Cybersecurity1 hr ago

UK Biobank Volunteer Data Found for Sale on Alibaba Prompts Government Response

UK Biobank volunteer data appeared for sale on Alibaba; government thanks China, revokes access for three Chinese institutions, outlines risks and mitigations.

Peter Olaleru/3 min/GB

Cybersecurity Editor

TweetLinkedIn
UK Biobank Volunteer Data Found for Sale on Alibaba Prompts Government Response
Source: TheregisterOriginal source

UK Biobank confirmed that data from half a million volunteers was listed on Alibaba; the UK government thanked China for rapid removal and revoked access for three Chinese research bodies.

Context UK Biobank holds the world’s largest biomedical dataset, used by researchers worldwide. In April 2024 the charity shifted from sending bulk datasets to accredited institutions to providing platform‑only logins, though contracts still barred downloading raw data.

Key Facts On April 20 UK Biobank notified the government that three separate listings, one containing the full 500,000‑volunteer set, appeared on Alibaba. UK technology minister Ian Murray announced the listings in the House of Commons on April 23, thanking the Chinese government for helping remove them. Biobank confirmed the data was anonymized but could not guarantee it could not be re‑identified with advanced analysis. Three Chinese research institutions that had previously downloaded the full dataset had their Biobank access revoked. No evidence shows the data was purchased or downloaded.

What It Means The incident highlights insider‑threat risks where trusted actors exfiltrate data despite technical controls. Although the data lacked direct identifiers, attributes such as age, gender, socioeconomic status, and biomarker measurements could enable linkage attacks if combined with other datasets. For security teams, this underscores the need to monitor credential usage, enforce data‑download prohibitions, and treat bulk data transfers as high‑risk actions.

Mitigations Organizations should: enforce strict least‑privilege access to data stores; log and alert on bulk download attempts (MITRE ATT&CK T1041 – Exfiltration Over Web Services); require multi‑factor authentication for research platforms; conduct regular reviews of third‑party access agreements; and deploy data‑loss‑prevention tools that flag unusual transfers of large biomedical datasets.

Watch for updates on the ongoing root‑cause analysis and any potential policy changes regarding cross‑border data sharing agreements.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...