Huge Leak Reveals How a Chinese Firm Is Spreading the Great Firewall Globally

A recent leak comprising over 100,000 documents reveals that a relatively obscure Chinese firm, Geedge Networks, has been surreptitiously marketing censorship systems similar to the Great Firewall to governments globally. Founded in 2018 and backed by key figures involved in China’s censorship framework, Geedge promotes itself as a network-monitoring service provider, offering advanced cybersecurity tools purportedly to enhance visibility and reduce security risks for clients.

However, investigations into the leaked materials indicate that Geedge is operating a sophisticated surveillance system enabling users to surveil online activity, block access to specific websites and VPN services, and track individuals. The research points to the company packaging these advanced capabilities into a commercialized variant of the Great Firewall—essentially, a comprehensive solution featuring hardware installable in telecom data centers and software managed by local authorities.

Notably, the leaked documents detail plans for additional features including cyberattack-for-hire services and geofencing for targeted user monitoring. Geedge has reportedly deployed its operations in countries such as Kazakhstan, Ethiopia, Pakistan, and Myanmar, with indications that it is expanding its reach into other, unspecified nations. A public job posting further suggests that Geedge is seeking engineers willing to travel internationally for deployment.

The leaked documents, encompassing Jira and Confluence entries, source code, and exchanges with a Chinese academic institution, primarily consist of internal technical details, operational logs, and communication aimed at troubleshooting and enhancing functionalities. The information was scrutinized by a collective of human rights and media organizations, including Amnesty International and the Tor Project, among others.

Experts like Marla Rivera, a technical researcher at InterSecLab, emphasize that Geedge’s systems extend far beyond conventional lawful interception practices, enabling mass censorship and allowing governments to target specific individuals based on their online behavior. Rivera expresses concern over the alarming concentration of power such systems afford governments.

Digital Authoritarianism as a Service

Central to Geedge’s offerings is the Tiangou Secure Gateway (TSG), engineered to operate within data centers and capable of handling the internet traffic for entire nations. Every packet of traffic is managed through this system, which can scan, filter, or block data as needed. The system not only monitors general traffic but also enables the establishment of targeted rules for individuals flagged as suspicious, facilitating extensive network activity tracking.

For unencrypted traffic, the system can intercept sensitive data, including website content, passwords, and email attachments. If data is encrypted using Transport Layer Security, it employs deep packet inspection techniques and machine learning algorithms to extract metadata, assessing whether the traffic is utilizing circumvention tools like VPNs. Should the system be incapable of analyzing the encrypted content, it can categorize the traffic as suspicious, leading to temporary blocks.

This incident raises significant concerns around digital authoritarianism and highlights potential tactics employed in these operations. Techniques such as initial access, surveillance, and data exfiltration outlined in the MITRE ATT&CK framework may be relevant, demonstrating methods that adversaries could leverage to execute similar attacks. As businesses remain vigilant against cybersecurity threats, understanding these frameworks becomes critical for developing effective defense strategies.

Source