Data breach reveals identity of 2 million Chinese Communists

A large database obtained from the Chinese government server in Shanghai reveals the identities of nearly 2 million Chinese Communist Party members, thousands of which are British companies such as British consulates, defense firms, banks, universities and jaguars. I work in. HSBC and Rolls-Royce.

Leaked database reveals how many Chinese Communist Party members are embedded in UK institutions such as pharmaceuticals, research firms, defense firms, universities, auto giants, banking giants Standard Chartered Bank and HSBC. to augment.

by Daily mail The shared database contains the personal information of approximately 2 million Shanghai-based CCP members. In total, the Chinese Communist Party has 92 million members, tens of thousands of whom are active outside of China.

The database had previously been stolen from the CCP’s Shanghai server, posted on Telegram, and then shared by Chinese dissidents with the Inter-Parliamentary Alliance on China Policy (IPAC). Countries are approaching China. Congressman Iain Duncan Smith and Baroness Helena Kennedy are members of the alliance.

The treaty is 1.95 million PCB members Over 600 members working at Standard Chartered Bank and HSBC, 123 members working at pharmaceutical giant Pfizer and AstraZeneca, academics doing research in aerospace engineering and chemistry at the university, hundreds working at Airbus, Boeing and Rolls-Royce Includes party members. It is part of the British defense industry.

The list also includes “aerospace engineering researchers at top universities who also work in private companies” and Chinese working at the British consulate in Shanghai, which hosts a team of MI6 officers working under the direction of diplomats. By working in a consulate, CCP members may be able to identify British intelligence personnel and notify the Chinese government of their activities and their whereabouts.

The fact that full-time members of the Chinese Communist Party work for pharmaceutical companies Pfizer and AstraZeneca raises questions about the security of intellectual property, especially information about the COVID-19 vaccine. Having CCP members in large organizations can also increase the risk of insider threats to sensitive data.

Recently, US courts indicted two hackers. Working at the Department of Homeland Security (MSS) in China, we are targeting multiple organizations in multiple countries to access valuable intellectual property, including COVID-19 research data.

These victims, other entities and individuals are located in the United States, Australia, Belgium, Germany, Japan, Lithuania, the Netherlands, Spain, South Korea, Sweden and the United Kingdom, with high-tech manufacturing and medical equipment in their target sectors. Was included. , Civil engineering and industrial engineering; business, education and game software. Solar energy; pharmaceuticals and defense.

The main motivation of the two Chinese hackers was to steal valuable intellectual property from the tech industry for the benefit of MSS or other Chinese government agencies. Hackers can even threaten to post files to the internet and force victims to use cryptocurrencies and, more recently, computer networks of companies developing COVID-19 vaccines, testing technologies, and treatments. We have investigated the vulnerability of.

Recently, five Chinese hackers working at APT41 also said: “100 victims Software developers, computer hardware manufacturers, telecommunications suppliers, social media companies, video game companies, non-profit organizations, universities, groups of thinking, foreign governments, democratic politicians and activists, etc. Hong Kong in the United States and abroad. “

The US Department of Justice said state-sponsored hackers helped steal source code, software code signing certificates, customer account data and valuable business information, and also implemented ransomware and crypto jack programs. Two of the five hackers have colluded with two Malaysian businessmen to take advantage of computer intrusions targeting the US and international video game industry.

According to Sam Curry, Cybereason’s chief security officer, the Chinese are cyber superpowers, responsible for stealing billions of dollars in intellectual property from thousands of companies each year. Businesses and government agencies must take threats seriously, and it is imperative to invest in improving network defenses against explicit and malicious espionage activity.

In the title report The Hidden Face of China: The Evolution of the Global Cyber ​​PowerIntSights, a threat intelligence firm, said that to understand threats coming from China, they must first understand the desired outcomes, culture and worldview.

“13th Five-Year Plan of the Communist Party of China, which was ratified in 2016, 6.5% of the economic growth rate in 2020, innovation-oriented development, and more Migration Xi Jinping Chairman of the high manufacturing industry added value underlined the vision.

“The latter of these goals is described in more detail in a document titled Made in China 2025, which shifts China’s industry from low-quality, low-value products to producing high-tech products by category. A strategic roadmap for. Includes pharmaceutical, automotive, aerospace, semiconductor, computer and robotics industries. These documented plans are corporate spies and wisdom due to cyber intrusions observed over the past few years. This is an important indicator of the motivation behind property theft, ”the report says.

Leave a Reply

Your email address will not be published. Required fields are marked *