How Chinese insiders are stealing data scooped up by President Xi’s national surveillance system

How Chinese insiders are stealing data scooped up by President Xi's national surveillance system

December 8, 2024 at 12:09PM

Chinese tech company employees and government workers are involved in a booming black market for user data, including sensitive information from high-ranking officials. This illegal ecosystem thrives on scams and fraud, using data harvested through state surveillance and compromised systems, raising significant privacy risks for individuals in China.

### Meeting Takeaways

1. **Siphoning User Data**: Employees from Chinese tech companies and government workers are illegally siphoning off user data and selling it, contributing to a booming black market for sensitive information.

2. **Role of Government**: The Chinese government is known to leverage technology companies to bolster its surveillance apparatus, compelling businesses to manage and provide user information for state snooping and censorship.

3. **Financial Incentives**: Insiders within corporations and government are motivated by significant financial rewards (between $2,700 and $9,700) to sell harvested user information to fraudsters.

4. **Data Collection Methods**:
– Chinese data brokers are utilizing direct recruitment strategies to acquire personal data from insiders.
– They claim to have formal contracts with major telecom companies to access information obtained through deep packet inspection (DPI).

5. **Use of Stolen Data**: Acquired data is used for various illicit activities including scams and fraud, as well as by legitimate businesses for sales leads.

6. **Types of Data in SGKs**: Social Engineering Databases (SGKs) contain extensive personal information including:
– Personal profiles: names, addresses, birth dates, phone numbers, and social media details.
– Bank details, health records, property information, and facial recognition data.
– Data obtained through breaches and malicious SDKs.

7. **Market Dynamics**: The underground market for personal information is robust, with SGKs allowing low-cost access to vast datasets; buyers range from criminals to legitimate businesses.

8. **Risk and Privacy Concerns**: The proliferation of SGKs threatens the privacy of all Chinese citizens and highlights a gap in awareness among Western cybersecurity researchers regarding the extent of this issue.

9. **Case Studies Highlighted**:
– Specific examples of personal information obtained from SGKs, including sensitive data about high-ranking CCP officials and FBI-wanted criminals.
– The research highlights the potential for these databases to track advanced threat actors.

10. **Call for Awareness**: There’s a significant need for Western cybersecurity experts to recognize the scope of Chinese data breaches, both for privacy protection and for understanding threats to critical infrastructure.

### Action Items
– Increase awareness and training among cybersecurity teams about the Chinese data black market.
– Monitor developments related to SGK activities and threats posed by breaches in China.
– Consider outreach to Chinese cybersecurity researchers to collaborate on data privacy issues and threat tracking.

Full Article