A threat actor known as s1ic3r publicly leaked 175 MB of compressed documents, IC schematics, and proprietary intellectual property allegedly taken from Shanghai Fudan Microelectronics Group in April 2026. The exposed VLSI designs and internal documentation could enable reverse engineering, reveal hardware vulnerabilities in smart cards and security chips, and shed light on Chinaβs domestic semiconductor capabilities. #s1ic3r #FudanMicro
Keypoints
- s1ic3r leaked 175 MB (compressed) of alleged Shanghai Fudan Microelectronics documents and IP in April 2026.
- The compromised data set includes IC schematics, VLSI design data, and internal corporate documents.
- Leaked schematics can allow competitors or adversaries to reverse-engineer proprietary chip designs.
- Exposed designs may reveal hardware vulnerabilities affecting smart cards, security chips, RFID, and microcontrollers.
- The leak is publicly available on the open web and is rated as a critical data breach for a major Chinese semiconductor firm.
DarkWebInformer.com Providing intel from some of the darkest places on the Dark Web & Clearnet. Breaches, Darknet Markets, Ransomware, Threat Alerts, & more!