Friday 13 March, 2026
[email protected]
Resilience Media
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
Resilience Media
No Result
View All Result

Leaked Knownsec Files Expose China’s Cyber Arsenal, Forcing Global Defence Rethink

A massive data leak from Chinese cybersecurity firm Knownsec has unveiled the tools, tactics, and datasets underpinning Beijing’s state-aligned hacking operations

Carly PagebyCarly Page
November 11, 2025
in News, Startups
Photo by Andrea Sun on Unsplash

Photo by Andrea Sun on Unsplash

Share on Linkedin

A massive data breach at Chinese cybersecurity firm Knownsec has exposed the digital machinery behind Beijing’s global cyber espionage network, in what security experts are calling one of the most consequential leaks in the history of state-backed hacking.

You Might Also Like

US and UK ballistic missile defence capabilities brought into focus as Iran lashes out against region

Scout Ventures raises $125 million to expand investment in defence and dual-use tech

The signal is the weapon: How mobile networks became infrastructure for modern war

More than 12,000 confidential documents, which were originally uploaded to GitHub before they were removed for violating the platform’s terms of service, have revealed the scope, sophistication, and international reach of China’s cyber operations, providing an unprecedented window into how its intelligence ecosystem functions.

Founded in 2007 and backed by tech giant Tencent, Knownsec has long operated at the nexus of China’s commercial cybersecurity sector and its state-directed intelligence apparatus. The company’s clients reportedly include government departments, financial institutions, and critical infrastructure operators, placing it squarely within Beijing’s digital command chain. That connection is now under renewed scrutiny following the leak, which has laid bare a sprawling cyber arsenal designed to infiltrate, monitor, and manipulate targets worldwide.

The trove details an extensive suite of offensive tools and data theft campaigns. Researchers analysing the leaked files say they include Remote Access Trojans (RATs) built for every major operating system (Windows, macOS, Linux, iOS, and Android), underscoring China’s capability to breach nearly any endpoint on the planet.

Other components include Android-based surveillance modules capable of extracting chat histories, contacts, and location data from popular messaging platforms.

Among the most alarming revelations are hardware-based exploits attributed to Knownsec’s engineering teams, including a compromised portable power bank designed to covertly siphon data from any connected device. Such hardware-level compromise points to an advanced supply-chain strategy, where seemingly benign consumer or enterprise products become tools of persistent espionage.

Data exfiltration appears to have been central to Knownsec’s operations. Internal spreadsheets list vast stolen datasets: 95GB of Indian immigration records, 3TB of South Korean telecom data, and 459GB of Taiwanese road planning files, alongside material from more than 20 other nations including the United Kingdom, Japan, and Nigeria.

Beijing’s official response has been characteristically opaque. When asked about the breach, the Chinese Foreign Ministry neither confirmed nor denied the incident, instead repeating its standard line opposing “all forms of cyberattacks.”

For Western intelligence and defence agencies, the fallout is already significant. The leak’s technical breadth – spanning mobile, hardware, and cloud environments – has made it a rare and valuable intelligence asset for defenders, but also a sobering reminder of how extensively state-aligned firms have embedded offensive capabilities into the global digital fabric.

“The Knownsec breach doesn’t just reveal tooling, it reveals doctrine,” said Richard Blech, founder and CEO of XSOC CORP. “The leaked ecosystem points to a unified strategy: collect at scale, correlate across domains, and train AI systems to infer what encryption still leaks. When you combine massive exfiltration of immigration, telecom, mobility [and] infrastructure data with state-aligned contractors like Knownsec and I-Soon [which itself was the subject of a leak in 2024], the goal becomes clear: build adversarial models that reconstruct behaviour and intent from encrypted telemetry, timing patterns, and metadata, not plaintext. That is the core of AI-driven Data Attacks (AIDA).”

Blech added that this represents a fundamental shift in cyber doctrine.

“The world still fixates on decryption, yet this leak shows China’s pivot toward observation and inference, where packet cadence, protocol signatures, cross-dataset mapping, and device-level access feed models optimized to predict, not break. This is the Cognitive War: a shift from hacking systems to training models that understand systems, even when the data itself is encrypted.”

