Data leak reveals the identities of 2 million Chinese Communists

A large database obtained from the Chinese government server in Shanghai reveals the identities of nearly 2 million members of the Chinese Communist Party, thousands of which are British companies such as British consulates, defense companies, banks, universities and jaguars. I work at. HSBC, and Rolls-Royce.

The leaked database reveals how much Chinese Communist Party members are embedded in UK institutions such as pharmaceutical companies, research companies, defense companies, universities, automobile giants, banking giants Standard Chartered Bank and HSBC. increase.

by Daily mail The shared database contains the personal information of approximately 2 million Shanghai-based CCP members. In total, the Chinese Communist Party boasts a total of 92 million members, tens of thousands of whom are active outside of China.

The database was previously stolen from Shanghai’s CCP server, posted on Telegram, and then shared by dissident Chinese with the Inter-Parliamentary Alliance on China Policy (IPAC). Countries approach China. Congressman Iain Duncan Smith and Baroness Helena Kennedy are members of the alliance.

The treatise is 1.95 million CCP members More than 600 members working at Standard Chartered Bank and HSBC, 123 members working at pharmaceutical giant Pfizer and AstraZeneca, scholars doing aerospace engineering and chemistry research at university, hundreds working at Airbus, Boeing and Rolls-Royce Includes members of the party. It forms part of the British defense industry.

The list also includes “aerospace engineering researchers at top universities who also work in private companies” and Chinese working at the British Consulate in Shanghai, which hosts a team of MI6 officers working under diplomats. By working at a consulate, CCP members may be able to identify British intelligence personnel and inform the Chinese government of their activities and whereabouts.

The fact that full-time members of the Chinese Communist Party work for the pharmaceutical companies Pfizer and AstraZeneca raise questions about intellectual property safety, especially information about the COVID-19 vaccine. Having CCP members in large companies can also increase the risk of internal threats to sensitive data.

Recently, US courts Indicted two hackers Working at the Department of Homeland Security (MSS) in China, we are targeting multiple organizations in several countries to access valuable intellectual property, including COVID-19 research data.

These victims, other entities, and individuals are located in the United States, Australia, Belgium, Germany, Japan, Lithuania, the Netherlands, Spain, South Korea, Sweden, and the United Kingdom, with high-tech manufacturing and medical equipment in their target industries. Was included. , Civil engineering, and industrial engineering; business, education, and gaming software. Solar energy; pharmaceuticals, and defense.

The main motivation for the two Chinese hackers was to steal valuable intellectual property from the tech industry for the benefit of MSS or other Chinese government agencies. Hackers may even threaten to publish files on the Internet and force victims to use cryptocurrencies, and more recently, computer networks of companies developing COVID-19 vaccines, test technologies, and treatments. We investigated the vulnerability of.

Recently, five Chinese hackers working at APT41 also said, ” 100 victims Software developers, computer hardware makers, telecommunications providers, social media companies, video game companies, nonprofits, universities, think tanks, foreign governments, democratic politicians and activists, etc. in Hong Kong in the United States and abroad. “

The U.S. Department of Justice said state-sponsored hackers helped steal source code, software code signing certificates, customer account data, and valuable business information, and also implemented ransomware and crypto jack schemes. Two of the five hackers have colluded with two Malaysian businessmen to benefit from computer intrusions targeting the US and international video game industry.

According to Sam Curry, Chief Security Officer of Cybereason, the Chinese are cyber superpowers, responsible for the theft of billions of dollars of intellectual property from thousands of businesses each year. Businesses and government agencies need to take threats seriously, and it is imperative to invest in improving network defenses against explicit and malicious espionage-related activities.

In the title report China’s Dark Side: Evolution of Global Cyber ​​PowerIntSights, a threat intelligence company, said that in order to understand threats from China, they must first understand their desired outcomes, culture and worldview.

“13th five-year plan of the Chinese Communist Party, which was ratified in 2016, 6.5 percent of the economic growth rate in 2020, Migration Xi Jinping President of vision to the high manufacturing value-added development, and a more innovation-led Was outlined.

“The latter of these goals are further outlined in a document called Made in China 2025, which upgrades the Chinese industry from low-quality, low-value products to the production of high-tech products by category. A strategic roadmap for. Includes pharmaceutical, automotive, aerospace, semiconductor, IT, and robotics. These documented plans are corporate spies and wisdom due to cyber intrusions observed over the last few years. It’s an important indicator of the motivation behind the theft of property, “the report said.

Data leak reveals the identities of 2 million Chinese Communists

Source link Data leak reveals the identities of 2 million Chinese Communists

Related Articles

Back to top button