Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Automating Pen Tests: Key Lessons Learned

March 10, 2026

Hackers Target Employees via Microsoft Teams to Gain Remote Access

March 10, 2026

Hacker Exploits .arpa Domain to Bypass Phishing Defenses

March 10, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » China Blasts US Over Cyberattack on National Time Center
Cyber Updates

China Blasts US Over Cyberattack on National Time Center

Staff WriterBy Staff WriterOctober 19, 2025Updated:October 25, 2025No Comments3 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Top Highlights

  1. Accusation of Cyberattacks: China has accused the U.S. National Security Agency of cyberattacks on its national time center, claiming this could have disrupted critical infrastructure.

  2. Exploitation of Vulnerabilities: The Chinese Ministry of State Security alleges that the NSA exploited messaging service vulnerabilities to steal sensitive information in 2022.

  3. Advanced Cyberattack Tools: The NSA reportedly used 42 types of cyberattack tools to target the time center’s internal systems and attempted infiltration of crucial timing systems between 2023 and 2024.

  4. Rising Tensions: This accusation may escalate existing tensions between the U.S. and China, already strained due to issues in trade, technology, and Taiwan.

[gptA technology journalist, write a short news story divided in two subheadings, at 12th grade reading level about ‘China accuses US of cyberattack on national time center’in short sentences using transition words, in an informative and explanatory tone, from the perspective of an insightful Tech News Editor, ensure clarity, consistency, and accessibility. Use concise, factual language and avoid jargon that may confuse readers. Maintain a neutral yet engaging tone to provide balanced perspectives on practicality, possible widespread adoption, and contribution to the human journey. Avoid passive voice. The article should provide relatable insights based on the following information ‘

BEIJING (AP) — China on Sunday accused the U.S. National Security Agency of carrying out cyberattacks on its national time center following an investigation, saying any damage to related facilities could have disrupted network communications, financial systems and power supply.

The Ministry of State Security alleged in a WeChat post that the U.S. agency had exploited vulnerabilities in the messaging services of a foreign mobile phone brand to steal sensitive information from devices of the National Time Service Center’s staff in 2022. It did not specify the brand.

The U.S. agency also used 42 types of “special cyberattack weapons” to target the center’s multiple internal network systems and attempted to infiltrate a key timing system between 2023 and 2024, it said.

It said it had evidence but did not provide it in the post.

It said the time center is responsible for generating and distributing China’s standard time, in addition to providing timing services to industries such as communications, finance, power, transport and defense. It had provided guidance to the center to eliminate the risks.

“The U.S. is accusing others of what it does itself, repeatedly hyping up claims about Chinese cyber threats,” it said.

Western governments in recent years have alleged hackers linked to the Chinese government have targeted officials, journalists, corporations and others. The ministry’s statement could fuel tensions between Washington and Beijing, on top of trade, technology and Taiwan issues.

The U.S. Embassy did not immediately comment.

‘. Do not end the article by saying In Conclusion or In Summary. Do not include names or provide a placeholder of authors or source. Make Sure the subheadings are in between html tags of

[/gpt3]

Continue Your Tech Journey

Learn how the Internet of Things (IoT) is transforming everyday life.

Stay inspired by the vast knowledge available on Wikipedia.

Cybercrime-V1

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAI Soars, Budgets Shrink: The 2025 NASCIO Annual Story
Next Article TikTok Videos Fuel Surge in Infostealer Attacks
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

IronCircle Teams Up with Ohio State for Cutting-Edge AI Cybersecurity Training

March 9, 2026

Healthcare IT Elevated: Expanding Managed Solutions & Cybersecurity

March 8, 2026

Cyderes Launches New Bengaluru SOC to Strengthen Global Security

March 8, 2026

Comments are closed.

Latest Posts

Automating Pen Tests: Key Lessons Learned

March 10, 2026

Hackers Target Employees via Microsoft Teams to Gain Remote Access

March 10, 2026

Hacker Exploits .arpa Domain to Bypass Phishing Defenses

March 10, 2026

Vietnam Cybercrime Ring Fuels Massive Fake Account Signups

March 9, 2026
Don't Miss

IronCircle Teams Up with Ohio State for Cutting-Edge AI Cybersecurity Training

By Staff WriterMarch 9, 2026

Fast Facts IronCircle and Ohio State University have partnered to provide immersive, AI-driven cybersecurity training…

Healthcare IT Elevated: Expanding Managed Solutions & Cybersecurity

March 8, 2026

Cyderes Launches New Bengaluru SOC to Strengthen Global Security

March 8, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Automating Pen Tests: Key Lessons Learned
  • Hackers Target Employees via Microsoft Teams to Gain Remote Access
  • Hacker Exploits .arpa Domain to Bypass Phishing Defenses
  • IronCircle Teams Up with Ohio State for Cutting-Edge AI Cybersecurity Training
  • Attackers Spread Fake Claude Code Sites via InstallFix
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Automating Pen Tests: Key Lessons Learned

March 10, 2026

Hackers Target Employees via Microsoft Teams to Gain Remote Access

March 10, 2026

Hacker Exploits .arpa Domain to Bypass Phishing Defenses

March 10, 2026
Most Popular

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Absolute Launches GenAI Tools to Tackle Endpoint Risk

August 7, 202515 Views

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

July 8, 202511 Views

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.