A threat actor has claimed responsibility for a significant data breach at Huawei Technologies, a multinational technology corporation based in China.
The actor is reportedly attempting to sell what they allege is the company’s internal source code and development tools on a dark web forum.
The post, which appeared in early October 2025, asserts that the breach resulted in the exfiltration of sensitive intellectual property.
According to the threat actor’s post, the compromised data includes a wide range of internal assets. The actor specifically listed source code, development tools, build files, scripts, and technical manuals as being part of the stolen data package.
An image of the forum post shows the actor asking for $1,000, with the price open to negotiation, and communication restricted to the Session messaging platform.
The incident has drawn attention from cybersecurity intelligence groups that monitor dark web activities. This alleged incident adds to a long history of security scrutiny and espionage accusations leveled against Huawei.
For years, the U.S. government and other Western nations have raised concerns that the Chinese government could use Huawei’s equipment for espionage.
These concerns date back to at least 2012, when a U.S. House Intelligence Committee report warned that using Huawei’s technology could undermine U.S. national security interests.
The company has also faced multiple allegations of intellectual property theft from competitors. Past security incidents have kept Huawei under a microscope.
In 2019, reports emerged that Vodafone Italy had discovered hidden backdoors in Huawei equipment between 2009 and 2012, which could have granted unauthorized access to the carrier’s network.
While Huawei described the backdoors as “technical mistakes” that were later fixed, the findings damaged the company’s reputation.
More recently, in July 2025, a nationwide telecom outage in Luxembourg was reportedly linked to a cyberattack targeting Huawei routers, prompting a government investigation. The company has also been the target of state-sponsored hacking, with reports confirming that the U.S.
National Security Agency (NSA) infiltrated Huawei’s servers in 2009 to find links to the Chinese military and steal source code. The full impact and authenticity of this latest claimed breach are still under investigation.
If validated, the exposure of Huawei’s source code and internal tools could have far-reaching consequences, potentially exposing new vulnerabilities in its products and providing malicious actors with the means to compromise the company’s extensive global infrastructure.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
A 13-year-old critical remote code execution (RCE) vulnerability in Redis, dubbed RediShell, allows attackers to…
Paris, France, October 6th, 2025, CyberNewsWire Reemo continues its mission to secure enterprise remote access…
Doctors Imaging Group, a healthcare provider based in Florida, has reported a significant data breach…
Forensic-Timeliner, a Windows forensic tool for DFIR investigators, has released version 2.2, which offers enhanced…
NCSC has issued an urgent warning regarding a critical zero-day flaw in Oracle E-Business Suite…
A critical security vulnerability has been discovered in Zabbix Agent and Agent 2 for Windows…