home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 2,344 of 2,445   
   Mike Powell to All   
   Massive Chinese data breach allegedly sp   
   06 Feb 26 08:08:11   
   
   TZUTC: -0500   
   MSGID: 2102.consprcy@1:2320/105 2deb25f1   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Massive Chinese data breach allegedly spills 8.7 billion records - here's what   
   we know   
      
   By Sead Fadilpa?i?    
      
   Someone kept a gigantic database unlocked on the internet   
      
    Exposed Elasticsearch cluster leaked 8.7 billion records of Chinese   
   individuals and businesses   
    Data included PII, plaintext passwords, and corporate registration details   
    Cluster likely run by data brokers; hosted on bulletproof provider, now locked   
   down after discovery   
      
   One of the largest data leaks ever to happen in China has been detected after   
   security researchers from Cybernews reported coming across an exposed   
   Elasticsearch cluster that contained more than 160 indices.   
      
   These indices held approximately 8.7 billion records, primarily of Chinese   
   individuals.   
      
   The records contained all sorts of personally identifiable and sensitive data,   
   including names, addresses, phone numbers, birth dates, gender information,   
   social media identifiers, and plaintext passwords. They also contained various   
   corporate and business records such as company registration details, legal   
   representatives, business contact information, and registration addresses and   
   licensing metadata.   
      
   Long-running aggregation effort   
      
   The researchers could not determine who the owner of the database is, so there   
   is no confirmation if this was a malicious act, or not. Cybernews says the   
   cluster resembles what data brokers usually do, since it was highly organized   
   and thoroughly segmented.   
      
   Since it was open for three weeks, it is possible that it was picked up by   
   threat actors in the meantime.   
      
   "Despite the short exposure window, the scale of the dataset means that   
   automated scraping during this period could have resulted in widespread   
   secondary dissemination," the researchers said.   
      
   The data belongs mostly to people in mainland China, but victims are scattered   
   across multiple Chinese provinces.   
      
   The database may have been open for mere weeks, but it probably took a lot   
   longer to harvest all of it. Apparently, this wasn't done in a single swoop,   
   and the data was likely scraped from different sources.   
      
   "The presence of timestamps and import dates points to a long-running   
   aggregation effort rather than a single historical breach," the team   
   explained.   
      
   Investigators managed to find the provider that hosted the cluster. It is a   
   bulletproof hosting company, "commonly associated with high-risk or   
   non-compliant data operations." After being notified, the provider locked the   
   database down, it seems.   
      
      
   https://www.techradar.com/pro/security/massive-chinese-data-breach-allegedly-sp   
   ills-8-7-billion-records-heres-what-we-know   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: Capitol City Online (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 134 206 300 307 317 400 426 428 470   
   SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca