{"id":76289,"date":"2022-10-07T09:39:17","date_gmt":"2022-10-07T01:39:17","guid":{"rendered":"https:\/\/x-phy.com\/?p=76289"},"modified":"2022-10-07T09:39:17","modified_gmt":"2022-10-07T01:39:17","slug":"hackers-offers-23-tb-of-personal-data-on-underground-forum","status":"publish","type":"post","link":"https:\/\/x-phy.com\/hackers-offers-23-tb-of-personal-data-on-underground-forum\/","title":{"rendered":"Data Leak May Have Exposed Sensitive Information of 1 Billion China Citizens; Hacker Offers 23 TB of Personal Data on Underground Forum"},"content":{"rendered":"<p>In our rapidly digitalizing world, we are increasingly exposed to a myriad of cyber threats. The latest whisper within cybersecurity circles suggests an alleged monumental <a href=\"https:\/\/x-phy.com\/what-we-can-learn-from-the-massive-dell-data-breach-that-exposed-49-million-records\/\">data breach<\/a>, potentially exposing the personal data of over a billion Chinese citizens.<\/p>\n<p>Our CEO, Camellia Chan, shared with CPO Magazine, \u201cWhile details remain unclear, the lesson organizations can immediately take away is that <a href=\"https:\/\/x-phy.com\/\">cybersecurity<\/a> needs to be holistic. Cybercriminals will look for any way in, so even if a company feels that they have all internal processes locked down \u2013 which is statistically unlikely \u2013 the third-party they use to deliver office milk or some other service may not. That\u2019s their weak spot. Businesses can never take their eye off the ball. A good<a href=\"https:\/\/x-phy.com\/category\/blog\/\"> cybersecurity posture<\/a> isn\u2019t a one-and-done tick-box exercise but an ongoing proactive, intelligent, self-learning process. That way, organizations never stand still in the face of ever-more innovative cybercriminals but have a stance that continues to evolve around today\u2019s threats.\u201d<\/p>\n<h2><strong>More on the incident \u2013 monumental amounts of data<\/strong><\/h2>\n<p>A figure operating under the pseudonym &#8220;ChinaDan&#8221; has startled cybersecurity experts, claiming to hold an immense 23 terabytes of personal data, purportedly extracted from the Shanghai National Police (SHGA) database. This cache is said to contain diverse records, from individual identifications to exhaustive court histories.<\/p>\n<p>Further heightening concerns, this <a href=\"https:\/\/cloud.x-phy.com\/\">data repository<\/a> is allegedly available for just 10 bitcoins, roughly equivalent to $200,000. To substantiate these claims, a sample set comprising 750,000 records has been unveiled. However, the legitimacy of the entire dataset remains a topic of debate among professionals.<\/p>\n<p>Historically, some breaches stand out due to their sheer magnitude, such as the 2013 Yahoo breach or vulnerabilities in India&#8217;s Aadhar system. However, the Shanghai data saga presents a unique challenge. The focus has shifted from merely the breach to the potential sale and use of this data.<\/p>\n<p>Furthermore, the surprisingly low price tag for such a vast amount of data has raised eyebrows. Questions arise: Could this possibly be a blend of previously compromised data sets?<\/p>\n<h3><strong>Flexxon\u2019s commitment<\/strong><\/h3>\n<p>Flexxon is deeply committed to the sanctity of data protection. Regardless of the authenticity of the Shanghai breach, it underscores a pressing concern: the glaring vulnerabilities endemic to our digital age.<\/p>\n<p>Our ethos at Flexxon centers on a proactive approach toward threats. We believe in consistently advancing our defenses, not just responding after a breach has occurred. The incidents like the one alleged by &#8220;ChinaDan&#8221; only emphasize the critical importance of robust cybersecurity measures.<\/p>\n<p>In light of such revelations, the call to action for organizations and individuals becomes evident: reinforce your cybersecurity framework. Don&#8217;t merely react; anticipate and protect.<\/p>\n<p>Read the full article here: <a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/data-leak-may-have-exposed-sensitive-information-of-1-billion-china-citizens-hacker-offers-23-tb-of-personal-data-on-underground-forum\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cpomagazine.com\/cyber-security\/data-leak-may-have-exposed-sensitive-information-of-1-billion-china-citizens-hacker-offers-23-tb-of-personal-data-on-underground-forum\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<div>\n<p><span style=\"color: #000000; font-weight: bold;\">TAGS<\/span><\/p>\n<\/div>\n<div><span class=\"tag_style\">Security Incidents <\/span><span class=\"tag_style\">Industry News <\/span><span class=\"tag_style\">Media Coverage<\/span><\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In our rapidly digitalizing world, we are increasingly exposed to a myriad of cyber threats. The latest whisper within cybersecurity circles suggests an alleged monumental data breach, potentially exposing the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":76398,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[15],"tags":[],"class_list":["post-76289","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends-and-developments"],"_links":{"self":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/76289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/comments?post=76289"}],"version-history":[{"count":0,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/76289\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media\/76398"}],"wp:attachment":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media?parent=76289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/categories?post=76289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/tags?post=76289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}