{"id":19212,"date":"2020-09-17T15:37:27","date_gmt":"2020-09-17T10:07:27","guid":{"rendered":"https:\/\/www.techjockey.com\/blog\/?p=19212"},"modified":"2025-12-17T13:31:46","modified_gmt":"2025-12-17T08:01:46","slug":"zhenhua-data-leak","status":"publish","type":"post","link":"https:\/\/www.techjockey.com\/blog\/zhenhua-data-leak","title":{"rendered":"Zhenhua Data Leak: Prompts the Alarming Data Vulnerability Scenario"},"content":{"rendered":"\n<p>Zhenhua, the word may sound like a tongue twister, but it has recently given sleepless nights to many important personalities across the world, including India. As per the latest report, a China-based tech company, Zhenhua Data Information Technology Co. Limited is spying on the personal data of more than ten thousand important personalities in India and abroad.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-list-of-people-being-spied-on-it-ll-send-shivers-down-your-spine\"><span class=\"ez-toc-section\" id=\"the_list_of_people_being_spied_on_itll_send_shivers_down_your_spine\"><\/span>The List of People being Spied On: It\u2019ll Send Shivers Down Your Spine<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The list seems surprising to everyone as it includes names like Indian Prime Minister Narendra Modi, President Kovind, and the God of Cricket Sachin Tendulkar. The list is huge and includes many big names from the opposition parties in the center, state chief ministers, bureaucrats, national advisors, chiefs of the Army, Navy, and Air Force, etc. The long list of personalities being snooped on by this China-based technology company has kept the Indian security agencies quite busy for the last couple of days.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"another_blow_to_the_indo-china_relationship\"><\/span>Another Blow to the Indo-China Relationship<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Zhenhua, a Shenzen-based data information technology company has confirmed its links with Chinese military and security agencies. The company is mining important information about top Indians and adding fuel to the dubious intentions of Chinese intelligence against its neighboring country. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"is_the_fear_of_hybrid_warfare_coming_true\"><\/span>Is the Fear of Hybrid Warfare Coming True?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>&nbsp;The database with Zhenhua includes many world entities from all major countries, irrespective of their current state of alliance or enmity with China. Big names from countries like the United States, United Kingdom, Australia, Canada, Japan, Germany, and the UAE clearly indicate that the Chinese government is aiming for a much bigger tension across borders and seas.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"not_just_individuals_but_organizations_made_to_the_list_too\"><\/span>Not Just Individuals, But Organizations Made to the List Too<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The leaked database, created by Zhenhua, shows the interest of Chinese Intelligence in the recent dealings of Australia&#8217;s space and science sector with the NASA lab in California. China\u2019s intelligence service is not just interested in the movement and activities of famous personalities but is also spying on the movement of goods in international dealings.<\/p>\n\n\n\n<p>What\u2019s more sinister is that Zhenhua has been misusing artificial intelligence tools to monitor private records. These include your social media habits, bank statements, job interest, etc. <\/p>\n\n\n\n<p>Much of this data is securely stored over a company\u2019s devices and servers, inaccessible to outsiders. But if the Chinese have already laid their hands on such personal data, we can\u2019t even imagine the scope of data breach we might be staring at. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"indian_government_agencies_need_to_beef_up_their_cyber_security\"><\/span>Indian Government Agencies Need to Beef Up Their Cyber Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>This incident has raised another question &#8211; how uptight are our data security measures?<\/p>\n\n\n\n<p>Are we conducting enough security testing to address cyber\nthreat exposures and vulnerabilities?<\/p>\n\n\n\n<p>With cybercriminals making repetitive attempts to breach\nnetworks, government agencies need to have better visibility of their security\nloopholes. Services like VAPT and unified data protection have become the need\nof this hour to perform 360-degree vulnerability assessment through manual and\nautomated means.<\/p>\n\n\n\n<p>Speaking specifically about VAPT, VAPT consists of two processes: Vulnerability Assessment (VA) and Penetration Testing (PT). <\/p>\n\n\n\n<p>Most importantly, <a href=\"https:\/\/www.techjockey.com\/category\/vulnerability-assessment-software\">VAPT services<\/a> provide ongoing guidance and advice by experts to address cybersecurity risks. It also involves penetration testing to figure out any vulnerability in systems, applications and the overall IT infrastructure.