Tuesday, May 13, 2025
HomeCyber Security NewsFrustrated IT Admin Gets 7 Years in Prison for Wiping Employer’s Databases

Frustrated IT Admin Gets 7 Years in Prison for Wiping Employer’s Databases

Published on

SIEM as a Service

Follow Us on Google News

Chinese real estate biz giant Lianjia’s former database administrator, Han Bing (40-year-old), has been sentenced to 7 years in prison for hacking the corporate company’s systems and wiping their data.

Bing allegedly deleted all stored data from two database servers and two application servers using his administrative privileges and a “root” account in June 2018.

As a consequence, Lianjia has been forced to suspend large parts of its operations immediately. With this disruption, the company was unable to pay its employees for longer periods of time.

- Advertisement - Google News

Not only that even restoring the whole data cost the company around $30,000, and it’s really expensive. It is not the direct damages caused by the interruption of the firm’s business, but rather the indirect damages, which were far more devastating.

Why this damage could have devasting impacts?

Since its market value is estimated to be $6 billion, and as of December 31, 2013, Lianjia owned 51 subsidiaries across 51 countries, operated thousands of offices, and employed over 120,000 brokers.

The incident of data deletion was attributed to the five main suspects, including Han Bing. When the company’s investigators asked the administrator to provide the company investigators with his laptop password, the administrator declined.

An investigator testified in court that they were aware such an operation would leave no trace on the laptop afterward. It is for this reason that only the five employees with access to the system were examined in order to measure their response.

A few days later, from the servers, the technicians retrieved all the access logs and also tracked all the activities back to specific internal IPs and MACs.

Moreover, they managed to retrieve the WiFi logs and timestamps, determining that the WiFi logs corresponded with CCTV footage, which would confirm their suspicions.

The contract forensic expert concluded that Bing had used the shred and rm commands to wipe its databases. This was the final reflection of the forensic expert’s analysis.

Here the shred overwrites data three times with multiple patterns, while rm deletes symbolic links to files.

Bing’s attempts to notify

The security holes in the financial system have repeatedly been reported by Han Bing to his employer and supervisors since he started working there.

Additionally, Han Bing also has sent a number of emails to other administrators in regard to the concerns he has.

The security projects he proposed to run, to ensure the safety of the company, were not approved and were harshly ignored by the department leaders.

Several witnesses at Lianjia, including the director of ethics at LianJia, Zhou Mou have come forward to help confirm this. While he told the court that Han Bing often found himself in arguments with his supervisors as he felt that his proposals were not being valued.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...