Friday 1 May, 2026
[email protected]
Resilience Media
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
Resilience Media
No Result
View All Result

Leaked Knownsec Files Expose China’s Cyber Arsenal, Forcing Global Defence Rethink

A massive data leak from Chinese cybersecurity firm Knownsec has unveiled the tools, tactics, and datasets underpinning Beijing’s state-aligned hacking operations

Carly PagebyCarly Page
November 11, 2025
in News, Startups
Photo by Andrea Sun on Unsplash

Photo by Andrea Sun on Unsplash

Share on Linkedin

A massive data breach at Chinese cybersecurity firm Knownsec has exposed the digital machinery behind Beijing’s global cyber espionage network, in what security experts are calling one of the most consequential leaks in the history of state-backed hacking.

You Might Also Like

Spiral Hydrogen raises €2.7M to pilot its new hydrogen tech at the Port of Rotterdam

Report maps Russia’s hybrid war on Poland

Report: Europe’s reliance on imported energy and technology presents both risk and opportunity

More than 12,000 confidential documents, which were originally uploaded to GitHub before they were removed for violating the platform’s terms of service, have revealed the scope, sophistication, and international reach of China’s cyber operations, providing an unprecedented window into how its intelligence ecosystem functions.

Founded in 2007 and backed by tech giant Tencent, Knownsec has long operated at the nexus of China’s commercial cybersecurity sector and its state-directed intelligence apparatus. The company’s clients reportedly include government departments, financial institutions, and critical infrastructure operators, placing it squarely within Beijing’s digital command chain. That connection is now under renewed scrutiny following the leak, which has laid bare a sprawling cyber arsenal designed to infiltrate, monitor, and manipulate targets worldwide.

The trove details an extensive suite of offensive tools and data theft campaigns. Researchers analysing the leaked files say they include Remote Access Trojans (RATs) built for every major operating system (Windows, macOS, Linux, iOS, and Android), underscoring China’s capability to breach nearly any endpoint on the planet.

Other components include Android-based surveillance modules capable of extracting chat histories, contacts, and location data from popular messaging platforms.

Among the most alarming revelations are hardware-based exploits attributed to Knownsec’s engineering teams, including a compromised portable power bank designed to covertly siphon data from any connected device. Such hardware-level compromise points to an advanced supply-chain strategy, where seemingly benign consumer or enterprise products become tools of persistent espionage.

Data exfiltration appears to have been central to Knownsec’s operations. Internal spreadsheets list vast stolen datasets: 95GB of Indian immigration records, 3TB of South Korean telecom data, and 459GB of Taiwanese road planning files, alongside material from more than 20 other nations including the United Kingdom, Japan, and Nigeria.

Beijing’s official response has been characteristically opaque. When asked about the breach, the Chinese Foreign Ministry neither confirmed nor denied the incident, instead repeating its standard line opposing “all forms of cyberattacks.”

For Western intelligence and defence agencies, the fallout is already significant. The leak’s technical breadth – spanning mobile, hardware, and cloud environments – has made it a rare and valuable intelligence asset for defenders, but also a sobering reminder of how extensively state-aligned firms have embedded offensive capabilities into the global digital fabric.

“The Knownsec breach doesn’t just reveal tooling, it reveals doctrine,” said Richard Blech, founder and CEO of XSOC CORP. “The leaked ecosystem points to a unified strategy: collect at scale, correlate across domains, and train AI systems to infer what encryption still leaks. When you combine massive exfiltration of immigration, telecom, mobility [and] infrastructure data with state-aligned contractors like Knownsec and I-Soon [which itself was the subject of a leak in 2024], the goal becomes clear: build adversarial models that reconstruct behaviour and intent from encrypted telemetry, timing patterns, and metadata, not plaintext. That is the core of AI-driven Data Attacks (AIDA).”

Blech added that this represents a fundamental shift in cyber doctrine.

“The world still fixates on decryption, yet this leak shows China’s pivot toward observation and inference, where packet cadence, protocol signatures, cross-dataset mapping, and device-level access feed models optimized to predict, not break. This is the Cognitive War: a shift from hacking systems to training models that understand systems, even when the data itself is encrypted.”

For the defence sector, the Knownsec breach underscores how military, aerospace, and dual-use technology suppliers remain prime targets – not only for direct intrusion, but as data sources feeding the kind of AI systems Blech describes.

These models don’t simply catalogue stolen information; they analyse traffic patterns, operational rhythms, and communication signatures to anticipate how adversaries think and act.