<\/p>\n\n\n\n<p>These are the following types of VAPT tests for organizations: <\/p>\n\n\n\n<ul>\n<li>Internal and external infrastructure testing <\/li>\n\n\n\n<li>API security testing <\/li>\n\n\n\n<li>Wireless testing <\/li>\n\n\n\n<li>Firewall testing <\/li>\n\n\n\n<li>Mobile security testing<\/li>\n<\/ul>\n\n\n\n<p>These tests combine to give companies an accurate assessment of their system security and suggest steps to mitigate any potential risks. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"the_privacy_debate_is_on\"><\/span>The Privacy Debate is ON<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The leaked database includes 2.4 million people! This has\nprompted an important debate, \u2018is all information about an individual exposed\nonline?\u2019<\/p>\n\n\n\n<p>This is where VAPT steps in as a defense shield. It is an essential network security tool for SMEs as it goes beyond than conventional <a class=\"wpil_keyword_link\" href=\"https:\/\/www.techjockey.com\/blog\/difference-between-firewall-and-antivirus\"   title=\"firewall and antivirus\" data-wpil-keyword-link=\"linked\"  data-wpil-monitor-id=\"1725\">firewall and antivirus<\/a> solutions.&nbsp;It highlights all the gaps in your system that may seem to become sources of data breaches. <\/p>\n\n\n\n<p>One this is for sure; This is not the only organization involved in information-spying activities. There must be many such agencies out there, operating from different locations. <\/p>\n\n\n\n<p>We at Techjockey believe that prevention is better than cure. Our approach to VAPT has been centered on motivating organizations to anoint VAPT in their cybersecurity strategy. This ensures that hacking attempts such as <a class=\"wpil_keyword_link\" href=\"https:\/\/www.techjockey.com\/blog\/what-is-phishing\"   title=\"phishing\" data-wpil-keyword-link=\"linked\"  data-wpil-monitor-id=\"2012\">phishing<\/a> and malware attacks can be subdued at a nominal cost.  Therefore, it\u2019s time for individuals and organizations to start taking action! <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zhenhua, the word may sound like a tongue twister, but it has recently given sleepless nights to many important personalities across the world, including India. As per the latest report, a China-based tech company, Zhenhua Data Information Technology Co. Limited is spying on the personal data of more than ten thousand important personalities in India [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":32221,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7596],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zhenhua Data Leak: China Surveillance System<\/title>\n<meta name=\"description\" content=\"Zhenhua Data Information Technology Co. Limited is spying on personal data of more than 10000 personalities in India and abroad. Check how.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/19212\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zhenhua Data Leak: Prompts the Alarming Data Vulnerability Scenario\" \/>\n<meta property=\"og:description\" content=\"Zhenhua Data Information Technology Co. Limited is spying on personal data of more than 10000 personalities in India and abroad. Check how.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/19212\" \/>\n<meta property=\"og:site_name\" content=\"Techjockey.com Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Techjockey\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-17T10:07:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-17T08:01:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2022\/07\/28133653\/zhenhua-data-leak-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kalpana Arya\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechJockeys\" \/>\n<meta name=\"twitter:site\" content=\"@TechJockeys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kalpana Arya\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zhenhua Data Leak: China Surveillance System","description":"Zhenhua Data Information Technology Co. Limited is spying on personal data of more than 10000 personalities in India and abroad. Check how.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/19212","og_locale":"en_US","og_type":"article","og_title":"Zhenhua Data Leak: Prompts the Alarming Data Vulnerability Scenario","og_description":"Zhenhua Data Information Technology Co. Limited is spying on personal data of more than 10000 personalities in India and abroad. Check how.","og_url":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/19212","og_site_name":"Techjockey.com Blog","article_publisher":"https:\/\/www.facebook.com\/Techjockey\/","article_published_time":"2020-09-17T10:07:27+00:00","article_modified_time":"2025-12-17T08:01:46+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2022\/07\/28133653\/zhenhua-data-leak-banner.jpg","type":"image\/jpeg"}],"author":"Kalpana Arya","twitter_card":"summary_large_image","twitter_creator":"@TechJockeys","twitter_site":"@TechJockeys","twitter_misc":{"Written by":"Kalpana Arya","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techjockey.com\/blog\/zhenhua-data-leak#article","isPartOf":{"@id":"https:\/\/www.techjockey.com\/blog\/zhenhua-data-leak"},"author":{"name":"Kalpana Arya","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/b58400406cc18d4902762d6b780d52e4"},"headline":"Zhenhua Data Leak: Prompts the Alarming Data Vulnerability Scenario","datePublished":"2020-09-17T10:07:27+00:00","dateModified":"2025-12-17T08:01:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techjockey.com\/blog\/zhenhua-data-leak"},"wordCount":745,"publisher":{"@id":"https:\/\/www.techjockey.