China’s Great Firewall Leak Exposes Global Surveillance Technology Exports

Sep 16, 2025

Key Takeaways

  • A 500 GB leak from Geedge Networks, a developer behind China’s Great Firewall, has exposed internal source code, engineering logs, and export records.

  • The data shows surveillance and censorship technologies being exported to multiple countries, including Myanmar, Pakistan, Ethiopia, and Kazakhstan.

  • Leaked tools include advanced firewalls, monitoring platforms, and systems designed to identify and track individuals online.

What Happened

On 9 September 2025, an anonymous source leaked more than 500 GB of data from Geedge Networks to Enlace Hacktivista, a leak-publishing platform.

The files contained:

  • Internal technical documents, including source code and deployment details.

  • Infrastructure records from Jira, Confluence, and GitLab.

  • Operational logs showing how censorship and surveillance tools were deployed in client countries.

Who’s Involved

  • Geedge Networks – A company presenting itself as a network security provider, but heavily involved in censorship and monitoring systems.

  • MESA Lab, Institute of Information Engineering, Chinese Academy of Sciences – Research partner in the development of Great Firewall technologies.

  • Government clients – Countries identified as users include Myanmar, Pakistan, Ethiopia, and Kazakhstan.

  • Civil society groups – Amnesty International, Tor Project, Justice for Myanmar, and InterSecLab are among those analyzing the leaked dataset.

Exposed Capabilities

The leak revealed several advanced tools and monitoring systems:

Tool / System

Capabilities

Tiangou Secure Gateway (TSG)

A carrier-grade firewall similar to the Great Firewall, capable of deep packet inspection, blocking VPNs, throttling traffic, and identifying individual users.

Cyber Narrator

A monitoring platform with SIEM-like functionality, capable of real-time network surveillance, user behavior analysis, and mobile subscriber location tracking.

TSG Galaxy

A data warehouse system designed to aggregate and analyze user data across networks.

Additional features include detection of circumvention tools like Tor and Psiphon, geofencing, construction of social relationship graphs, and support for hardware resilient to sanctions.

Global Impact

  • Pakistan – The country has adopted a system called Web Monitoring System 2.0 (WMS 2.0) and a Lawful Intercept Management System (LIMS), which integrate Geedge’s technology with foreign hardware suppliers, including a German vendor and companies in the UAE.

  • Myanmar – The leaked files reveal the junta’s widespread access to internet traffic, involving ISPs, data centers, and international gateways.

  • Ethiopia and Kazakhstan – Both countries appear to be recipients of surveillance infrastructure, enabling expanded state control over communications.

  • China – Evidence suggests that even within China, regional variations of the firewall exist, with provinces running their own censorship configurations.

Why It Matters

The leak confirms that surveillance and censorship technologies are not confined within China’s borders. Instead, they are packaged as export products and deployed internationally, often in states with authoritarian regimes.

This has three major implications:

  1. Commoditization of surveillance – These systems are developed, standardized, and sold like any other IT product.

  2. Global influence – Exported technologies allow China to extend its model of internet control abroad.

  3. Transparency and accountability – Until now, little was known about how these tools functioned, leaving citizens and rights groups with limited ability to challenge their use.

What’s Next

  • Technical analysis of the leaked source code may reveal exploitable flaws or backdoors in the exported systems.

  • Diplomatic consequences could follow if countries are pressured to halt deployment of these technologies.

  • Digital rights concerns will likely grow as civil society organizations document the impact of these tools on freedom of expression and privacy.

  • Sanctions monitoring may intensify, as the leak suggests that foreign hardware has been integrated into sanctioned censorship systems.

Conclusion

The Geedge Networks leak shines a spotlight on the global spread of China’s surveillance and censorship technology. What was once viewed as a uniquely Chinese infrastructure is now a global export business, reshaping internet governance and civil liberties worldwide.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

RedTiger Infostealer Targets Discord Users via Fake Game Mods
RedTiger Infostealer Targets Discord Users via Fake Game Mods
RedTiger Infostealer Targets Discord Users via Fake Game Mods
RedTiger Infostealer Targets Discord Users via Fake Game Mods

RedTiger Infostealer Targets Discord Users via Fake Game Mods

RedTiger Infostealer Targets Discord Users via Fake Game Mods

RedTiger Infostealer Targets Discord Users via Fake Game Mods

RedTiger Infostealer Targets Discord Users via Fake Game Mods

Oct 27, 2025

New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens
New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens
New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens
New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens

New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens

New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens

New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens

New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens

Oct 27, 2025

Qantas Airlines Cyberattack 2025: 5 Million Customer Records Leaked After Ransom Deadline
Qantas Airlines Cyberattack 2025: 5 Million Customer Records Leaked After Ransom Deadline
Qantas Airlines Cyberattack 2025: 5 Million Customer Records Leaked After Ransom Deadline
Qantas Airlines Cyberattack 2025: 5 Million Customer Records Leaked After Ransom Deadline

Qantas Airlines Cyberattack 2025: 5 Million Customer Records Leaked After Ransom Deadline

Qantas Airlines Cyberattack 2025: 5 Million Customer Records Leaked After Ransom Deadline

Qantas Airlines Cyberattack 2025: 5 Million Customer Records Leaked After Ransom Deadline

Qantas Airlines Cyberattack 2025: 5 Million Customer Records Leaked After Ransom Deadline

Oct 13, 2025

Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries
Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries
Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries
Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries

Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries

Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries

Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries

Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries

Oct 10, 2025

New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign
New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign
New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign
New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign

New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign

New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign

New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign

New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign

Oct 10, 2025

CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities
CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities
CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities
CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities

CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities

CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities

CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities

CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities

Sep 26, 2025

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.