Massive data breach in China

17 January 2025 2 minutes Author: Newsman

One of China’s largest data leaks exposed names, ID numbers and sensitive information about citizens, including medical, financial and educational records.

The data breach affected companies including Weibo, JiDi, JD.com, banks and medical institutions. In total, 1.5 billion records were leaked, including full names, addresses, phone numbers, medical and financial data, and traffic information. Researchers discovered vulnerable Elasticsearch servers that had been open for months. In particular, the JD.com and DiDi records contain data that was not previously covered by the leak. They even contain records of Communist Party members and “friendly countries.” This data poses significant risks to victims, including identity theft, financial fraud and phishing attacks.

Data breaches are an ongoing problem in China, but this case is unique in scale: In 2024, the Shanghai General Police Headquarters (SHGA) suffered a data breach that affected 1 billion citizens. However, the servers detected this time are most likely a mix of old and new data, which may indicate malicious intent.

The leak is a disturbing reminder of the vulnerability of data in the digital age. Although the servers have already been shut down, the scope of the potential damage is enormous: 1.5 billion citizen records, including medical, financial and transportation data, were leaked through unsecured servers, creating the risk of financial fraud and identity theft.

Other related articles
News
Read more
Headline FTC orders GoDaddy to improve cybersecurity after multiple breaches
GoDaddy has been ordered to implement a comprehensive cybersecurity program following a series of data breaches between 2019 and 2022. The US Federal Trade Commission required the company to implement multi-factor authentication, SIEM systems and independent auditing. Customers are advised to contact their hosting providers regarding security measures.
73
Found an error?
If you find an error, take a screenshot and send it to the bot.