Massive Leak: 500GB of Source Code and Documents from China’s Great Firewall Exposed Online — Censorship Tool Sold to Three Nations

On September 11, a significant data breach emerged in the realm of Chinese censorship, as researchers unveiled an extensive leak of over 500GB of internal documents, source code, work logs, and communications related to the infamous Great Firewall. This leak, which includes essential operational runbooks and deployment repositories for the national traffic filtering system, was linked to Geedge Networks, a company associated with Fang Binxing—often referred to as the “father” of the Great Firewall—and the MESA lab at the Institute of Information Engineering.

This data spill reveals intricate details about the architecture of a commercial platform known as ‘Tiangou,’ aimed at Internet Service Providers (ISPs) and border gateways. Researchers from the Great Firewall Report, who first authenticated and organized the data, characterize Tiangou as a comprehensive censorship solution. Its implementation has reportedly transitioned from American hardware—specifically HP and Dell servers—to domestically sourced systems in response to international sanctions.

Furthermore, a leaked deployment sheet indicates that this system was activated in 26 data centers across Myanmar, actively managing over 81 million simultaneous TCP connections. Operated by Myanmar’s state-owned telecom provider, the system integrates directly with core Internet exchange points, thus facilitating large-scale blocking and controlled filtering of web traffic.

The leak’s implications extend beyond Myanmar, as reporting from WIRED and Amnesty International highlights that Geedge’s deep packet inspection infrastructure has been exported to other nations, including Pakistan, Ethiopia, and Kazakhstan. In Pakistan, Geedge’s technology allegedly serves as a core component of a broader surveillance apparatus labeled WMS 2.0, which is capable of real-time monitoring of mobile networks.

The depth and specificity of this leak provide an unparalleled view into the mechanisms behind China’s censorship practices. Analysts note that the leaked documents suggest the capability for intercepting unencrypted HTTP sessions, enhancing the understanding of potential vulnerabilities in circumventing censorship measures.

Research on the source code archive is still in its early stages, but experts believe that the build logs and development notes could reveal weaknesses in the protocols that censorship circumvention tools might exploit. This critical perspective aligns with tactics outlined in the MITRE ATT&CK framework, hinting at potential adversary approaches such as initial access through exploitation of vulnerable software components or privilege escalation by manipulating network configurations.

The entire leaked archive has been mirrored by Enlace Hacktivista and other entities, prompting researchers to advise caution when handling this sensitive information. Use of air-gapped virtual machines or other secure environments is highly recommended for any parties attempting to analyze the data.

As organizations worldwide scrutinize these developments, ongoing discourse about the risks of censorship technologies and their broader applications in state-sponsored surveillance is likely to intensify. Business owners and cybersecurity professionals are encouraged to stay informed through reliable channels like Tom’s Hardware for insights and updates on emerging risks and vulnerabilities in the digital landscape.

Source link