Ex-Intel Engineer Accused of Stealing 18,000 Confidential Files Before Disappearing

Intel is pursuing legal action against former software engineer Jinfeng Luo, who allegedly downloaded approximately 18,000 confidential files from company systems following his termination in July 2025.

The incident represents a significant data security incident, highlighting risks during employee departures and organizational restructuring.

Luo, who joined Intel as a software developer in 2014, worked from Seattle. After receiving his termination notice on July 7, his employment was set to conclude on July 31.

The timing coincided with Intel’s massive workforce reduction affecting over 15,000 employees worldwide.

How the Theft Occurred

According to Intel’s lawsuit filed in Washington federal court, Luo made two distinct attempts to transfer files.

On July 23, he tried downloading files to an external hard drive, but Intel’s security systems blocked the unauthorized transfer.

Five days later, on July 28, Luo connected a different storage device and successfully downloaded the sensitive files before security protocols could intervene.

The downloaded files carried “Top Secret” classification markings, violating federal security regulations and Intel’s confidentiality standards.

The company spent months attempting to contact Luo at his Seattle residence and two additional addresses in the Portland area before filing civil litigation.

Intel is seeking at least $250,000 in damages, recovery of attorney fees, and a court injunction preventing further disclosure of the stolen information.

Despite extensive efforts, Luo could not be located for comment. Intel declined additional statements regarding the active litigation.

This incident underscores critical vulnerabilities in employee access management during workforce transitions. Organizations must implement stronger protocols for monitoring and restricting data access when employees receive termination notices.

The case raises important questions about access controls, real-time monitoring systems, and security practices during organizational restructuring.

The litigation will likely establish precedent for how technology companies protect intellectual property during sensitive personnel transitions.

Security CategoryRisk FactorMitigation Strategy
Access ControlDelayed revocation of credentials post-terminationImmediate access suspension upon notice
Data MonitoringInsufficient tracking of external device connectionsEnhanced USB/external device logging
Insider ThreatTerminated employees with system accessRisk-based access restrictions before departure
Physical SecurityMultiple device connection attempts undetectedEndpoint detection and response (EDR) tools
Policy EnforcementInconsistent security protocols during layoffsStandardized employee offboarding procedures

This case demonstrates why cybersecurity teams must prioritize insider threat prevention during organizational changes.

Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here