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/zhenhua-data-leak#primaryimage"},"thumbnailUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2022\/07\/28133653\/zhenhua-data-leak-banner.jpg","articleSection":["Data Security Software"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.techjockey.com\/blog\/zhenhua-data-leak","url":"https:\/\/www.techjockey.com\/blog\/zhenhua-data-leak","name":"Zhenhua Data Leak: China Surveillance System","isPartOf":{"@id":"https:\/\/www.techjockey.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techjockey.com\/blog\/zhenhua-data-leak#primaryimage"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/zhenhua-data-leak#primaryimage"},"thumbnailUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2022\/07\/28133653\/zhenhua-data-leak-banner.jpg","datePublished":"2020-09-17T10:07:27+00:00","dateModified":"2025-12-17T08:01:46+00:00","description":"Zhenhua Data Information Technology Co. Limited is spying on personal data of more than 10000 personalities in India and abroad. Check how.","breadcrumb":{"@id":"https:\/\/www.techjockey.com\/blog\/zhenhua-data-leak#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techjockey.com\/blog\/zhenhua-data-leak"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/zhenhua-data-leak#primaryimage","url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2022\/07\/28133653\/zhenhua-data-leak-banner.jpg","contentUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2022\/07\/28133653\/zhenhua-data-leak-banner.jpg","width":1200,"height":628,"caption":"Zhenhua Data Leak banner image"},{"@type":"BreadcrumbList","@id":"https:\/\/www.techjockey.com\/blog\/zhenhua-data-leak#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techjockey.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Security Software","item":"https:\/\/www.techjockey.com\/blog\/category\/data-security-software"},{"@type":"ListItem","position":3,"name":"Zhenhua Data Leak: Prompts the Alarming Data Vulnerability Scenario"}]},{"@type":"WebSite","@id":"https:\/\/www.techjockey.com\/blog\/#website","url":"https:\/\/www.techjockey.com\/blog\/","name":"Techjockey.com Blog","description":"","publisher":{"@id":"https:\/\/www.techjockey.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techjockey.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techjockey.com\/blog\/#organization","name":"Techjockey Infotech Private Limited","url":"https:\/\/www.techjockey.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2019\/12\/logo.png","contentUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2019\/12\/logo.png","width":72,"height":72,"caption":"Techjockey Infotech Private Limited"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Techjockey\/","https:\/\/twitter.com\/TechJockeys","https:\/\/www.linkedin.com\/company\/techjockey","https:\/\/www.youtube.com\/@techjockeydotcom"]},{"@type":"Person","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/b58400406cc18d4902762d6b780d52e4","name":"Kalpana Arya","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/06d4203fc99a67c4678aad762aaf6c61?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/06d4203fc99a67c4678aad762aaf6c61?s=96&d=mm&r=g","caption":"Kalpana Arya"},"description":"Kalpana\u2019s tech writing journey began in 2017 with Techjockey, and she truly belongs here! If she was not a technical content writer, she would have been a coder. Technical writing, especially for business software, is her passion, and she enjoys every bit of it. From addressing the pain points of software buyers to offering them the best software buying guide, she has excelled in every stage of the customer journey through content.\u00a0Techjockey\u2019s website has 500+ software categories and she has written something for each of them. Also, she has a good eye for detail, and that makes her a reliable Content Editor.","sameAs":["https:\/\/www.techjockey.com\/","https:\/\/www.linkedin.com\/in\/kalpana-arya\/"],"gender":"Female","knowsAbout":["Technical Content Writing"],"knowsLanguage":["English","Hindi"],"jobTitle":"Head of Content","worksFor":"Kalpana Arya","url":"https:\/\/www.techjockey.com\/blog\/author\/kalpana"}]}},"_links":{"self":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/19212"}],"collection":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/comments?post=19212"}],"version-history":[{"count":3,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/19212\/revisions"}],"predecessor-version":[{"id":61356,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/19212\/revisions\/61356"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/media\/32221"}],"wp:attachment":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/media?parent=19212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/categories?post=19212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/tags?post=19212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}