China venture capital funds tap global investors for US$2 billion in comeback
At least six of the country's most prominent VC firms are creating new US dollar-denominated funds, designed to allow overseas investors to pool bets on Chinese companies. LightSpeed China Partners, known for backing Meituan and PDD Holdings in their early days, is targeting at least US$400 million for a fund focusing on deep tech, according to people familiar with the matter.
Monolith Management, which backs DeepSeek-rival MoonShot AI, is looking to start a second fund of at least US$265 million, according to people familiar, who asked not to be named because the matter is private. Pop Mart International Group-backer BA Capital is raising another US$150 million, the people said. Ince Capital, co-founded by former Qiming managing partner JP Gan, is seeking US$200 million, the people said. They join Qiming Venture Capital, which began raising an US$800 million fund earlier this year, Bloomberg News has reported.
Together, they represent a wave of fundraising that has not been seen among Chinese VCs for years. It's unfolding as global investors reassess the country's startup landscape and broader economy, which are showing signs of revival after years of Covid-era stagnation and regulatory headwinds.
Much of that resurgent interest can be traced to the rise of breakout AI stars like DeepSeek and Manus, which has galvanised local entrepreneurs. At the same time, brands such as Laopu Gold and Pop Mart – maker of the wildly popular Labubu collectibles – are winning both consumers and financiers.
The pace of fundraising remains a far cry from the industry's peak, before China's 2020 Internet sector crackdown. Investors remain wary about the long-term outlook of the country, while US endowments have retreated due to troubles at home and concerns about geopolitical tensions with China, the people said. Washington remains extremely sensitive in particular to sectors like semiconductors and AI.
BT in your inbox
Start and end each day with the latest news stories and analyses delivered straight to your inbox.
Sign Up
Sign Up
The fundraising plans are preliminary and subject to change, the people said. Representatives for LightSpeed China, Monolith, BA Capital and Ince did not provide comment on their fundraising.
In public markets, Hong Kong has emerged as one of the world's busiest listing destinations this year, hosting US$33 billion worth of share sales from bubble tea chains and toy brands to electric vehicle suppliers. Candidates waiting in the wings include some of China's hottest large-language model makers and fashion giant Shein.
That IPO surge is mirrored to some extent in private markets. Global sovereign wealth investors managing US$27 trillion in assets are increasingly bullish on China's tech sector because they do not want to miss out on the next waves of innovation, according to an annual survey by Invesco Asset Management. And more US investors including Benchmark and Capital Group have made exploratory trips to China in 2025.
LightSpeed China, founded by James Mi, a former deals chief for Google's Asia operation, is one of several high-profile venture firms that helped seed China's modern tech industry.
Monolith, co-founded by Tim Wang and HSG (Sequoia China) alum Cao Xi, has attracted enough interest to likely meet or surpass their target, the people said. The firm is deliberating a final target size. It closed a debut US-dollar fund at US$264 million in 2023, according to trade publication AVCJ. Cao is known for his early bets on Kuaishou Technology, Douyu International Holdings and Tencent Music.
Other Chinese venture outfits considering raising funds this year include Xiaomi co-founder Lei Jun's Shunwei Capital, the people said. It's not immediately clear how much they may target. Source Code Capital, among the earliest backers of TikTok owner ByteDance, has also been seeking about US$150 million, people familiar said in February.
Representatives for Shunwei did not provide comment on their fundraising. BLOOMBERG
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

Straits Times
3 minutes ago
- Straits Times
Spain confirms using Huawei to store judicial wiretaps, denies security risk
Spain said it only relies on Huawei Technologies to operate part of its wiretapping system, and dismissed any security risks. MADRID – Spain said it only relies on Huawei Technologies to operate part of its wiretapping system, and dismissed any security risks. Huawei storage within the so-called Sitel judicial wiretapping system 'represents a minor part of a watertight, audited, isolated and certified system in compliance with the national high-level security scheme,' a government official said in a statement on July 18 in response to questions from Bloomberg News. The comments follow recent media reports saying that the government uses Huawei technology to help operate Sitel. The reports led US Senator Tom Cotton and Representative Rick Crawford to write to Director of National Intelligence Tulsi Gabbard earlier this week to request that Washington pull back on sharing intelligence with Spain. Even though Spain has moved away from Huawei as a 5G network vendor, the country's reliance on the company for a key intelligence function creates a gaping security concern for the the US and its allies, Mr Cotton wrote. In July 18's statement, Spain's government said its intelligence agency CNI is not included in the Huawei contract and that Huawei equipment is not used for any classified information. Sitel is used by security forces that report to the interior affairs ministry. 'The Sitel system is completely isolated from any external environment and continuously monitored by a dedicated cybersecurity team with capabilities in traffic analysis, network management and perimeter security capabilities, supported by cybersecurity personnel' from the security forces, the government said. 'The integration of Huawei-branded storage into Sitel has therefore not posed any risk to the system's security.' European countries are increasingly moving to exclude Huawei and other telecom vendors with ties to hostile governments from their networks. Germany, Portugal, the UK, Sweden and France have already taken steps to block equipment seen as a security risk based on its country of origin. Equipment made by Huawei and other Chinese vendors has also been blacklisted in the US. BLOOMBERG


