Anxun Leak Notes

Hi folks,

In this post I want to share my findings from the recent infamous Anxun Leak, in particular, from the chat logs.

Some overview and brief
Initial Source of Leak – https://github.com/I-S00N
Company Website – http://www.i-soon.net
Company Name – Shanghai Anxun Information Technology Co.
Company Information – https://pitchbook.com/profiles/company/433635-85
Data Analysis and Highlights – https://github.com/hyde1337/anxun-isoon-leaks


Provider of information technology security consulting services. The company’s service includes risk assessments, firefwall/penetration testing, APT attack protection and program audits, enabling enterprises to conduct IT operations more securely. Actually, the company is very similar in NTC Vulcan in terms of functions in the government: quite big cyber offensive contractor for tools development and perform cyber offensive operations.

Possibly, insider has leaked the data to expose shady activities by the company, but could be a cover for other sort of operation.
Data consists of few main parts, which have been highlighted by the whistleblower:

  • Anxun relationships with National Security Agencies in China;
  • Employee data;
  • Anxun’s financial documents;
  • Chat records between Anxun’s members;
  • Anxun’s products internal documentation;
  • Proofs of Anxun infiltration overseas nations, such as NATO countries, South Korea, US etc.

Chat Overview

The chat logs come mostly from WeChat chatroom (wxid_* is a unique ID being assigned to the user by WeChat system).

SenderCount Messages
lengmo4981
Shutd0wn3675
wxid_53902240273121409
wxid_7p054rmzkhqf21894
wxid_wh6x59w70y3r22620
ReceiverCount Messages
Shutd0wn4661
lengmo3987
wxid_53902240273121611
wxid_7p054rmzkhqf21804
wxid_zb45i0rc71yk21697
Chat Links Graph
lengmo Circle of Connections