Back to Blog

The Coupang Breach Proves We're Asking the Wrong Question About Data Protection

HarwoodLabs
CybersecurityArtificial IntelligenceLeadershipTechnology

The cybersecurity industry just witnessed South Korea's largest e-commerce breach, with Coupang exposing 33.7 million customer records to attackers who had unfettered access for five months. The predictable chorus has begun: better encryption, stronger access controls, improved monitoring. Industry vendors are already positioning their solutions as the answer.

But we're solving the wrong problem entirely.

The Coupang breach isn't a failure of cybersecurity,it's a damning indictment of business models built on compulsive data hoarding. While security professionals debate encryption standards and access management, we're ignoring the fundamental question: why did Coupang need to collect and store most of this data in the first place?

The uncomfortable truth is that modern e-commerce platforms have become data vacuum cleaners, sucking up every possible data point not because they need it operationally, but because the surveillance economy has convinced us that more data always equals more value. We've built businesses on the assumption that collecting everything is not just acceptable, but essential for competitiveness.

Coupang's breach exposes this lie.

The Hoarding Imperative

Look at what actually leaked from Coupang: user names, phone numbers, email addresses, delivery address books, and purchase histories. On the surface, this seems like the minimum viable dataset for an e-commerce operation. You need to know who's buying, where to ship it, and how to contact them about problems.

But dig deeper into modern e-commerce data practices, and the operational necessity quickly evaporates.

Take delivery addresses. Coupang stored complete "address books" for users,not just their current shipping address, but historical addresses, alternative addresses, workplace addresses, addresses of family members they've shipped gifts to. The operational requirement is knowing where to deliver today's order. Everything else is surveillance dressed up as convenience.

Purchase history presents an even starker example. Coupang maintained detailed records of what customers bought, when they bought it, how much they paid, and likely much more granular behavioral data. The operational requirement for purchase history extends maybe 30-60 days for returns and customer service. Everything beyond that serves one purpose: building psychological profiles for marketing and behavioral manipulation.

Phone numbers reveal the same pattern. E-commerce platforms collect multiple phone numbers per user,home, work, mobile,and retain them indefinitely. The operational requirement is having a working number to resolve delivery issues. The surveillance requirement is having multiple vectors to reach customers for marketing and multiple data points for identity verification across platforms.

This isn't an accident or an oversight. It's the deliberate architecture of data capitalism.

The Minimization Fantasy

The security industry's response to breaches like Coupang follows a predictable script: implement better technical controls around the data you're already collecting. Stronger encryption, more sophisticated access management, behavioral monitoring systems. It's treating the symptom while feeding the disease.

Data minimization gets lip service in compliance frameworks, but it's typically interpreted as "collect what you need for business purposes",and somehow, everything becomes a business purpose. Customer analytics, personalization engines, fraud prevention, marketing optimization, competitive intelligence. Each department builds a case for why their data requirements are essential, and data minimization becomes data rationalization.

The Coupang breach demonstrates how this rationalization fails in practice. Even if we accept that e-commerce platforms need customer data to operate, the scope of collection has metastasized far beyond operational requirements. Attackers didn't just access shipping addresses,they accessed address books. They didn't just get recent purchase data,they got comprehensive purchase histories that could reveal intimate details about users' lives, health conditions, family structures, and personal relationships.

This expansive data collection creates what security researchers call "attack surface",but it's attack surface that exists solely to serve the surveillance economy, not core business operations.

The Korean Context: A Microcosm of Global Dysfunction

South Korea's regulatory response to the Coupang breach reveals how deeply we've internalized the data hoarding model. Korean law requires encryption for payment data and government identifiers but treats names, addresses, phone numbers, and purchase histories as somehow less sensitive. This regulatory blind spot isn't unique to Korea,it reflects a global failure to recognize how seemingly mundane data points combine to create comprehensive surveillance profiles.

The scale of the Coupang breach,33.7 million users in a country of 52 million people,means that nearly two-thirds of South Korean consumers now have their detailed e-commerce behavior exposed to bad actors. This isn't just about identity theft or credit card fraud. It's about creating a detailed map of South Korean consumer behavior, family structures, lifestyle patterns, and economic relationships.

But here's what should terrify us: Coupang's data collection practices aren't outliers. They're industry standard.

Every major e-commerce platform operates on the same model. Amazon, Alibaba, eBay, Shopify-powered stores,they all collect far more data than they need for core operations, store it indefinitely, and build their competitive advan

The Performance Theater of Privacy

The cybersecurity industry's focus on technical controls creates a comforting illusion that we can have both comprehensive surveillance and effective protection. Implement zero-trust architecture, deploy AI-powered monitoring, encrypt everything at rest and in transit. We can collect everything and protect everything.

