Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hacker Threw MacBook in River to Erase Evidence in Coupang Data Breach

Hacker Threw MacBook in River to Erase Evidence in Coupang Data Breach

Posted on December 29, 2025December 29, 2025 By CWS

In a determined try and cowl his tracks, the hacker behind Coupang’s large private knowledge leak hurled his MacBook Air into a close-by river, just for firm investigators to fish it out days later.

This cinematic twist emerged as South Korean e-commerce big Coupang detailed its government-directed probe into the breach affecting 33.7 million clients, whereas unveiling a 1.685 trillion gained ($1.2 billion) compensation package deal to rebuild belief.

The incident unfolded after Coupang disclosed in late November that hackers had accessed delicate consumer knowledge, together with names, addresses, and cellphone numbers.

Public criticism elevated amid claims of a weak response, however on December 26, the corporate clarified that it was not a solo effort. As an alternative, beginning December 1, Coupang labored below every day authorities oversight to coordinate a multi-week operation monitoring the attacker.

Official letters and directives guided each step. On December 9, authorities instructed Coupang to succeed in out to the leaker, fastidiously scripting messages.

Preliminary conferences occurred on the 14th, yielding a full confession, desktop, arduous drives, and sworn testimony, all promptly handed over. By December 16, main units had been secured; on the seventeenth, they reached authorities analysts.

The plot thickened on December 18: Responding to additional orders, Coupang’s forensics staff retrieved the submerged MacBook Air, documented it in a chain-of-custody model, and delivered it instantly.

Further arduous drives and three fingerprinted declarations adopted on December 21 and had been routed to the police. Coupang maintained radio silence per a authorities mandate, whilst media and lawmakers criticized it.

“This was no self-investigation,” Coupang emphasised, countering “false insecurity” from misreports. The agency briefed officers on December 23 and up to date clients on the twenty fifth, vowing full cooperation towards secondary harms.

Quick-forward to December 29: Interim CEO Harold Rogers introduced the unprecedented voucher blitz, equal to 50,000 gained ($37) per affected account overlaying WOW members, cancellations, and all notified customers.

Beginning January 15, texts will alert recipients to 4 single-use coupons through the app: 5,000 gained every for core Coupang merchandise (Rocket Supply, and so on.) and Eats; 20,000 gained apiece for Journey and luxurious R.LUX.

Rogers expressed deep remorse: “We deeply remorse the misery induced… That is our accountable motion.” He pledged a “customer-centric” pivot: “We’ll remodel into an organization clients belief.”

Cybersecurity consultants hail the restoration as a win towards knowledge destruction ways, however questions linger on prevention. Coupang’s saga underscores provide chain dangers in cloud-scale retail, the place one insider breach ripples into billions.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Breach, Coupang, Data, Erase, Evidence, Hacker, MacBook, River, Threw

Post navigation

Previous Post: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More
Next Post: Hacktivist Proxy Operations Emerge as a Repeatable Model of Geopolitical Cyber Pressure

Related Posts

Hackers Abusing Legitimate Cloud and CDN Platforms to Host Phishing Kits Hackers Abusing Legitimate Cloud and CDN Platforms to Host Phishing Kits Cyber Security News
New Linux Kernel Vulnerability Directly Exploited from Chrome Renderer Sandbox New Linux Kernel Vulnerability Directly Exploited from Chrome Renderer Sandbox Cyber Security News
Critical Microsoft .NET Vulnerability Demands Immediate Attention Critical Microsoft .NET Vulnerability Demands Immediate Attention Cyber Security News
US Sanction Key Threat Actors Linked With North Korea’s Remote IT Worker Scheme US Sanction Key Threat Actors Linked With North Korea’s Remote IT Worker Scheme Cyber Security News
Ransomware Groups Exploit AzCopy for Data Theft Ransomware Groups Exploit AzCopy for Data Theft Cyber Security News
Open-Source Tool for Salesforce Aura Framework Misconfiguration Analysis Open-Source Tool for Salesforce Aura Framework Misconfiguration Analysis Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark