Security researchers at Cybernews discovered an exposed Elasticsearch cluster containing 8.73 billion records of Chinese citizen data on January 1, 2026. The database—the largest known single-source leak of Chinese personal information—remained publicly accessible for over three weeks before being closed, exposing national ID numbers, passwords, addresses, and social media identifiers.

Incident overview

AttributeDetails
Records exposed8.73 billion
Discovery dateJanuary 1, 2026
Closure dateJanuary 26, 2026
Exposure duration~25 days
Database typeElasticsearch cluster
Indices163
HostingBulletproof hosting provider
OwnerUnknown
DiscovererBob Diachenko (Cybernews/SecurityDiscovery.com)

Data exposed

Personal identification

Data typeRisk level
National ID numbersCritical
Full namesHigh
Home addressesHigh
Mobile phone numbersHigh
Email addressesHigh

Authentication data

Data typeCondition
PasswordsPlaintext and weakly hashed
Account credentialsMultiple platforms
Authentication tokensVarious services

Social media and messaging

Data typePlatforms affected
Social media identifiersMultiple platforms
Messaging account detailsWeChat, QQ, others
User profilesVarious services

Timeline

DateEvent
Late 2025Most recent data imports (per metadata)
January 1, 2026Cybernews discovers exposed cluster
January 1-26, 2026Database remains publicly accessible
January 26, 2026Database taken offline
February 2026Cybernews publishes findings

Technical analysis

Infrastructure characteristics

AttributeDetails
Database technologyElasticsearch
Cluster sizeMassive (8.73B records)
Index count163 indices
AuthenticationNone (publicly accessible)
Hosting typeBulletproof hosting

Data aggregation evidence

Cybernews researchers noted:

“The cluster’s metadata across multiple datasets shows that data was imported as recently as late 2025. The presence of timestamps and import dates points to a long-running aggregation effort rather than a single historical breach.”

This suggests intentional data collection over an extended period rather than a single incident.

Bulletproof hosting significance

IndicatorImplication
No organizational identifiersDeliberate anonymity
Bulletproof hostingResistant to takedown requests
Data aggregation patternIntentional collection
Long-running operationProfessional data broker activity

The use of bulletproof hosting—infrastructure designed to resist law enforcement and abuse complaints—suggests the database was created for data broker activity or malicious purposes.

Impact assessment

Estimated affected individuals

FactorAssessment
Total records8.73 billion
Likely duplicatesSignificant
Unique individualsHundreds of millions (estimated)
Population context~1.4 billion in China

While some records are duplicated across indices, researchers estimate the leak affects hundreds of millions of individuals.

Risk categories

RiskDescription
Identity theftNational IDs enable document fraud
Account takeoverPlaintext passwords allow direct access
Financial fraudCombined PII enables credit/banking fraud
Social engineeringDetailed profiles enable targeted attacks
Government surveillanceData aggregation aids tracking

Password exposure severity

ConditionImpact
Plaintext passwordsImmediate account compromise
Weak hashingTrivial to crack
Password reuseCross-platform vulnerability
No breach notificationUsers unaware of exposure

The combination of national ID numbers with passwords creates severe identity theft risk—these credentials together can be used to open accounts, access government services, and commit financial fraud.

Comparison to previous Chinese data leaks

IncidentYearRecordsSource
Shanghai Police database20221 billionGovernment database
Weibo leak2020538 millionSocial media
This incident20268.73 billionAggregated sources
Previous largestVarious~4 billionMultiple sources

This leak represents approximately double the size of previous largest known Chinese data exposures.

Attribution challenges

Unknown ownership

EvidenceStatus
Organization nameNone
Contact informationNone
Server identifiersAnonymized
Payment trailsUnknown

Possible origins

TheorySupporting evidence
Data broker operationAggregation pattern, bulletproof hosting
Compromised aggregatorMultiple source datasets
State-adjacent collectionScope and comprehensiveness
Criminal enterpriseHosting choice, anonymity

Regulatory context

China’s data protection landscape

RegulationStatus
Personal Information Protection Law (PIPL)Effective November 2021
Data Security LawEffective September 2021
Cybersecurity LawEffective June 2017

Despite strong data protection laws on paper, enforcement varies and data leaks of this scale indicate significant gaps in practice.

International implications

FactorImpact
Cross-border dataMay include overseas Chinese citizens
Business relationshipsPartners of affected individuals exposed
Intelligence valueSignificant for state actors

Recommendations

For potentially affected individuals

ActionPurpose
Change passwords immediatelyPrevent account takeover
Enable MFA everywhereAdd authentication layer
Monitor financial accountsDetect fraud early
Be alert to phishingExpect targeted attacks
Consider credit monitoringTrack identity theft

For organizations

PriorityAction
HighVerify Elasticsearch instances are not exposed
HighImplement authentication on all databases
HighAudit data aggregation practices
MediumReview bulletproof hosting indicators
OngoingMonitor for leaked credential use

For security teams

IndicatorDetection method
Exposed ElasticsearchShodan/Censys monitoring
Bulletproof hosting IPsThreat intelligence feeds
Credential stuffingAuthentication anomaly detection
Data exfiltrationDLP and network monitoring

Context

The 8.73 billion record Chinese data leak represents a watershed moment in data breach scale. Several factors make this incident particularly significant:

Aggregation over time: Unlike breaches of single platforms, this database appears to be an intentionally compiled dataset, suggesting a data broker or intelligence operation rather than a one-time security failure.

Bulletproof hosting: The choice of hosting resistant to takedowns indicates operators anticipated attempts to shut down the database and planned accordingly.

Authentication data: The inclusion of plaintext and weakly hashed passwords alongside national IDs creates a uniquely dangerous combination for identity theft and fraud.

Duration of exposure: The 25-day exposure window provided ample time for additional parties to discover and copy the data, meaning the leak’s impact extends well beyond the original database.

For Chinese citizens and anyone doing business in China, the assumption should be that personal information has been compromised. The scale of this leak—potentially affecting a significant percentage of China’s population—means its effects will be felt for years as the data circulates through criminal ecosystems.