Tuesday 20 January, 2026
[email protected]
Resilience Media
  • About
  • News
  • Resilience Conference
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
  • About
  • News
  • Resilience Conference
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
Resilience Media
No Result
View All Result

Leaked Knownsec Files Expose China’s Cyber Arsenal, Forcing Global Defence Rethink

A massive data leak from Chinese cybersecurity firm Knownsec has unveiled the tools, tactics, and datasets underpinning Beijing’s state-aligned hacking operations

Carly PagebyCarly Page
November 11, 2025
in News, Startups
Photo by Andrea Sun on Unsplash

Photo by Andrea Sun on Unsplash

Share on Linkedin

A massive data breach at Chinese cybersecurity firm Knownsec has exposed the digital machinery behind Beijing’s global cyber espionage network, in what security experts are calling one of the most consequential leaks in the history of state-backed hacking.

You Might Also Like

Palantir and Ukraine’s Brave1 have built a new AI “Dataroom”

Dominion Dynamics raises $15M to build a new arctic defence prime in Canada

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

More than 12,000 confidential documents, which were originally uploaded to GitHub before they were removed for violating the platform’s terms of service, have revealed the scope, sophistication, and international reach of China’s cyber operations, providing an unprecedented window into how its intelligence ecosystem functions.

Founded in 2007 and backed by tech giant Tencent, Knownsec has long operated at the nexus of China’s commercial cybersecurity sector and its state-directed intelligence apparatus. The company’s clients reportedly include government departments, financial institutions, and critical infrastructure operators, placing it squarely within Beijing’s digital command chain. That connection is now under renewed scrutiny following the leak, which has laid bare a sprawling cyber arsenal designed to infiltrate, monitor, and manipulate targets worldwide.

The trove details an extensive suite of offensive tools and data theft campaigns. Researchers analysing the leaked files say they include Remote Access Trojans (RATs) built for every major operating system (Windows, macOS, Linux, iOS, and Android), underscoring China’s capability to breach nearly any endpoint on the planet.

Other components include Android-based surveillance modules capable of extracting chat histories, contacts, and location data from popular messaging platforms.

Among the most alarming revelations are hardware-based exploits attributed to Knownsec’s engineering teams, including a compromised portable power bank designed to covertly siphon data from any connected device. Such hardware-level compromise points to an advanced supply-chain strategy, where seemingly benign consumer or enterprise products become tools of persistent espionage.

Data exfiltration appears to have been central to Knownsec’s operations. Internal spreadsheets list vast stolen datasets: 95GB of Indian immigration records, 3TB of South Korean telecom data, and 459GB of Taiwanese road planning files, alongside material from more than 20 other nations including the United Kingdom, Japan, and Nigeria.

Beijing’s official response has been characteristically opaque. When asked about the breach, the Chinese Foreign Ministry neither confirmed nor denied the incident, instead repeating its standard line opposing “all forms of cyberattacks.”

For Western intelligence and defence agencies, the fallout is already significant. The leak’s technical breadth – spanning mobile, hardware, and cloud environments – has made it a rare and valuable intelligence asset for defenders, but also a sobering reminder of how extensively state-aligned firms have embedded offensive capabilities into the global digital fabric.

“The Knownsec breach doesn’t just reveal tooling, it reveals doctrine,” said Richard Blech, founder and CEO of XSOC CORP. “The leaked ecosystem points to a unified strategy: collect at scale, correlate across domains, and train AI systems to infer what encryption still leaks. When you combine massive exfiltration of immigration, telecom, mobility [and] infrastructure data with state-aligned contractors like Knownsec and I-Soon [which itself was the subject of a leak in 2024], the goal becomes clear: build adversarial models that reconstruct behaviour and intent from encrypted telemetry, timing patterns, and metadata, not plaintext. That is the core of AI-driven Data Attacks (AIDA).”

Blech added that this represents a fundamental shift in cyber doctrine.

“The world still fixates on decryption, yet this leak shows China’s pivot toward observation and inference, where packet cadence, protocol signatures, cross-dataset mapping, and device-level access feed models optimized to predict, not break. This is the Cognitive War: a shift from hacking systems to training models that understand systems, even when the data itself is encrypted.”

