China’s Great Firewall Leak Exposes Global Surveillance Technology Exports

Sep 16, 2025

Key Takeaways

  • A 500 GB leak from Geedge Networks, a developer behind China’s Great Firewall, has exposed internal source code, engineering logs, and export records.

  • The data shows surveillance and censorship technologies being exported to multiple countries, including Myanmar, Pakistan, Ethiopia, and Kazakhstan.

  • Leaked tools include advanced firewalls, monitoring platforms, and systems designed to identify and track individuals online.

What Happened

On 9 September 2025, an anonymous source leaked more than 500 GB of data from Geedge Networks to Enlace Hacktivista, a leak-publishing platform.

The files contained:

  • Internal technical documents, including source code and deployment details.

  • Infrastructure records from Jira, Confluence, and GitLab.

  • Operational logs showing how censorship and surveillance tools were deployed in client countries.

Who’s Involved

  • Geedge Networks – A company presenting itself as a network security provider, but heavily involved in censorship and monitoring systems.

  • MESA Lab, Institute of Information Engineering, Chinese Academy of Sciences – Research partner in the development of Great Firewall technologies.

  • Government clients – Countries identified as users include Myanmar, Pakistan, Ethiopia, and Kazakhstan.

  • Civil society groups – Amnesty International, Tor Project, Justice for Myanmar, and InterSecLab are among those analyzing the leaked dataset.

Exposed Capabilities

The leak revealed several advanced tools and monitoring systems:

Tool / System

Capabilities

Tiangou Secure Gateway (TSG)

A carrier-grade firewall similar to the Great Firewall, capable of deep packet inspection, blocking VPNs, throttling traffic, and identifying individual users.

Cyber Narrator

A monitoring platform with SIEM-like functionality, capable of real-time network surveillance, user behavior analysis, and mobile subscriber location tracking.

TSG Galaxy

A data warehouse system designed to aggregate and analyze user data across networks.

Additional features include detection of circumvention tools like Tor and Psiphon, geofencing, construction of social relationship graphs, and support for hardware resilient to sanctions.

Global Impact

  • Pakistan – The country has adopted a system called Web Monitoring System 2.0 (WMS 2.0) and a Lawful Intercept Management System (LIMS), which integrate Geedge’s technology with foreign hardware suppliers, including a German vendor and companies in the UAE.

  • Myanmar – The leaked files reveal the junta’s widespread access to internet traffic, involving ISPs, data centers, and international gateways.

  • Ethiopia and Kazakhstan – Both countries appear to be recipients of surveillance infrastructure, enabling expanded state control over communications.

  • China – Evidence suggests that even within China, regional variations of the firewall exist, with provinces running their own censorship configurations.

Why It Matters

The leak confirms that surveillance and censorship technologies are not confined within China’s borders. Instead, they are packaged as export products and deployed internationally, often in states with authoritarian regimes.

This has three major implications:

  1. Commoditization of surveillance – These systems are developed, standardized, and sold like any other IT product.

  2. Global influence – Exported technologies allow China to extend its model of internet control abroad.

  3. Transparency and accountability – Until now, little was known about how these tools functioned, leaving citizens and rights groups with limited ability to challenge their use.

What’s Next

  • Technical analysis of the leaked source code may reveal exploitable flaws or backdoors in the exported systems.

  • Diplomatic consequences could follow if countries are pressured to halt deployment of these technologies.

  • Digital rights concerns will likely grow as civil society organizations document the impact of these tools on freedom of expression and privacy.

  • Sanctions monitoring may intensify, as the leak suggests that foreign hardware has been integrated into sanctioned censorship systems.

