May 14, 2026 06:01 am (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
Vijay-led TVK wins Tamil Nadu floor test as AIADMK split plays out | Congress veteran Sonia Gandhi admitted to Medanta Hospital in Gurugram | PM Modi halves convoy size after austerity call | Mulayam Singh's younger son Prateek Yadav dies at 38 | Protests erupt in Delhi after NEET UG 2026 cancellation over alleged paper leak | AIADMK cracks widen after Tamil Nadu defeat; faction backs Vijay-led TVK government | Himanta Biswa Sarma takes oath as Assam CM for second term after BJP’s landslide win | Bengali rights activist Garga Chatterjee arrested over alleged provocative remarks ahead of assembly polls | No return to full WFH yet: IT firms unlikely to change hybrid work model despite PM Modi’s appeal | Suvendu Adhikari Cabinet clears BSF land transfer, census rollout, Ayushman Bharat in Bengal
China
A Chinese flag. Photo: Unsplash

UK, allies expose China-based technology companies for enabling global cyber campaign against critical networks

| @indiablooms | Aug 29, 2025, at 07:17 pm

The UK and international allies recently publicly linked three technology companies based in China with a global malicious cyber campaign targeting critical networks.

In a new advisory published today, the National Cyber Security Centre (NCSC) – a part of GCHQ - and international partners from twelve other countries have shared technical details about how malicious cyber activities linked with these China-based commercial entities have targeted nationally significant organisations around the world.

Since at least 2021, this activity has targeted organisations in critical sectors including government, telecommunications, transportation, lodging, and military infrastructure globally, with a cluster of activity observed in the UK, read the  National Cyber Security Centre website.

The activities described in the advisory partially overlap with campaigns previously reported by the cybersecurity industry, most commonly under the name Salt Typhoon.

The data stolen through this activity can ultimately provide the Chinese intelligence services the capability to identify and track targets’ communications and movements worldwide.

The advisory describes how the threat actors have had considerable success taking advantage of known common vulnerabilities rather than relying on bespoke malware or zero-day vulnerabilities to carry out their activities, meaning attacks via these vectors could have been avoided with timely patching.

Organisations of national significance in the UK are encouraged to proactively hunt for malicious activity and implement mitigative actions, including ensuring that edge devices are not exposed to known vulnerabilities and implementing security updates.

NCSC Chief Executive Dr Richard Horne said, "We are deeply concerned by the irresponsible behaviour of the named commercial entities based in China that has enabled an unrestrained campaign of malicious cyber activities on a global scale."

The three China-based technology companies provide cyber-related services to the Chinese intelligence services and are part of a wider commercial ecosystem in China, which includes information security companies, data brokers and hackers for hire.

The named entities are: Sichuan Juxinhe Network Technology Co Ltd, Beijing Huanyu Tianqiong Information Technology Co, and Sichuan Zhixin Ruijie Network Technology Co Ltd.

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.