April 17, 2026

Intel Accuses Ex-Engineer of Stealing Thousands of Confidential Files After Layoff

Gemini_Generated_Image_1f2ate1f2ate1f2a

A routine layoff turned into a high-stakes security breach for Intel, as a former employee allegedly walked away with thousands of confidential files just days before his exit.

Corporate layoffs usually end with goodbyes, exit interviews, and a cardboard box of personal belongings. But Intel says one of its former engineers left with something far more valuable: 18,000 confidential files, including data the company labels as top secret. The incident has sparked a legal battle and raised serious questions about how much damage an insider can do in just a few clicks.

Source : Intel

This case is not just another HR dispute gone wrong. It comes at a time when tech companies are already on edge due to sweeping layoffs, rising competition, and growing pressure to protect intellectual property. When someone with nearly a decade of experience suddenly downloads large volumes of sensitive material right before leaving, every alarm in the building goes off, and Intel is not ignoring any of them.

Reports identify the former employee as Jinfeng Luo, who joined Intel in 2014. During his final days at the company, he allegedly moved thousands of files from Intel’s internal database to his personal possession. These were not casual files. Intel claims that many of them contain highly sensitive and proprietary information that competitors would love to get their hands on.

Once Intel noticed suspicious download activity, an internal investigation began. The company traced the data transfer back to Luo. After several attempts to contact him at his Seattle address without any response, Intel moved forward with a lawsuit.

Now the tech giant is seeking 250,000 dollars in damages along with a court order to prevent any possibility of leaks. Luo has not issued a public statement yet, and the case remains active. For the rest of the industry, this situation is a reminder that insider threats are just as dangerous as external cyberattacks and often far harder to detect.

About The Author

Leave a Reply

Your email address will not be published. Required fields are marked *