Thursday, March 27, 2025
HomeCyber Security NewsChina’s Baidu Compromised in Data Leak, Affecting Users

China’s Baidu Compromised in Data Leak, Affecting Users

Published on

SIEM as a Service

Follow Us on Google News

Chinese tech giant Baidu has faced severe scrutiny after allegations emerged that a top executive’s teenage daughter had accessed and shared personal details of internet users online.

The incident has raised significant concerns about data privacy and security at one of China’s largest cloud providers.

The controversy began when online users accused the teenage daughter of Baidu vice president Xie Guangjun of posting personal information, including phone numbers, following an online argument.

The move sparked widespread outrage and speculation about whether Baidu’s internal systems had been compromised.

Baidu’s Response

Baidu vehemently denied any internal data breach, stating that all employees and executives are strictly prohibited from accessing user data without authorization.

The company attributed the leaked information to “doxing databases” on foreign platforms, which aggregate stolen private data.

According to the report from Reuters, To address the situation, Baidu has filed a police report over false claims circulating online, including a purported admission by the teenager that her father had provided her with access to the company’s databases.

Xie Guangjun, who oversees Baidu’s cloud division, apologized for his daughter’s actions and claimed she had obtained the information from overseas social networking sites.

This incident occurs amidst China’s intensified efforts to regulate data privacy.

In recent years, China has implemented stringent laws to protect personal data, aiming to curb the activities of shadowy online data sellers who trade-sensitive details such as birth dates and ownership records.

The introduction of these laws reflects a broader shift towards safeguarding citizen privacy in the digital age.

Market Impact

The controversy has had immediate financial repercussions for Baidu. The company’s shares dropped by more than 4% in Hong Kong trading this week, reflecting investor concerns over data security and potential legal repercussions.

As Baidu navigates this data leak controversy, the incident highlights the ongoing challenges in balancing user privacy with the demands of operating in a digital marketplace.

The company’s denial of any internal breach suggests a focus on external sources as the cause, but the episode underscores the need for robust safeguards against unauthorized data access, whether from within or outside an organization.

In a statement, Baidu reiterated its commitment to user privacy and data security, emphasizing that it is working closely with authorities to investigate the matter further.

As China continues to strengthen its data protection laws, companies like Baidu face increasing scrutiny and must ensure that their practices align with these evolving regulations.

The impact of this incident will likely be felt beyond Baidu, influencing broader discussions about data security and privacy in China’s tech sector.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Splunk RCE Vulnerability Enables Remote Code Execution via File Upload

A severe vulnerability in Splunk Enterprise and Splunk Cloud Platform has been identified, allowing...

12 Cybercriminals Arrested After Ghost Communication Platform Shutdown

Law enforcement agencies have successfully dismantled a clandestine communication platform known as "Ghost," which...

Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks

In a concerning development for cybersecurity professionals, threat actors are increasingly utilizing a powerful...

Hackers Exploit COM Objects for Fileless Malware and Lateral Movement

Security researchers Dylan Tran and Jimmy Bayne have unveiled a new fileless lateral movement...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Splunk RCE Vulnerability Enables Remote Code Execution via File Upload

A severe vulnerability in Splunk Enterprise and Splunk Cloud Platform has been identified, allowing...

12 Cybercriminals Arrested After Ghost Communication Platform Shutdown

Law enforcement agencies have successfully dismantled a clandestine communication platform known as "Ghost," which...

Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks

In a concerning development for cybersecurity professionals, threat actors are increasingly utilizing a powerful...