Intel is pursuing legal action against former software engineer Jinfeng Luo, who allegedly downloaded approximately 18,000 confidential files from company systems following his termination in July 2025.
The incident represents a significant data security incident, highlighting risks during employee departures and organizational restructuring.
Luo, who joined Intel as a software developer in 2014, worked from Seattle. After receiving his termination notice on July 7, his employment was set to conclude on July 31.
The timing coincided with Intel’s massive workforce reduction affecting over 15,000 employees worldwide.
How the Theft Occurred
According to Intel’s lawsuit filed in Washington federal court, Luo made two distinct attempts to transfer files.
On July 23, he tried downloading files to an external hard drive, but Intel’s security systems blocked the unauthorized transfer.
Five days later, on July 28, Luo connected a different storage device and successfully downloaded the sensitive files before security protocols could intervene.
The downloaded files carried “Top Secret” classification markings, violating federal security regulations and Intel’s confidentiality standards.
The company spent months attempting to contact Luo at his Seattle residence and two additional addresses in the Portland area before filing civil litigation.
Intel is seeking at least $250,000 in damages, recovery of attorney fees, and a court injunction preventing further disclosure of the stolen information.
Despite extensive efforts, Luo could not be located for comment. Intel declined additional statements regarding the active litigation.
This incident underscores critical vulnerabilities in employee access management during workforce transitions. Organizations must implement stronger protocols for monitoring and restricting data access when employees receive termination notices.
The case raises important questions about access controls, real-time monitoring systems, and security practices during organizational restructuring.
The litigation will likely establish precedent for how technology companies protect intellectual property during sensitive personnel transitions.
| Security Category | Risk Factor | Mitigation Strategy |
|---|---|---|
| Access Control | Delayed revocation of credentials post-termination | Immediate access suspension upon notice |
| Data Monitoring | Insufficient tracking of external device connections | Enhanced USB/external device logging |
| Insider Threat | Terminated employees with system access | Risk-based access restrictions before departure |
| Physical Security | Multiple device connection attempts undetected | Endpoint detection and response (EDR) tools |
| Policy Enforcement | Inconsistent security protocols during layoffs | Standardized employee offboarding procedures |
This case demonstrates why cybersecurity teams must prioritize insider threat prevention during organizational changes.
Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today