Conclusion

The Geedge Networks leak shines a spotlight on the global spread of China’s surveillance and censorship technology. What was once viewed as a uniquely Chinese infrastructure is now a global export business, reshaping internet governance and civil liberties worldwide.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

China’s Great Firewall Leak Exposes Global Surveillance Technology Exports
China’s Great Firewall Leak Exposes Global Surveillance Technology Exports
China’s Great Firewall Leak Exposes Global Surveillance Technology Exports
China’s Great Firewall Leak Exposes Global Surveillance Technology Exports

China’s Great Firewall Leak Exposes Global Surveillance Technology Exports

China’s Great Firewall Leak Exposes Global Surveillance Technology Exports

China’s Great Firewall Leak Exposes Global Surveillance Technology Exports

China’s Great Firewall Leak Exposes Global Surveillance Technology Exports

Sep 16, 2025

HackerOne Data Breach via Salesforce-Drift Integration: Technical Breakdown 2025
HackerOne Data Breach via Salesforce-Drift Integration: Technical Breakdown 2025
HackerOne Data Breach via Salesforce-Drift Integration: Technical Breakdown 2025
HackerOne Data Breach via Salesforce-Drift Integration: Technical Breakdown 2025

HackerOne Data Breach via Salesforce-Drift Integration: Technical Breakdown 2025

HackerOne Data Breach via Salesforce-Drift Integration: Technical Breakdown 2025

HackerOne Data Breach via Salesforce-Drift Integration: Technical Breakdown 2025

HackerOne Data Breach via Salesforce-Drift Integration: Technical Breakdown 2025

Sep 11, 2025

CISA Flags WhatsApp Zero-Day Vulnerability Exploited in Zero-Click Spyware Attacks
CISA Flags WhatsApp Zero-Day Vulnerability Exploited in Zero-Click Spyware Attacks
CISA Flags WhatsApp Zero-Day Vulnerability Exploited in Zero-Click Spyware Attacks
CISA Flags WhatsApp Zero-Day Vulnerability Exploited in Zero-Click Spyware Attacks

CISA Flags WhatsApp Zero-Day Vulnerability Exploited in Zero-Click Spyware Attacks

CISA Flags WhatsApp Zero-Day Vulnerability Exploited in Zero-Click Spyware Attacks

CISA Flags WhatsApp Zero-Day Vulnerability Exploited in Zero-Click Spyware Attacks

CISA Flags WhatsApp Zero-Day Vulnerability Exploited in Zero-Click Spyware Attacks

Sep 4, 2025

Jaguar Land Rover Cyberattack 2025: IT Shutdown Halts Production and Sales
Jaguar Land Rover Cyberattack 2025: IT Shutdown Halts Production and Sales
Jaguar Land Rover Cyberattack 2025: IT Shutdown Halts Production and Sales
Jaguar Land Rover Cyberattack 2025: IT Shutdown Halts Production and Sales

Jaguar Land Rover Cyberattack 2025: IT Shutdown Halts Production and Sales

Jaguar Land Rover Cyberattack 2025: IT Shutdown Halts Production and Sales

Jaguar Land Rover Cyberattack 2025: IT Shutdown Halts Production and Sales

Jaguar Land Rover Cyberattack 2025: IT Shutdown Halts Production and Sales

Sep 3, 2025

WhatsApp Fixes Zero-Click Spyware Exploit Targeting Apple iPhone and Mac Users
WhatsApp Fixes Zero-Click Spyware Exploit Targeting Apple iPhone and Mac Users
WhatsApp Fixes Zero-Click Spyware Exploit Targeting Apple iPhone and Mac Users
WhatsApp Fixes Zero-Click Spyware Exploit Targeting Apple iPhone and Mac Users

WhatsApp Fixes Zero-Click Spyware Exploit Targeting Apple iPhone and Mac Users

WhatsApp Fixes Zero-Click Spyware Exploit Targeting Apple iPhone and Mac Users

WhatsApp Fixes Zero-Click Spyware Exploit Targeting Apple iPhone and Mac Users

WhatsApp Fixes Zero-Click Spyware Exploit Targeting Apple iPhone and Mac Users

Sep 1, 2025

New Android Malware Masquerades as FSB Antivirus to Spy on Executives
New Android Malware Masquerades as FSB Antivirus to Spy on Executives
New Android Malware Masquerades as FSB Antivirus to Spy on Executives
New Android Malware Masquerades as FSB Antivirus to Spy on Executives

New Android Malware Masquerades as FSB Antivirus to Spy on Executives

New Android Malware Masquerades as FSB Antivirus to Spy on Executives

New Android Malware Masquerades as FSB Antivirus to Spy on Executives

New Android Malware Masquerades as FSB Antivirus to Spy on Executives

Aug 25, 2025

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.