The collection infrastructure is not novel. It is the router sitting between your managing director's home office and the internet. PRC-linked operators have been credential-stuffing consumer router management consoles, modifying firmware to persist across subscriber reboots, and leaving no process anomaly worth alerting on. The device routes traffic. It also copies it. MAS TRM and HKMA third-party exposure mapping requirements were written with cloud vendors and payment processors in mind; the home broadband router your staff uses to tunnel into the dealing floor falls outside any perimeter anyone reviews quarterly.
The ransomware incident at the Hong Kong private club (9,000 members, concentrated roster of executives, regulators, and political figures) reads more cleanly as a distraction. The ransom demand has a number on it; the membership database does not need one. If exfiltration preceded the encryption by weeks, the incident response team is reconstructing the wrong timeline. The question defenders are actually sitting with: how many of your senior personnel authenticated to your network this month through a router you have never seen and cannot inspect?