & Control

Mitigation: Anomalous privilege escalations are detected and quickly alerted.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Unauthorized east-west access is denied and flagged.

Command & Control

Control: Threat Detection & Anomaly Response

Mitigation: Unusual remote session patterns or covert C2 channels are detected and alerted in real-time.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Unsanctioned data exports are blocked and reported.

Impact (Mitigations)

Breach scope limited and incident contained more rapidly.

Impact at a Glance

Affected Business Functions

  • Customer Service
  • Order Processing
  • Logistics
Operational Disruption

Estimated downtime: 7 days

Financial Impact

Estimated loss: $5,000,000

Data Exposure

Personal information of approximately 33.7 million customers, including names, email addresses, phone numbers, shipping addresses, and certain order histories, was exposed. Sensitive information such as payment details and login credentials remained secure.

Recommended Actions

  • Enforce Zero Trust Segmentation to limit access strictly to active, authorized identities and workloads.
  • Continuously monitor for and alert on privilege escalations, account reactivation, and anomalous access events.
  • Deploy East-West Traffic Security controls to microsegment workloads and prevent lateral movement within cloud environments.
  • Implement comprehensive Egress Security and Policy Enforcement to detect and block unsanctioned data exfiltration.
  • Leverage Multicloud Visibility and Threat Detection for rapid response to insider and post-employment account abuse.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image