For the defence sector, the Knownsec breach underscores how military, aerospace, and dual-use technology suppliers remain prime targets – not only for direct intrusion, but as data sources feeding the kind of AI systems Blech describes.

These models don’t simply catalogue stolen information; they analyse traffic patterns, operational rhythms, and communication signatures to anticipate how adversaries think and act.

Quantum-safe encryption offers one path to resilience, particularly as quantum computing threatens to dismantle existing cryptographic standards. Yet as the Knownsec case illustrates, even unbroken encryption can leak information through its metadata. AI tools, meanwhile, can digest and correlate this vast data haul far faster than any human analyst, giving state actors new predictive capabilities that sit beneath traditional detection thresholds.

Tags: ChinaCybersecurityKnownsec
Previous Post

Resilience Conference 2025: Plural on Urgency, Scale, and Defending Democracy

Next Post

Resilience Conference 2025: What is Defence Innovation?

Carly Page

Carly Page

Carly Page is a freelance journalist and copywriter with 10+ years of experience covering the technology industry, and was formerly a senior cybersecurity reporter at TechCrunch. Bylines include Forbes, IT Pro, LeadDev, The Register, TechCrunch, TechFinitive, TechRadar, TES, The Telegraph, TIME, Uswitch, WIRED, & more.

Related News

US and UK ballistic missile defence capabilities brought into focus as Iran lashes out against region

US and UK ballistic missile defence capabilities brought into focus as Iran lashes out against region

byTom Pashby
March 12, 2026

The ballistic missile defence capabilities of the US, UK and other allies have been put to the test as the...

Scout Ventures raises $125 million to expand investment in defence and dual-use tech

Scout Ventures raises $125 million to expand investment in defence and dual-use tech

byJohn Biggs
March 11, 2026

Scout Ventures has closed its fifth fund with $125 million in commitments, according to an announcement released March 10. The...

The signal is the weapon: How mobile networks became infrastructure for modern war

The signal is the weapon: How mobile networks became infrastructure for modern war

byJohn Biggs
March 11, 2026

Mobile World Congress (MWC) has been around since 1987. The conference, part trade fair, part consumer electronics expo, and part...

Hadean, the AI battle simulation startup, closes bridge round ahead of a Big B

Hadean, the AI battle simulation startup, closes bridge round ahead of a Big B

byIngrid Lunden
March 11, 2026

London-based Hadean began life several years ago as an AI gaming startup working on VR and video simulations, but it...

Hackathon-ing our way to a new defence ecosystem

Hackathon-ing our way to a new defence ecosystem

byFiona Alston
March 11, 2026

It takes a village to raise a child, but when it comes to building the next generation of defence in...

Lux Aeterna raises $10 million to build reusable, returnable satellites

Lux Aeterna raises $10 million to build reusable, returnable satellites

byJohn Biggs
March 10, 2026

Lux Aeterna, a Denver based space infrastructure startup, just raised a $10 million seed round led by Konvoy Ventures with...

Credit: Mcmurryjulie via Pixabay

Trojan force: Hidden backdoors may lurk inside AI models, report says

byPaul Sawers
March 10, 2026

What if an AI model carried hidden instructions that only activate when triggered by a particular input? That’s the subject...

The launch of Isembard’s innovative approach to manufacturing

Isembard raises $50M, plans to open 25 ‘AI-powered factories’

byIngrid Lunden
March 9, 2026

Isembard, a London startup that’s built a platform to help hardware makers in defence, aerospace and robotics manufacture components and...

Load More
Next Post

Resilience Conference 2025: What is Defence Innovation?

Resilience Conference 2025: The Real Lessons From Ukraine

Resilience Conference 2025: The Real Lessons From Ukraine

Most viewed

InVeris announces fats Drone, an integrated, multi-party drone flight simulator

Uforce raises $50M at a $1B+ valuation to build defence tech for Ukraine

Auterion, the drone software startup, eyes raising $200M at a $1.2B+ valuation

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

Senai exits stealth to help governments harness online video intelligence

Palantir and Ukraine’s Brave1 have built a new AI “Dataroom”

Resilience Media is an independent publication covering the future of defence, security, and resilience. Our reporting focuses on emerging technologies, strategic threats, and the growing role of startups and investors in the defence of democracy.

  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

No Result
View All Result
  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.