How a Baidu Engineer Bypassed Audits to Fraudulently Approve 735 Sites and Steal 3.7 M Yuan

A 1992‑born Baidu developer abused his system privileges, wrote scripts and used CURL commands to illegally approve hundreds of media sites—including gambling portals—through the company's ad‑network audit, resulting in a loss of 3.74 million yuan and a one‑year‑nine‑month prison sentence.

ITPUB
ITPUB
ITPUB
How a Baidu Engineer Bypassed Audits to Fraudulently Approve 735 Sites and Steal 3.7 M Yuan

In 2015, Chen Mourui (born 1992) joined Baidu Era Network Technology (Beijing) Ltd. as a software developer in the Union team of the Display Advertising Platform, responsible for developing and maintaining Baidu Union’s traffic‑side systems.

Unauthorized “Audit” Business

In August 2017, a man named Liu approached Chen via WeChat, offering a side business: quickly passing website audits for Baidu Union’s advertising eligibility. Chen, enticed by a 300 CNY fee per site, agreed to review 30 sites for a total of 9,000 CNY.

Exploitation Method

Although Chen had no official audit authority, he used his workstation to send CURL requests to an internal API that automatically approved sites. He later wrote a script that accepted website usernames and passwords, batch‑submitted them via the same API, and repeatedly invoked the endpoint to mark hundreds of sites as audit‑passed.

From September 2017 to March 2018, Chen altered the audit status of over 735 media sites, including many containing gambling or lottery content, and collected 235,900 CNY in illicit earnings.

Impact

The fraudulent approvals allowed these sites to display Baidu ads, siphoning an estimated 3.745 million CNY in revenue that should have gone to Baidu. The breach also exposed weaknesses in Baidu’s two‑stage audit process, which normally involves automated policy filtering followed by manual review.

Detection and Investigation

In February 2018, Baidu’s risk‑control platform flagged inconsistencies: sites appeared as “approved” in the UNION system but not in the risk‑control system. Internal investigation identified Chen’s unauthorized use of the media‑audit interface, confirming the large‑scale manipulation.

On March 13, Baidu hired a third‑party security firm (Beijing ShenZhou Green Alliance) to analyze the compromised servers. The firm concluded that the attacker, using the username “chenborui,” leveraged the servers as a jump‑box to batch‑approve media domains.

Legal Outcome

The Haidian District People’s Court ruled that Chen’s actions constituted “damage to computer information systems,” sentencing him to one year and nine months in prison. The court noted his self‑surrender, restitution of illegal gains, and compensation for IT service costs, resulting in a reduced sentence.

Key Takeaways

Insider threats can bypass multi‑layered audit mechanisms when privileged access is misused.

Automated audit APIs must enforce strict authentication and logging.

Regular cross‑system consistency checks can reveal unauthorized state changes.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

information securityBaidufraudlegal caseinsider threataudit bypass
ITPUB
Written by

ITPUB

Official ITPUB account sharing technical insights, community news, and exciting events.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.