February 02, 2026 11:24 pm (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
After Budget mayhem, bulls return: Sensex, Nifty stage sharp recovery | Dalai Lama wins first Grammy at 90 | Firing outside Rohit Shetty’s Mumbai home: 4 arrested, Bishnoi Gang link emerges | Female suicide attackers emerge at centre of deadly BLA assaults that rocked Pakistan’s Balochistan | Delhi blast: Probe reveals doctors' module planned attacks on global coffee chain | Begging bowl: Pakistan PM says he feels “ashamed” seeking loans abroad | Epstein Files shocker! Zohran Mamdani’s mother Mira Nair mentioned in latest tranche | Bill Gates contracted STD after sex with Russian women? Epstein Files make explosive, unverified claims | Big setback for Modi govt: Supreme Court stays controversial UGC Equity Regulations 2026 amid student protests | ‘Mother of all deals’: PM Modi says India–EU FTA is for 'ambitious India'
China
A Chinese flag. Photo: Unsplash

UK, allies expose China-based technology companies for enabling global cyber campaign against critical networks

| @indiablooms | Aug 29, 2025, at 07:17 pm

The UK and international allies recently publicly linked three technology companies based in China with a global malicious cyber campaign targeting critical networks.

In a new advisory published today, the National Cyber Security Centre (NCSC) – a part of GCHQ - and international partners from twelve other countries have shared technical details about how malicious cyber activities linked with these China-based commercial entities have targeted nationally significant organisations around the world.

Since at least 2021, this activity has targeted organisations in critical sectors including government, telecommunications, transportation, lodging, and military infrastructure globally, with a cluster of activity observed in the UK, read the  National Cyber Security Centre website.

The activities described in the advisory partially overlap with campaigns previously reported by the cybersecurity industry, most commonly under the name Salt Typhoon.

The data stolen through this activity can ultimately provide the Chinese intelligence services the capability to identify and track targets’ communications and movements worldwide.

The advisory describes how the threat actors have had considerable success taking advantage of known common vulnerabilities rather than relying on bespoke malware or zero-day vulnerabilities to carry out their activities, meaning attacks via these vectors could have been avoided with timely patching.

Organisations of national significance in the UK are encouraged to proactively hunt for malicious activity and implement mitigative actions, including ensuring that edge devices are not exposed to known vulnerabilities and implementing security updates.

NCSC Chief Executive Dr Richard Horne said, "We are deeply concerned by the irresponsible behaviour of the named commercial entities based in China that has enabled an unrestrained campaign of malicious cyber activities on a global scale."

The three China-based technology companies provide cyber-related services to the Chinese intelligence services and are part of a wider commercial ecosystem in China, which includes information security companies, data brokers and hackers for hire.

The named entities are: Sichuan Juxinhe Network Technology Co Ltd, Beijing Huanyu Tianqiong Information Technology Co, and Sichuan Zhixin Ruijie Network Technology Co Ltd.

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.