For the defence sector, the Knownsec breach underscores how military, aerospace, and dual-use technology suppliers remain prime targets – not only for direct intrusion, but as data sources feeding the kind of AI systems Blech describes.

These models don’t simply catalogue stolen information; they analyse traffic patterns, operational rhythms, and communication signatures to anticipate how adversaries think and act.

Quantum-safe encryption offers one path to resilience, particularly as quantum computing threatens to dismantle existing cryptographic standards. Yet as the Knownsec case illustrates, even unbroken encryption can leak information through its metadata. AI tools, meanwhile, can digest and correlate this vast data haul far faster than any human analyst, giving state actors new predictive capabilities that sit beneath traditional detection thresholds.

Tags: ChinaCybersecurityKnownsec
Previous Post

Resilience Conference 2025: Plural on Urgency, Scale, and Defending Democracy

Next Post

Resilience Conference 2025: What is Defence Innovation?

Carly Page

Carly Page

Carly Page is a freelance journalist and copywriter with 10+ years of experience covering the technology industry, and was formerly a senior cybersecurity reporter at TechCrunch. Bylines include Forbes, IT Pro, LeadDev, The Register, TechCrunch, TechFinitive, TechRadar, TES, The Telegraph, TIME, Uswitch, WIRED, & more.

Related News

blue and yellow striped country flag

Palantir and Ukraine’s Brave1 have built a new AI “Dataroom”

byIngrid Lunden
January 20, 2026

Palantir, the US data analytics giant, has been a regular presence in Ukraine helping with its defence against Russia since...

us a flag on pole near snow covered mountain

Dominion Dynamics raises $15M to build a new arctic defence prime in Canada

byIngrid Lunden
January 19, 2026

The US has become a somewhat unpredictable neighbour to Canada, with President Trump’s threats of annexation and spiking tariffs looming...

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

byIngrid Lunden
January 19, 2026

Make way for another drone startup in the European defence tech ecosystem. Twentyfour Industries is today emerging from stealth armed...

Power outages and small checks: The perils of being a VC in Kyiv

Power outages and small checks: The perils of being a VC in Kyiv

byJohn Biggs
January 16, 2026

When I called Sasha Yatsenko, the power had just cut out. No sirens, no warning, just a few minutes of...

Equal1 Wants Quantum to Be as Simple as CPUs and GPUs — and It’s Raised $60m to Prove It

Equal1 Wants Quantum to Be as Simple as CPUs and GPUs — and It’s Raised $60m to Prove It

byFiona Alston
January 16, 2026

Equal1, an Irish quantum semiconductor company announced this week it had raised $60 million to fuel the next stage of...

pink and purple led light

DTCP unveils €500m ‘Project Liberty’ fund to back European defence tech

byCarly Page
January 16, 2026

DTCP has launched a €500 million fund dedicated to defence, security, and resilience technologies, marking what it says is Europe’s...

Weekly Digest: From the living room to the war room at CES 2026

Weekly Digest: From the living room to the war room at CES 2026

byLeslie Hitchcock
January 15, 2026

Good afternoon from the team at Resilience Media. This is Issue 54 of our weekly newsletter, which you can subscribe...

EIB backs Optics11 with €25M to boost undersea security and energy resilience

EIB backs Optics11 with €25M to boost undersea security and energy resilience

byCarly Page
January 15, 2026

The European Investment Bank has agreed a €25 million loan to Dutch fibre-optic sensor firm Optics11, backing technology designed to...

Load More
Next Post

Resilience Conference 2025: What is Defence Innovation?

Resilience Conference 2025: The Real Lessons From Ukraine

Resilience Conference 2025: The Real Lessons From Ukraine

Most viewed

InVeris announces fats Drone, an integrated, multi-party drone flight simulator

Harmattan AI raises $200M at a $1.4B valuation from Dassault

Hydrosat raises $60M for its thermal satellite imaging tech

Defense Unicorns lives up to its name: $136M round lifts valuation past $1B

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

Terra Industries raises $12M to become ‘Africa’s first neo-prime’

Resilience Media is an independent publication covering the future of defence, security, and resilience. Our reporting focuses on emerging technologies, strategic threats, and the growing role of startups and investors in the defence of democracy.

  • About
  • News
  • Resilence Conference
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

No Result
View All Result
  • About
  • News
  • Resilence Conference
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.