HomeLatest NewsCyber SecurityBeijing alleges US hacked China’s National Time Service Centre in long-term cyber campaign

Beijing alleges US hacked China’s National Time Service Centre in long-term cyber campaign

Beijing has alleged that the US National Security Agency carried out long-term cyberattacks on China’s National Time Service Centre, stealing sensitive data.

Preferred Source of Google

‘s Ministry of State Security has accused the United States of launching cyberattacks on the country’s National Time Service Centre, a key facility responsible for maintaining and distributing the nation’s standard time.

In a statement released on social media, the ministry alleged that the attacks were carried out by the US National Security Agency (NSA) and described them as “long-term, highly covert and employing state-level cyberespionage tools.”

The National Time Service Centre, located in Xi’an, Shaanxi province, operates under the Academy of Sciences and provides precise timing services for critical sectors such as telecommunications, finance, energy, transportation, mapping and defence.

Advertisement
Saksham Bharat 2026
Saksham Bharat 2026
A multi-stakeholder dialogue on skilling gap in Cybersecurity, Data Resilience and AI — and the roadmap to a Saksham Bharat.
Register Now →
VeeamON 2026 Tour India - Mumbai
VeeamON 2026 Tour India - Mumbai
A VeeamON 2026 India Leadership Series Mumbai for senior public sector and government technology leaders.
Register Now →
Cyber Surakshit Uttar Pradesh
Cyber Surakshit Uttar Pradesh
Find out strategies, frameworks and solutions for building a resilient and secure digital ecosystem across Uttar Pradesh.
Register Now →
VeeamON 2026 Tour India - Bengaluru
VeeamON 2026 Tour India - Bengaluru
A VeeamON 2026 India Leadership Series Bengaluru for senior public sector and government technology leaders.
Register Now →
VeeamON 2026 Tour India - Delhi
VeeamON 2026 Tour India - Delhi
A VeeamON 2026 India Leadership Series Delhi for senior public sector and government technology leaders.
Register Now →
Infosec Reimagined
Infosec Reimagined
Infosec Reimagined 2026 is the premier information security summit where top leaders—CISOs, CROs, CIOs, CTOs and risk executives—converge to redefine cyber resilience.
Register Now →
Digital Senate
Digital Senate
Digital Senate is a premier conference uniting government leaders, technologists and innovators to share ideas, success stories and strategies on digital governance, public sector transformation, cybersecurity and emerging technologies in India.
Register Now →
CIO Prism
CIO Prism
CIO Prism unites forward-thinking technology leaders to exchange transformative insights, shape digital strategies, and foster innovation, empowering enterprises to excel in an era of rapid technological change.
Register Now →

The ministry said the alleged US cyber operations risked disrupting the “orderly functioning of society” by targeting such infrastructure.

China claims attacks spanned over two years

According to the ministry, the cyberattacks began in March 2022, when the NSA allegedly exploited security vulnerabilities in foreign-brand mobile phones used by several staff members at the time centre, allowing access to sensitive internal data.

The statement further claimed that from April 2023, the NSA used stolen passwords to infiltrate the centre’s network systems and conduct surveillance.

Advertisement

Between August 2023 and June 2024, the attacks reportedly intensified, with the US agency deploying a new cyberwarfare platform equipped with 42 specialised tools to penetrate internal networks and attempt to access China’s high-precision ground-based timing systems.

Chinese authorities said the attacks primarily occurred during late-night hours time and were routed through virtual servers in the United States, Europe and Asia to mask their origin. Strong methods were reportedly used to conceal the cyber activities.

Beijing says countermeasures were taken

The ministry said state security agencies had collected evidence of the attacks and guided the National Time Service Centre to isolate affected systems, remove malicious code and strengthen defences against future breaches.

Advertisement

Wei Dong, a senior official at the time centre, told state broadcaster CCTV that timing accuracy is crucial for maintaining stable operations in key national systems.

Even a millisecond error, he said, could cause blackouts in power networks, while microsecond or nanosecond discrepancies could affect stock markets, navigation systems and internet services.

Li Jianhua, director of the National Engineering Laboratory for Information Content Analysis Technology at Shanghai Jiao Tong University, said the alleged operation matched patterns of an “advanced persistent threat” — a term used internationally to describe long-term, state-sponsored cyber intrusions.

He added that attackers often exploited so-called “zero-day vulnerabilities”, or previously unknown security flaws, allowing them to bypass detection and infiltrate critical networks.

Chinese officials said the incident underlined the growing risks of state-level cyber confrontation, particularly in sectors linked to national infrastructure, communication and defence.

Get the day's headlines from Tech Observer straight in your inbox

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
Tech Observer Desk
Tech Observer Desk
Tech Observer Desk at TechObserver.in is a team of technology reporters led by a senior editor who brings latest updates and developments from the world of technology.
- Advertisement -
Powered By Veeam Logo
- Advertisement -

Subscribe to our Newsletter

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
- Advertisement -

AI agents break legacy security models, Veeam CEO warns at VeeamON

Veeam Software CEO Anand Eswaran says zero-trust security models built for human users have broken down as autonomous AI agents move inside enterprises at machine speed, and that recovery, identity and data governance can no longer be treated as separate problems.

RELATED ARTICLES