China says it has foiled a series U.S. cyberattacks on its critical infrastructure — Ministry of State Security says it has 'irrefutable evidence' NSA tried to cause 'international time chaos'
The accusation comes after the US NSA was reportedly caught infiltrating the organization that runs high-precision timing services in Beijing.
China’s Ministry of State Security (MSS) has taken to social media to boast about foiling a series of cyberattacks it says were directed by the U.S. National Security Agency (NSA) (machine translation). Moreover, the MSS claims to have “irrefutable evidence” to back up its allegations.
According to the MSS WeChat post, the target of the NSA’s sustained series of attacks, dating back to 2022, was China’s National Time Service Center (NTSC).
A casual observer might wonder why a U.S. agency would be interested in causing “international time chaos” by hacking a center that is responsible for the safe and stable operation of Beijing time. But there are many important communications, infrastructure services, and others that rely on high-precision timing services.
The WeChat post from the MSS claims a diverse set of industries, including national communications, finance, electric power, transportation, surveying and mapping, national defense, and other industries, could be thrown into chaos due to NTSC disruption. Not only that, but it goes on to assert that actual harm and losses could occur due to malfunctions like transportation paralysis, aerospace launch failures, and others, caused by computer hacking.
42 cyber weapons
The central allegation made by China’s MSS was that the NSA used 42 different cyber weapons between 2022 and 2024 in order to disrupt the NTSC.
Specific tactics of the U.S. hackers supposedly included:
- Using SMS vulnerabilities to hack and control many of the ‘foreign’ smartphones used by NTSC staffers
- Using stolen logins to infiltrate the NTSC computer systems
- Deploying a new cyber warfare platform on the NTSC computers
- Using “42 special cyberattack weapons”
- Attacking NTSC network capabilities
- Attempting to disrupt China’s high-precision time systems
U.S. ally “springboards”
Elsewhere in the lengthy MSS post, we see it alleged that the U.S. craftily launched most of its attacks “from late night to early morning Beijing time.” The NSA would also use VPNs and countries like “the Philippines, Japan, and Taiwan,” as well as places in Europe, as attack “springboards,” the post claims.
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.
To conclude, the MSS laments China’s reputation for being a cyber-threat, while “the United States has pushed cyber hegemony and repeatedly trampled on international cyberspace rules.” However, the “ironclad facts” that “prove that the United States is the real ‘Matrix’ and the biggest source of chaos in cyberspace” were not shared. The two are no strangers to reports of cyber warfare. Earlier this year, Chinese hackers allegedly infiltrated the US Treasury Secretary's PC.
Follow Tom's Hardware on Google News, or add us as a preferred source, to get our latest news, analysis, & reviews in your feeds.

Mark Tyson is a news editor at Tom's Hardware. He enjoys covering the full breadth of PC tech; from business and semiconductor design to products approaching the edge of reason.
-
coolitic Not saying the US doesn't engage in such things in any capacity, but, sans any actual evidence, this just seems to be a typical tactic in the "subversion" playbook that Yuri Bezmenov taught about decades ago: if you can't effectively lie to make yourself appear better than your enemies, the next best thing is to muddy the waters to at least appear as a comparable alternative.Reply -
heffeque Just a reminder that the US was caught spying on European politicians (and nothing happened).Reply
Not sure if Yuri's playbook is at play here, especially with the current US president's obsession with China. -
SomeoneElse23 I would think that every country with the know how is likely at least testing the defenses of every other country out there.Reply -
shady28 Replycoolitic said:Not saying the US doesn't engage in such things in any capacity, but, sans any actual evidence, this just seems to be a typical tactic in the "subversion" playbook that Yuri Bezmenov taught about decades ago: if you can't effectively lie to make yourself appear better than your enemies, the next best thing is to muddy the waters to at least appear as a comparable alternative.
I find it odd that they would suddenly blame the US for a cyber attack, a very rare assertion, on the same day major US cloud infrastructure was down (AWS).
Seems like a not very well thought out version of "Accuse your enemy of that which you are guilty". -
zsydeepsky Why would anyone think this isn't real?Reply
Like... people already forgot the exploding pagers? That was only a year ago. -
bit_user Reply
Yup. Messing with upstream NTP clocks will indeed break a lot of stuff. The assumption of reliable time is baked into a lot of cloud software and services. Moving time backwards or even messing with the rate will cause havoc, not to mention getting some systems out of sync with each other.The article said:A casual observer might wonder why a U.S. agency would be interested in causing “international time chaos” by hacking a center that is responsible for the safe and stable operation of Beijing time. But there are many important communications, infrastructure services, and others that rely on high-precision timing services. -
bit_user Reply
Spying is one thing - and it's something pretty much all countries do, to one extent or another. That's very different from (alleged) cyber attacks, which can do real damage and can cause real harms.heffeque said:Just a reminder that the US was caught spying ... -
Shiznizzle Reply
Whether Merkels' phone being tapped by the US during sensitive economic negotiations had anything to do with the sudden open source linux uptake in schleswig holstein, is debatableheffeque said:Just a reminder that the US was caught spying on European politicians (and nothing happened).
Not sure if Yuri's playbook is at play here, especially with the current US president's obsession with China.
The uptake could be attributed to the need to save money. Or to kill two birds with one stone. Get rid of the microsoft and their licenses and reduce the chance of further "issues" down the line.
Either way, i would not go as far as saying that the tapping of her phone resulted in nothing being done. The germans do not "do nothing". Trust me. I am one. A german that is.
My guess is that heads rolled at the bundesnachrichtendienst and some new directives were put in place. -
urn66 OMG, I think this story sets a record for the number of "scare quotes" used. Give it a break, please, your bias is showing and that brings your journalistic credibility into question.Reply
Anyone doubting the US hacks other countries friends or foes, needs to do a bit of research on NSA TAO (Tailored Access Operations) that hoards Zero Day vulnerabilities and exists soely to perform APT attacks, which the NSA has bragged are the best hackers on the planet.
NSA TAO
This is not the first time China has exposed US hacks, nor will it be the last. The objective of this hack is actually quite sophisticated and can be considered a cyber attack on infrastructure, which is probably why they disclosed it.
The people suggesting this was released to coincide with the AWS crash are speculating and just got egg on their faces since AWS stated is was caused by a bug in their DNS Network Health Monitor :ROFLMAO:
What caused Amazon’s AWS outage?
Calm-down, AWS has this under control. -
heffeque Reply
The US also said that they'd do whatever necessary to end Nord Stream 2, and that was in European soil.bit_user said:Spying is one thing - and it's something pretty much all countries do, to one extent or another. That's very different from (alleged) cyber attacks, which can do real damage and can cause real harms.
German industry has been lagging since then (since they no longer have access to cheap energy).