Hong Kong, China — A recent cyberattack on Hongkong Post’s online mailing system has resulted in a major data breach affecting tens of thousands of users. According to officials, the hacker managed to access sensitive contact information from the EC-Ship platform, which is widely used for managing and sending mail.
Postmaster General Leonia Tai revealed that the attacker was able to view information stored in the address books of approximately 60,000 to 70,000 EC-Ship accounts. These records contained the names, addresses, email IDs, and phone numbers of both senders and recipients, as well as company names and fax numbers.
EC-Ship is a digital tool operated by the Hongkong Post, which helps individuals and businesses arrange mail deliveries locally and internationally. The platform allows users to save contact information, print shipping labels, and track parcels.
The breach began on Sunday night and continued into Monday. According to Tai, the attacker created a legitimate account on the platform and began exploring weaknesses in the system’s code. Though the system recognized unusual activity and temporarily suspended the attacker’s access, the hacker continued trying different techniques. Eventually, they discovered a flaw in the program’s code that allowed them to reach data stored in other users’ address books.
Tai stated that the issue was quickly identified and the affected programming code was patched to block further intrusions. However, the hacker had already extracted confidential information from a large number of users. The Hongkong Post has contacted affected account holders by email and asked them to alert anyone whose information may have been exposed.
Law enforcement agencies have launched an investigation into the incident. In the meantime, Hongkong Post is seeking expert advice to strengthen its digital defences.
Cybersecurity professionals have raised concerns over where the EC-Ship system is hosted. Some believe that sensitive systems like this should operate on government cloud servers, which offer more advanced protection. Tai responded that Hongkong Post follows standard security procedures and that their internal systems did detect and respond to the attack.
Efforts are now underway to migrate the EC-Ship service to a central government-managed internet platform that uses multiple layers of protection and round-the-clock monitoring. Officials hope this will reduce the chances of future incidents and better safeguard users’ data.
The leak was first reported after a programming script uploaded to GitHub, a public code-sharing platform, was found to contain login credentials tied to xAI’s system. These credentials reportedly unlocked access to at least 52 of the company’s internal AI models including Grok-4, one of xAI’s most advanced tools, similar in capacity to OpenAI’s GPT-4.
The employee, identified in reports as 25-year-old Marko Elez, had top-level access to various government platforms and databases. These include systems used by sensitive departments such as Homeland Security, the Justice Department, and the Social Security Administration.
The key remained active and publicly visible for a period of time before being taken down. This has sparked concerns that others may have accessed or copied the credentials while they were exposed.
Why It Matters
Security experts say this isn’t just a one-off mistake, it’s a sign that powerful AI systems may be handled too carelessly, even by insiders with government clearance. If the leaked key had been misused before removal, bad actors could have gained access to internal tools or extracted confidential data.
Adding to the concern, xAI has not yet issued a public response, and there’s no confirmation that the key has been fully disabled.
The leak also brings attention to DOGE’s track record. The agency, reportedly established to improve government tech systems, has seen past incidents involving poor internal cybersecurity practices. Elez himself has been previously linked to issues around unprofessional behavior online and mishandling of sensitive information.
Cybersecurity professionals say this breach is another reminder of the risks tied to mixing government projects with fast-moving private AI ventures. Philippe Caturegli, a cybersecurity expert, said the leak raises deeper questions about how sensitive data is managed behind closed doors.
What Comes Next
While no immediate harm to the public has been reported, the situation highlights the need for stricter rules around how digital credentials are stored, especially when dealing with cutting-edge AI technologies.
Experts are calling for better oversight, stronger internal protocols, and more accountability when it comes to government use of private AI tools.
For now, this case serves as a cautionary tale: even one small error like uploading a file without double-checking its contents can open up major vulnerabilities in systems meant to be secure.
There has been a worrying rise in the number of people losing control of their social media and email accounts this year. According to recent data from Action Fraud, the UK’s national cybercrime reporting center, over 35,000 cases were reported in 2024. This is a huge increase compared to the 22,000 cases recorded the previous year.
To address this growing problem, Action Fraud has teamed up with Meta to start an online safety campaign. Their main goal is to help people secure their accounts by turning on two-step verification, also known as 2FA. This extra security step makes it much harder for hackers to break into accounts.
Hackers usually target social media or email profiles for money. Once they gain access, they often pretend to be the real user and reach out to the person’s friends or followers. Many times, they use these stolen accounts to promote fake investment schemes or sell fake event tickets. In other cases, hackers simply sell these hacked accounts to others who use them for illegal activities.
One trick commonly used by hackers is messaging the account owner’s contacts and convincing them to share security codes. Since the message appears to come from a trusted person, many people unknowingly share sensitive information, giving hackers further control.
Another method involves stealing login information through phishing scams or data leaks. If people use the same password for many sites, hackers can easily access multiple accounts once they crack one.
The good news is that there are simple ways to protect yourself. The most important step is enabling two-step verification on all your accounts. This adds an extra barrier by asking for a unique code when someone tries to log in, making it much tougher for hackers to get through even if they know your password.
Meta has also introduced face recognition technology to help users recover hacked accounts. Still, experts say prevention is always better than trying to fix the damage later.
Here are a few easy tips to protect your online accounts:
1. Always enable two-step verification wherever it is available.
2. Create strong and unique passwords for each account. Avoid using the same password more than once.
3. Be careful if someone you know suddenly asks for a security code — double-check if it’s really them.
4. Stay alert for suspicious links or emails asking for your login details — they could be phishing traps.
5. Keep an eye on your accounts for unusual activity or login attempts from unknown places.
With online scams increasing, staying careful and following these safety steps can help you avoid falling victim to account hacks. Taking action now can save you a lot of trouble later.