UK Biobank Says 'Few Bad Apples' Tried to Sell 500,000 Volunteer Records on Chinese Site
UK Biobank says a small group of insiders attempted to sell de‑identified health data on a Chinese site; listings were removed before any sale, prompting investigation.

Biobank chief executive Professor Sir Rory Collins, wearing a grey suit, white shirt and paisley tie, looks at the camera as he speaks to BBC Breakfast. The BBC News newsroom in London is in the background behind him.
TL;DR: UK Biobank says a handful of insiders removed de‑identified data from its research platform and posted it for sale on a Chinese website. The listings were taken down before any transaction occurred, prompting an internal investigation and temporary suspension of platform access.
Context UK Biobank stores health information from 500,000 volunteers recruited between 2006 and 2010. The data, which includes genetic sequences, imaging scans and lifestyle metrics, is made available to approved academic researchers through an online portal. Access is granted only to institutions that pass a vetting process, and the platform logs all data requests.
Key Facts - In early September 2024, a listing appeared on Alibaba offering a dataset described as UK Biobank participant information. - Sir Rory Collins, Biobank’s chief executive, told BBC Radio 4 that “a few bad apples” had extracted the data from the platform and placed it for sale. - The UK government worked with Chinese authorities to have the listing removed within hours; no purchase was recorded. - The data shared were de‑identified, lacking names, addresses or contact details, but could include age, gender, birth month, socioeconomic status and biological measurements. - Biobank has suspended all external access to its portal while it conducts a board‑led forensic review and adds tighter controls.
What It Means The incident highlights insider threat risks even when data are technically de‑identified. Re‑identification remains possible when combined with external datasets, so the breach raises privacy concerns for participants and compliance questions under UK GDPR. For security teams, it underscores the need to monitor privileged user activity and enforce strict data‑exfiltration guards.
What Defenders Should Do - Enable real‑time alerts for bulk downloads or unusual export patterns from research portals (MITRE ATT&CK T1041 – Exfiltration Over Web Services). - Enforce least‑privilege access and require multi‑factor authentication for all privileged accounts. - Deploy data loss prevention (DLP) rules that block transmission of files containing genomic or health‑related identifiers to external domains. - Review and harden API keys and service accounts; rotate credentials quarterly. - Conduct regular access‑log audits and maintain immutable logs for forensic analysis. - Patch any known vulnerabilities in the portal software; check advisories for CVE‑2023‑XXXXX (example) if applicable.
What to watch next Regulators will likely publish findings from the ICO inquiry, and Biobank may announce new authentication and monitoring controls before restoring full platform access.
Continue reading
More in this thread
Aligned Orthopedic Email Breach Exposes Millions’ Health Data, Sparks Class‑Action Probe
Peter Olaleru
Rituals Confirms Data Breach Exposes Personal Data of 41 Million My Rituals Members
Peter Olaleru
Delve’s Certifications Tied to Vercel Breach Amid Customer Exits and Whistleblower Claims
Peter Olaleru
Conversation
Reader notes
Loading comments...