Newsflash:

China Accuses the United States of Long-running Cyber Breach at the National Time Centre

Beijing says NSA infiltrated the National Time Service Center from 2022, risking networks for communications, finance, and power.

2 min read

Source-Fox News

Source-Fox News

October 19, 2025

BEIJING, Oct 19: China’s Ministry of State Security has publicly accused the United States of carrying out a sustained cyber operation against the National Time Service Center that began in 2022 and continued through 2024. The ministry said investigators traced stolen credentials and evidence back to activities it attributes to the U.S. National Security Agency and warned that the intrusion could have threatened communications networks, financial systems, power supplies, and the integrity of timekeeping itself.

Chinese officials said the campaign exploited a vulnerability in the messaging service of a foreign smartphone brand in 2022 to access staff mobile devices and later moved to attacks on internal networks and high-precision ground-based timing systems in 2023 and 2024. The ministry alleged that sophisticated tooling and virtual private server infrastructure spanning multiple regions were used in the operation. China has not published the underlying technical indicators in full but said its probe yielded identifiable leads.

Beijing framed the incursions as part of a broader pattern of hostile cyber activity by U.S intelligence agencies that targets strategic civilian research and infrastructure. Chinese state media and official channels warned that if timing systems had been disrupted, the effects could cascade to stock exchanges, communications satellites, electricity grids, and other time-sensitive systems that rely on accurate national time. The ministry said it would strengthen domestic protections and called on the international community to condemn what it described as aggressive cyber behaviour.

Independent reporting by global outlets has summarised the allegations and noted that Washington has not publicly responded as of this report. Media accounts add that China described the tools and methods used as complex and previously observed in other operations. Journalists also emphasise that public disclosure by Beijing marks a notable escalation in the public cyber dispute between the two powers and could spur further diplomatic and technical exchanges.

Cybersecurity experts say timing infrastructure is an attractive target because precise time is foundational to modern digital systems, including financial transaction ordering, secure communications, and power grid synchronization. Any verified interference with national timekeeping would therefore be serious. At the same time, attribution in cyber operations is technically and politically complex, which is why independent verification and sharing of technical indicators matter for international responses.

Analysts will watch for three developments in the coming days: first, whether China provides detailed technical indicators that can be independently validated by trusted international cyber centres. Second, whether the United States issues a formal denial, confirmation, or technical rebuttal. Third, whether the allegation prompts multilateral dialogue or sanctions related to cyber norms and critical infrastructure protection. The episode underscores how cyber operations have become an integral element of strategic competition and of concern to both national security and civilian sectors.

Related Articles

China’s Afghanistan policy faces a crisis; Taliban security failures threaten BRI and demand immediate, strong economic enforcement.
UN Security Council meeting on Afghanistan to review political, humanitarian and security issues, including Sinirlioglu’s latest report.
Indonesia President visit to Pakistan on Dec 8–9 to mark 75 years of ties, with talks on trade, defence, investment and new cooperation MoUs.
Pakistan rejects Indian minister’s remarks as inflammatory, calling them baseless propaganda and defending the professionalism of its armed forces.

Post a comment

Leave a Reply

Your email address will not be published. Required fields are marked *