Incident

Major breach of surveillance data related to Chinese Ministry Of Public Security published on GitHub


Learn More

A significant data leak is published on Github related to iSoon (Anxun) - a private industry contractor for the Chinese Ministry of Public Security (MPS). This breach has potentially exposed sensitive information related to espionage operations, spyware, and a so-called "Twitter Monitoring Platform".

The breach data is poseted on GitHub, with purported internal documents from the Chinese government made public. These documents' authenticity has not yet been verified, and the MPS has not formally recognized or addressed the breach.

The Github repo already has over 900 forks, so the cat is out of the bag. The leaked data is a mix of conversations, reports, government plans, and contact information, spanning thousands of folders,.

Key insights from the leaked data include:

  • Allegations of Anxun's deception towards national security agencies.
  • Employee grievances and financial issues within Anxun.
  • Detailed conversations between Anxun's top executives.
  • Criticisms of Anxun's product quality.
  • Anxun's involvement with foreign governments, including India, Thailand, Vietnam, South Korea, and NATO members.

Additionally, the breach highlights APT (Advanced Persistent Threat) cyberattacks targeting China, as reported by 360 Security Group. Over 1,200 APT attacks, primarily from North American and Asian organizations, were documented in 2023, targeting 16 different industries with education at the forefront. These attacks not only posed espionage threats but also risked paralyzing critical national infrastructure.

Given the complexity and potential impact of this breach, the veracity of the content is not guaranteed. Naturally, there is no official response from chinese officials.

Major breach of surveillance data related to Chinese Ministry Of Public Security published on GitHub