New Paper
4 hours ago
- New Paper
What is UNC3886? Inside the state-linked group attacking S'pore's critical information infrastructure
Singapore's critical information infrastructure has come under attack from cyber espionage group UNC3886. A state-linked advanced persistent threat (APT) actor, it is a menace to national security in many countries, including Singapore. Naming the nation's attacker for the first time on July 18, Coordinating Minister for National Security K. Shanmugam said: "UNC3886 poses a serious threat to us, and has the potential to undermine our national security. Even as we speak, UNC3886 is attacking our critical infrastructure right now." What is UNC3886? Are essential services in Singapore safe from the attack? The Straits Times answers questions about the attack and APTs. 1. Who is UNC3886? First detected in 2022 by cyber security firm Mandiant, UNC3886 is a China-linked cyber espionage group. UNC3886's attempts are known to be persistent, with the intention of intelligence gathering and long-term spying. The "UNC" label stands for "uncategorised" or "unclassified" as industry analysts have not formally classified it. "This does not mean that it is any less of a threat," said Mr Shanmugam. 2. How does UNC3886 operate? Mr Vivek Chudgar, managing director of cyber security firm Mandiant Consulting in Asia Pacific and Japan, described UNC3886 as highly adept. "UNC3886 operates in a sophisticated, cautious and evasive nature," he said, adding that the group largely focuses on defence, technology and telecommunication organisations in the US and Asia. The Chinese espionage group is known to target network devices, virtualisation systems and critical information infrastructure with zero-day exploits. Zero-day exploits are attacks that take advantage of security vulnerabilities in software that vendors have yet to develop patches for. Unpatched vulnerabilities in the software of network devices, hypervisors, and virtual machines are typically harder to monitor, said Mr Chudgar. UNC3886 also employs custom malware and tools available on the victim's system to evade detection. Like other APT attackers, UNC3886 is persistent in that even if detected and removed from the network, it will attempt to re-enter the target networks. 3. What cyber attacks has UNC3886 been responsible for? Mr Chudgar said UNC3886 has attacked organisations in the United States, Europe, and parts of Asia. Specifically, it has targeted sectors such as government, telecommunication, technology, aerospace, defense, energy and utility. "UNC3886 poses a severe threat to national security for the organisations and the countries targeted," he added. The Chinese espionage group has exploited vulnerabilities in routers from Juniper Networks, network security devices from Fortinet and virtual machines from VMware. 4. Are essential services in Singapore safe from the attack? On July 18, the Cyber Security Agency said that UNC3886's activities have been detected in parts of Singapore's critical information infrastructure that power essential services. "We have been investigating UNC3886's activities," said CSA, which is leading the investigations. The agency said it is monitoring all critical services sectors and sharing threat intelligence, but did not name the affected sectors. Singapore's 11 critical services sectors are: energy, water, finance, healthcare, transport, government, infocomm, media as well as security and emergency services. The agency is also working closely with other government bodies and partners to support the unnamed affected organisations. CSA also did not say how long UNC3886 has been in the affected networks, saying instead: "These attacks are often protracted campaigns and CSA will need to preserve operational security by not disclosing further information at this stage." 5. What other APT attacks have hit Singapore? In 2014, the authorities detected a security breach in the Ministry of Foreign Affairs' technology systems. Steps were taken to isolate the affected devices and the networks were strengthened following the discovery. In what was the first sophisticated attack against universities here, National University of Singapore and the Nanyang Technological University discovered intrusions in their networks in 2017. No classified data or student personal data was stolen. But the attackers were believed to have targeted the two institutions to steal government and research data. The varsities were involved in government-linked projects for the defence, foreign affairs and transport sectors. Then in 2018, Singapore experienced its worst data breach involving the personal particulars of 1.5 million patients, including then Prime Minister Lee Hsien Loong. The attacker in the SingHealth breach was said to be persistent in its efforts to penetrate the network, bypass the security measures and illegally access and exfiltrate data. The attacker is believed to have lurked in the healthcare group's network for at least nine months. Its mission: to access SingHealth's electronic medical records system, a critical information infrastructure in Singapore. The unauthorised transfer of sensitive data took place in 2018. Most recently in 2024, about 2,700 devices in Singapore were discovered to have been infected after CSA took part in a cyber operation against a global botnet. APT hackers behind the botnet exploited poor cyber hygiene practices to infect devices, including baby monitors and internet routers. No critical information infrastructure was affected by the attack.


CNA
5 hours ago
- CNA
India braces for further US tariffs over trade ties with Russia
US President Donald Trump earlier this week issued a 50-day ultimatum to Russia, warning of more tariffs if a peace deal with Ukraine is not secured by then. That threat is also targeting Moscow's trade partners, including countries like India. At stake for the South Asian country -- half its oil imports and a third of its defence supply. Ishan Garg reports from New Delhi.