Coupang proves this is fantasy. Despite being South Korea's leading technology company with presumed access to world-class security tools and expertise, they failed to detect unauthorized access for five months. The breach originated from a former employee who retained access credentials,a scenario that sophisticated monitoring and access controls are specifically designed to prevent.

This isn't a story about inadequate security investment or poor implementation. It's a story about the fundamental impossibility of protecting comprehensive surveillance infrastructure at scale. The more data you collect, the more systems require access to that data. The more systems that require access, the more potential failure points you create. The more failure points you create, the more likely that sophisticated attackers will find a way through.

Security professionals understand this relationship intellectually, but the business imperatives of data capitalism override operational security considerations. We've built businesses that require us to protect the unprotectable, then act surprised when protection fails.

The Path Forward: Operational Minimization

The alternative isn't abandoning e-commerce or returning to cash-only transactions. It's rebuilding business models around operational minimization rather than surveillance maximization.

Real operational minimization means collecting only data that directly enables core business functions and retaining it only as long as those functions require. For e-commerce, that's a much smaller dataset than what platforms currently maintain.

Shipping addresses need to persist only until delivery confirmation, with optional user-controlled address books that aren't centrally stored. Purchase histories need to exist only for the return window plus a brief buffer for customer service. Phone numbers and email addresses need to exist only as active contact methods, not as permanent identity anchors.

This isn't just theoretical. Privacy-focused businesses are already demonstrating that you can operate successful e-commerce with minimal data collection. DuckDuckGo runs profitable search without behavioral tracking. Signal operates secure communications without user data storage. ProtonMail provides email services without surveillance infrastructure.

These examples prove that surveillance isn't operationally necessary,it's a choice. A choice that creates massive security liabilities in exchange for marginal business advantages that primarily benefit advertising networks and data brokers, not core operations.

The Counterargument: Competitive Necessity

Critics will argue that data minimization sounds appealing in theory but fails in competitive markets. Platforms that don't collect comprehensive user data can't personalize experiences, optimize operations, or compete with surveillance-driven competitors. Data collection isn't just about advertising,it enables fraud prevention, supply chain optimization, product recommendations that genuinely help customers.

This argument has some merit. Comprehensive data collection does enable certain business capabilities that customers value. Personalized recommendations, streamlined checkout processes, proactive customer service. The question isn't whether data collection provides any value, but whether the marginal benefits justify the systemic risks.

The Coupang breach suggests they don't. Thirty-three million customers now have their detailed personal and commercial information exposed to bad actors. The personalization and operational optimization that comprehensive data collection enabled becomes worthless when that data ends up in adversarial hands.

Moreover, the competitive necessity argument assumes that surveillance-driven business models are inevitable rather than chosen. Markets that reward comprehensive data collection do so because we've structured them to reward surveillance. Different regulatory frameworks, different customer expectations, different competitive incentives would produce different business models.

What Practitioners Should Actually Do

Security professionals working in data-intensive industries face a difficult reality: they're typically hired to protect business models, not redesign them. But the Coupang breach creates an opening for more fundamental conversations about data strategy.

Start by auditing not just what data you're protecting, but why you're collecting it in the first place. Challenge business stakeholders to justify data retention beyond operational requirements. Push for concrete deletion schedules rather than indefinite storage. Question whether personalization and analytics capabilities justify the security overhead they create.

For organizations willing to consider more radical approaches, experiment with operationally minimal alternatives. Test whether you can deliver core business value with dramatically reduced data collection. Measure customer satisfaction and business metrics when you minimize rather than maximize data extraction.

This isn't about abandoning all data-driven capabilities. It's about distinguishing between data you need to operate and data you collect because you can. The Coupang breach demonstrates that this distinction has security implications that extend far beyond compliance requirements.

The Stakes

We're approaching an inflection point in data-driven business models. Major breaches like Coupang create public awareness and regulatory pressure that forces reconsideration of surveillance capitalism as usual. The question isn't whether we'll see more comprehensive data breaches,we will. The question is whether we'll use these breaches as opportunities to rethink the data collection imperatives that make them inevitable.

The cybersecurity industry can continue treating symptoms with increasingly sophisticated technical controls. Or we can acknowledge that the most effective security control is not collecting unnecessary data in the first place.

Coupang's 33.7 million exposed customers didn't consent to having their detailed personal information stored indefinitely for surveillance purposes. They just wanted to buy products online. The breach happened because we've built an industry that can't distinguish between those two things.

Tags: data-privacy, cybersecurity, e-commerce, surveillance-capitalism, data-minimization

The Coupang Breach Proves We're Asking the Wrong Question About Data Protection | Harwood Labs