Massive Data Breach at Knownsec Exposes China’s State-Sponsored Hacking Tools and Global Targets

Massive Data Breach at Chinese Cybersecurity Firm Unveils State-Sponsored Hacking Tools and Global Surveillance Targets

In early November 2025, Knownsec, a prominent Chinese cybersecurity firm with direct ties to the government, suffered a significant data breach. This incident led to the exposure of over 12,000 classified documents, shedding light on the extensive and sophisticated nature of state-sponsored cyber operations. The leaked information includes detailed descriptions of cyber weapons, internal hacking tools, and a comprehensive list of global surveillance targets. This breach offers an unprecedented glimpse into the technical capabilities and geopolitical reach of organized state-level cyber espionage activities.

Details of the Breach

The compromised files encompass more than just routine business data. Hackers managed to extract technical documentation outlining collaborations between Knownsec and various Chinese government departments. Additionally, the breach revealed complete source code for proprietary internal tools and spreadsheets listing 80 overseas targets that were allegedly already compromised. The leaked materials initially appeared on GitHub but were swiftly removed. However, copies had already circulated extensively within the cybersecurity research community.

Knownsec’s Role in China’s Cyber Infrastructure

Founded in 2007 and backed by Tencent in 2015, Knownsec operates with over 900 employees across multiple Chinese offices. The company has positioned itself as a critical node in China’s cyber infrastructure, playing a significant role in the nation’s cybersecurity landscape.

Revelations from the Leaked Documents

Security analysts have identified that the leaked documents reveal a comprehensive arsenal of offensive cyber capabilities maintained by Knownsec. The company possesses sophisticated libraries of Remote Access Trojans capable of compromising various operating systems, including Windows, Linux, macOS, iOS, and Android. Particularly concerning are Android-specific tools designed to extract message histories from Chinese chat applications and Telegram, enabling widespread communications interception.

Global Scope of Compromised Targets

The most revealing aspect of this breach concerns the geographic scope and data volume of compromised targets. International locations named in the leaked spreadsheets include Japan, Vietnam, India, Indonesia, Nigeria, and the United Kingdom. The documents detail stolen data sets of staggering proportions:

– 95 gigabytes of immigration records from India
– 3 terabytes of call records from South Korean telecommunications company LG U Plus
– 459 gigabytes of road planning data from Taiwan

These figures demonstrate systematic, long-term access to critical infrastructure and sensitive government information across multiple nations.

Advanced Attack Mechanisms

Beyond software tools, the leaked documents revealed hardware-based attack mechanisms. One notable example is a specially designed malicious power bank capable of covertly uploading data from connected victims’ devices. This level of technical sophistication indicates resourced, sustained operations targeting high-value intelligence collection.

Official Response

The Chinese government has denied knowledge of the breach. Foreign Ministry spokesperson Mao Ning stated unfamiliarity with the incident while reiterating official opposition to cyberattacks. However, this response notably avoided denying state support for cybersecurity firms conducting intelligence activities, suggesting such operations are viewed as legitimate national security functions.

Implications for Global Cybersecurity

This breach underscores the evolving landscape of global cybersecurity threats. The exposure of such extensive and sophisticated cyber tools and operations highlights the need for enhanced international cooperation and robust cybersecurity measures. Nations and organizations worldwide must reassess their cybersecurity strategies to address the growing challenges posed by state-sponsored cyber activities.

Conclusion

The Knownsec data breach serves as a stark reminder of the complexities and dangers inherent in the digital age. As cyber operations become increasingly sophisticated and far-reaching, the importance of vigilance, transparency, and international collaboration in cybersecurity cannot be overstated.