Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Leaked Documents Reveal China's 'Expedition Cloud' Cyber
Leaked Documents Reveal China's 'Expedition Cloud' Cyber
NEWS

Leaked Documents Reveal China's 'Expedition Cloud' Cyber

Technical documents leaked from a malware-infected developer device expose a Chinese military-linked training platform that replicates the critical...

Dylan H.

News Desk

February 27, 2026
4 min read

A Training Ground for Digital Warfare

Leaked technical documents have revealed the existence of "Expedition Cloud" — a Chinese cyber range platform specifically designed to let attackers practice hacking replicas of real network environments belonging to China's "main operational opponents in the South China Sea and Indochina directions."

The leak provides rare documentary evidence of a state-linked program where offensive cyber operators train against recreated versions of foreign critical infrastructure — power grids, energy transmission systems, transportation networks, and smart home infrastructure — before conducting real-world operations.


How the Leak Happened

The documents were discovered on an unsecured FTP server that had collected material from a personal device used by one of Expedition Cloud's developers. The device had been infected by malware — an ironic security failure for a company in the business of offensive cyber operations.

The cache includes:

  • Source code for the Expedition Cloud platform
  • Training documentation and operational procedures
  • Software assets and configuration files
  • Target network specifications for the simulated environments

Independent experts consulted by Recorded Future News have expressed high confidence in the authenticity of the files based on the volume, complexity, and variety of the technical documentation.


Platform Architecture

ComponentPurpose
Target NetworksRecreated computer networks from power, energy, transportation, and smart home sectors
Reconnaissance GroupsTeams that map and analyze target infrastructure
Attack GroupsTeams that execute offensive operations against the simulated targets
DefendersNone — no defensive role is defined in the platform

The absence of a defensive component is telling. This is not a red team/blue team training exercise — it's a purely offensive simulation designed to rehearse attacks against specific foreign infrastructure.


The Developer: CyberPeace

The platform was developed by CyberPeace (Chinese: 赛宁网安), a company that openly celebrates extensive links to China's government and military on its website. CyberPeace specializes in cyber range technology and has participated in numerous government-sponsored cybersecurity competitions and training programs.

The connection between CyberPeace and the Chinese military establishment adds credibility to the assessment that Expedition Cloud is not merely an academic exercise but a mission-oriented training tool supporting real operational planning.


Target Geography

The leaked documents specifically reference:

  • South China Sea direction — including nations like the Philippines, Vietnam, and Malaysia that have territorial disputes with China
  • Indochina direction — encompassing mainland Southeast Asian nations

The simulated targets focus on sectors that would cause maximum disruption during a conflict:

  • Power generation and distribution — Blackouts affecting civilian and military operations
  • Energy transmission — Oil and gas pipeline control systems
  • Transportation — Rail, aviation, and port management systems
  • Smart infrastructure — IoT-connected systems in urban environments

Strategic Context

This leak arrives amid escalating tensions in the South China Sea and increased Chinese military activity near Taiwan. It corroborates what intelligence agencies have warned about for years: China is systematically preparing for potential cyber operations against its neighbors' critical infrastructure.

The documents complement previous revelations about Chinese cyber operations, including:

  • Volt Typhoon — Chinese actors pre-positioning in US critical infrastructure (2023-2024)
  • Salt Typhoon — Targeting telecommunications providers across multiple countries (2024-2025)
  • UNC3886 — Compromising Southeast Asian telecom networks (2025-2026)

Expedition Cloud adds a new dimension: evidence of structured, repeatable training against specific national targets, suggesting these operations are not ad hoc but part of a systematic capability development program.


What This Means for Defenders

  1. Critical infrastructure operators in the Asia-Pacific region should assume they are active targets and review their security postures accordingly
  2. Network segmentation between OT and IT environments is critical — the leaked targets specifically reference operational technology systems
  3. Threat intelligence sharing between affected nations needs to accelerate
  4. The offensive-only nature of the training suggests China's cyber doctrine prioritizes first-strike capabilities over resilience

Related Reading

  • Google Disrupts Massive Chinese Espionage Campaign
  • China-Linked UNC3886 Breaches All Four Singapore Telecom
  • All Four Major Nation-State Adversaries Now Weaponizing
#China#APT#Cyber Range#Critical Infrastructure#Espionage#South China Sea#CyberPeace

Related Articles

Google Disrupts Massive Chinese Espionage Campaign

Google's Threat Intelligence Group dismantles UNC2814, a China-linked operation that deployed a novel backdoor called GRIDTIDE abusing Google Sheets API...

3 min read

All Four Major Nation-State Adversaries Now Weaponizing

Google reports that APT groups from China, Russia, Iran, and North Korea are all actively using Gemini AI for cyber operations including target...

3 min read

China-Linked UNC3886 Breaches All Four Singapore Telecom

Singapore discloses that APT group UNC3886 compromised all four major telecom providers using zero-day exploits and rootkits, triggering the nation's...

3 min read
Back to all News