Was this helpful?
Thumbs UP Thumbs Down

China says the US NSA conducted cyberattacks on its national time center

Flag of China
China flag

Your phone’s clock is a target

Imagine the clock on your phone or computer suddenly glitching. China’s Ministry of State Security has publicly accused the U.S. National Security Agency of carrying out cyber intrusions against the country’s National Time Service Center.

This isn’t just about clocks. China says it was an alleged attack on systems that synchronize modern life, from financial markets to power grids, which rely on precise time signals for safe operation.

Flag of China

Inside China’s master clock

China’s National Time Service Center maintains Beijing Time using high-precision timing equipment. Beyond civil timekeeping, the centre supports synchronization for communications, transportation, and financial systems that depend on traceable, accurate timestamps.

Its high-precision ground-based timing system is a crucial national asset. Any disruption here could send ripple effects through countless services that millions of people rely on every single day.

A hacker using his laptop

The hacking claims unfold

China’s Ministry of State Security (MSS) announced it had detected what it described as a long-term, covert cyber campaign it blamed on the U.S. National Security Agency (NSA).

The MSS said it had ‘irrefutable evidence,’ but it has not publicly released technical artefacts such as malware samples or server logs that would allow independent researchers to verify the claim.

Data breach concept

A patient digital invasion

According to the MSS, the campaign began in March 2022 and started with an exploit of a vulnerability in the messaging service of an overseas mobile phone brand, authorities say.

This initial breach targeted the devices of the center’s staff, aiming to steal their sensitive login credentials and gather intelligence over a long period.

New message receive on phone

Stealing the keys

The hackers’ initial focus was on stealing employee credentials. By compromising staff mobile phones through a messaging service flaw, they reportedly gained access to usernames and passwords.

Chinese authorities say the stolen credentials were later reused to access the centre’s internal computer systems, allowing deeper intrusion into its networks. This method of using personal devices as a gateway into secured systems is a common espionage tactic.

Software running in laptop

An arsenal of cyber weapons

The MSS said the operation later escalated and involved a toolset it described as 42 ‘specialized cyberattack weapons,’ which Chinese reporting says were used to probe and evade detection across multiple systems.

Such a diverse arsenal suggests a highly capable actor seeking to find any possible weakness in the time center’s digital defenses over a sustained period.

Flaws concept

The mobile phone weak spot

The entry point for the entire operation was reportedly a hidden flaw in a foreign mobile phone brand. Authorities did not name the specific brand, but the vulnerability existed within its text messaging service.

According to the MSS, the messaging flaw allowed attackers to take covert control of some staff phones, turning them into conduits for exfiltrating credentials and other sensitive data.

Man using GPS map navigation on smartphone.

Targeting the backup system

A primary goal was to infiltrate the high-precision ground-based timing system. This system acts as a vital backup to satellite-based GPS, providing an independent and ultra-accurate time signal.

If a national backup timing system were compromised, attackers could theoretically introduce subtle timing errors that would be hard to detect, potentially affecting network logs, transaction timestamps and other systems that rely on precise time.

Power grid

Why a clock matters so much

Disrupting a national time signal can cause widespread chaos. Financial markets depend on precise timestamps for millions of transactions, and even a tiny error could create billions in losses.

Power grids, digital communications, and air traffic control systems all rely on perfect synchronization to function safely and efficiently, showing why this was such a sensitive target.

Selective focus of USA flags

The American stance

U.S. officials declined to directly confirm the allegations. The NSA said it does not comment on specific operations.

Meanwhile, the US Embassy in Beijing has repeatedly called China the most “active and persistent cyber threat,” effectively turning the accusation back on Beijing without addressing the time center claims.

Shaking hands in front of USA and China flags

A familiar digital dance

This incident is part of a long-running pattern of mutual accusations. The US and China frequently trade charges of cyber espionage and digital attacks, with each portraying the other as the primary aggressor.

This tit-for-tat has become a standard feature of their complex geopolitical relationship, making independent verification of any single claim particularly difficult.

Water on a blurred green background

Critical systems in the crosshairs

Targeting a time service marks a significant shift toward attacking fundamental, behind-the-scenes infrastructure. It shows that in modern rivalries, systems like power, water, and communications are now considered digital battlefields.

This escalation raises the stakes for every nation, as the disruption of these services could impact civilians directly during peacetime.

China's flag on pole

The evidence question

Although the MSS said it had strong evidence, it has not provided raw technical proof for independent international scrutiny; that gap is common in state-level cyber accusations and makes independent verification difficult.

Without shared data like malware samples or server logs, the global community often cannot verify who is truly responsible, leaving these claims in the realm of political messaging.

Asian colleagues software developers team sitting at desk

Guarding the digital frontier

Chinese authorities claim their cyber defenders successfully detected and halted the attacks. They report having fortified the time center’s digital defenses, patching vulnerabilities and severing the attackers’ access.

This incident highlights the constant, silent battle happening as security teams work to protect essential services from sophisticated, state-level threats.

A document that says "Secret".

A hidden war escalates

This story reveals a sliver of the vast, hidden conflict raging in cyberspace. Nations are constantly probing each other’s digital defenses, seeking strategic advantages.

These operations are designed to remain secret, only becoming public when one side decides disclosure serves its political or security interests, as appears to be the case here.

Earth minerals

Timing amid trade fights

The accusations emerged alongside renewed trade tensions, including new controls on rare earth minerals. Using cyber allegations can be a political tool to apply pressure during other diplomatic disputes.

This timing suggests a possible link, using the digital realm to gain leverage in unrelated economic negotiations between the two superpowers.

This digital standoff is part of a broader tech war. See how it’s playing out in another major case, as China claims Nvidia broke antitrust law.

Security concept

Our shared vulnerability

This situation reminds us of our collective reliance on stable, accurate digital systems. While this incident involves government agencies, it underscores how everyone is vulnerable when critical infrastructure is targeted.

The security of these foundational systems is vital for maintaining our modern, interconnected way of life in an increasingly digital world.

Curious about how global security impacts AI? Find out if the U.S. is already falling behind China.

Where do you stand in this digital standoff? Let us know your perspective below, and if you found this insightful, don’t forget to like.

Read More From This Brand:

Don’t forget to follow us for more exclusive content right here on MSN.

If you liked this story, you’ll LOVE our FREE emails. Join today and be the first to get stories like this one.

This slideshow was made with AI assistance and human editing.

This content is exclusive for our subscribers.

Get instant FREE access to ALL of our articles.

Was this helpful?
Thumbs UP Thumbs Down
Prev Next
Share this post

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!

Send feedback to ComputerUser



    We appreciate you taking the time to share your feedback about this page with us.

    Whether it's praise for something good, or ideas to improve something that isn't quite right, we're excited to hear from you.