Quantum-safe encryption offers one path to resilience, particularly as quantum computing threatens to dismantle existing cryptographic standards. Yet as the Knownsec case illustrates, even unbroken encryption can leak information through its metadata. AI tools, meanwhile, can digest and correlate this vast data haul far faster than any human analyst, giving state actors new predictive capabilities that sit beneath traditional detection thresholds.

Tags: ChinaCybersecurityKnownsec
Previous Post

Resilience Conference 2025: Plural on Urgency, Scale, and Defending Democracy

Next Post

Resilience Conference 2025: What is Defence Innovation?

Carly Page

Carly Page

Carly Page is a freelance journalist and copywriter with 10+ years of experience covering the technology industry, and was formerly a senior cybersecurity reporter at TechCrunch. Bylines include Forbes, IT Pro, LeadDev, The Register, TechCrunch, TechFinitive, TechRadar, TES, The Telegraph, TIME, Uswitch, WIRED, & more.

Related News

Spiral Hydrogen raises €2.7M to pilot its new hydrogen tech at the Port of Rotterdam

Spiral Hydrogen raises €2.7M to pilot its new hydrogen tech at the Port of Rotterdam

byFiona Alston
April 30, 2026

Estonian-Dutch dual-use startup Spiral Hydrogen will be taking its centrifugal bubble-free electrolysis technology from the lab to the Port of...

Report maps Russia’s hybrid war on Poland

Report maps Russia’s hybrid war on Poland

byJohn Biggs
April 30, 2026

A new report from Defence24 has outlined the role of Russia in a number of cyberattacks and acts of sabotage....

Line illustration showing trucks, cars and a cyclist, alongside a wind turbine, solar panel, power lines, buildings and a data centre, depicting energy infrastructure

Report: Europe’s reliance on imported energy and technology presents both risk and opportunity

byPaul Sawers
April 29, 2026

Europe’s reliance on external technology and infrastructure faces growing scrutiny, as policymakers and industry leaders confront the risks of depending...

Weekly Digest: The mystery of the British unicorn – the story of our dealings with Roark Aerospace

Inside the case of Roark Aerospace: The British defence unicorn no one can verify

byIngrid Lunden
April 28, 2026

On Boxing Day 2025, we received a press release from Roark Aerospace. The UK startup, which makes anti-drone systems, reported...

German military uniform (Touko Aikioniemi from Unsplash)

Europe’s armed forces are too reliant on US cloud providers, report finds

byPaul Sawers
April 28, 2026

Europe’s defence systems depend heavily on US cloud infrastructure, leaving key military functions exposed to potential service disruptions during geopolitical...

ACUA Ocean completes three contracts with its UK-made autonomous boat

ACUA Ocean completes three contracts with its UK-made autonomous boat

byJohn Biggs
April 24, 2026

ACUA Ocean has completed three contracts under the Atlantic Net Technology Demonstrator programme, marking a step forward in the UK’s...

UNIVITY raises €27 million to build a 5G satellite constellation that can expand European communication networks

UNIVITY raises €27 million to build a 5G satellite constellation that can expand European communication networks

byJohn Biggs
April 24, 2026

UNIVITY has raised €27 million to transition its space-based telecom infrastructure from a demonstration phase to an early industrial stage....

Jacek Siewiera: a future NATO conflict will be fought against civilian targets

Jacek Siewiera: a future NATO conflict will be fought against civilian targets

byResilience Media
April 24, 2026

The wars in Iran and Ukraine have underscored how civilian infrastructure will become a feature of future conflicts. And Poland’s...

Load More
Next Post

Resilience Conference 2025: What is Defence Innovation?

Resilience Conference 2025: The Real Lessons From Ukraine

Resilience Conference 2025: The Real Lessons From Ukraine

Most viewed

InVeris announces fats Drone, an integrated, multi-party drone flight simulator

Uforce raises $50M at a $1B+ valuation to build defence tech for Ukraine

Auterion, the drone software startup, eyes raising $200M at a $1.2B+ valuation

Senai exits stealth to help governments harness online video intelligence

Palantir and Ukraine’s Brave1 have built a new AI “Dataroom”

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

Resilience Media is an independent publication covering the future of defence, security, and resilience. Our reporting focuses on emerging technologies, strategic threats, and the growing role of startups and investors in the defence of democracy.

  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

No Result
View All Result
  • Home
  • Subscribe
  • About
  • Events
  • Guest Posts
  • Interview
  • News
  • Resilience Conference London 2026
  • Resilience Conference Copenhagen 2026
  • Resilience Conference Warsaw 2026
  • Startups
  • Venture
  • Weekly Digest

© 2026 Resilience Media

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.