Leaked Technical Documents Show China Rehearsing Cyberattacks on Neighbors’ Critical Infrastructure

Related

Pentagon CIO Kirsten Davies Announces New Team Appointments

What happened Pentagon Chief Information Officer Kirsten Davies announced several...

Carnival Corporation Probes Data Breach After Claims of 8.7 Million Records Theft

What happened Carnival Corporation is investigating a potential data breach...

Grinex Exchange Blames Western Intelligence for $13.7M Crypto Hack

What happened Kyrgyzstan-based cryptocurrency exchange Grinex suspended operations on April...

Payouts King Ransomware Uses QEMU VMs to Bypass Endpoint Security

What happened Sophos researchers have documented two active campaigns in...

Share

What happened

Leaked internal technical documents indicate that China has been rehearsing cyberattacks against the critical infrastructure of its closest neighboring countries. According to the report, the materials describe a secret training platform known as “Expedition Cloud” designed to simulate network environments of potential target systems. The cache includes source code, training data, and software assets that recreate replicas of networks in sectors such as power, energy transmission, transportation, and smart home infrastructure. The platform supports “reconnaissance groups” and “attack groups” by allowing operators to practice offensive operations against these simulated environments. Independent experts consulted for the reporting expressed high confidence in the authenticity of the files and noted that the platform’s architecture suggests intentional preparation of offensive capabilities rather than defensive simulation. The documents were exposed on an unsecured FTP server tied to a developer’s machine containing malware, and were first reported by the specialist blog NetAskari before coverage in Recorded Future News. 

Who is affected

Critical infrastructure operators in countries neighboring China could be affected if real-world offensive cyber operations — rehearsed using the disclosed platform — are conducted against their networks; the platforms simulated include replicas of power, energy, transportation, and smart home systems. 

Why CISOs should care

The existence of an offensive cyber range focused on critical infrastructure rehearsals highlights the strategic intent of threat actors to plan and refine sophisticated attacks prior to execution, a factor that underscores the evolving landscape of state-aligned cyber capabilities and potential preparatory targeting. 

3 practical actions

  • Assess threat intelligence feeds. Integrate updates on foreign state rehearsal platforms to adjust defensive postures. 
  • Strengthen critical infrastructure defenses. Review and harden protections around systems in energy, transportation, and industrial control sectors. 
  • Enhance monitoring for reconnaissance behavior. Detect early signs of external scanning or probing against replicated environments similar to those described.Â