China Accuses NSA of Cyber Attack on National Time Service Center
On October 20, 2025, China leveled serious allegations against the U.S. National Security Agency (NSA), claiming it orchestrated a premeditated cyber attack targeting the National Time Service Center (NTSC). This assertion, shared through a WeChat post by the Ministry of State Security (MSS), labeled the U.S. a “hacker empire” and described it as the “greatest source of chaos in cyberspace.”
Details of the Allegation
The MSS maintains it has “irrefutable evidence” linking the NSA to the cyber intrusion that supposedly commenced on March 25, 2022. Fortunately, the attack was thwarted, preventing any potential fallout. Established in 1966 and operating under the Chinese Academy of Sciences, the NTSC plays a critical role in generating and transmitting the national standard time, known as Beijing Time.
Failure to protect these operations could have dire consequences. The MSS warned that a successful assault on NTSC facilities could disrupt network communications, destabilize financial systems, interrupt power supplies, paralyze transportation, and even interfere with space launches.
Thwarting U.S. Cyber Espionage
According to the MSS, the Chinese authorities successfully foiled U.S. attempts to extract sensitive information and sabotage critical infrastructure. They emphasized that the operation was pivotal in maintaining the integrity of “Beijing Time.”
The Ministry’s statement included details on how the NSA allegedly exploited vulnerabilities in a foreign brand’s SMS service, leading to unauthorized access to mobile devices of NTSC’s personnel. While the specific vulnerabilities were not disclosed, the MSS claimed that sensitive information was stolen during this breach.
Repeated Incursions
Following the initial incident, the MSS asserted that the NSA made subsequent attempts to infiltrate NTSC systems on April 18, 2023. They claimed that U.S. agents used stolen login credentials to access their computers, initiating further probes of NTSC’s infrastructure. Between August 2023 and June 2024, this campaign supposedly intensified with the deployment of a new “cyber warfare platform.”
This platform supposedly utilized 42 specialized tools engineered for high-intensity attacks against various internal network systems of NTSC. The focus of these attacks reportedly included strategies aimed at disrupting high-precision ground-based timing systems.
Sophisticated Attack Tactics
The MSS pointed out that these cyber attacks were carefully planned, executed during late-night hours to minimize detection. The attackers allegedly used virtual private servers (VPS) located in the U.S., Europe, and Asia to obscure the true origins of their malicious activities.
Notably, the MSS accused the hackers of using tactics such as forging digital certificates to bypass antivirus mechanisms. They claimed that sophisticated encryption algorithms were employed to completely erase traces of their activities, illustrating the advanced nature of the attacks.
Wider Cyber Operations and Exploits
In its commentary, the MSS described the U.S. as engaging in sustained cyber operations not only against China but also targeting regions across Southeast Asia, Europe, and South America. It was suggested that U.S. technological installations in the Philippines, Japan, and Taiwan facilitated these operations while obscuring American involvement.
In an interesting twist, the MSS also criticized the U.S. for purportedly perpetuating the “China cyber threat theory.” They accused the U.S. of pressuring other nations to elevate the narrative around alleged Chinese hacking incidents, thereby attempting to manipulate public perception and divert attention from its own actions.
Conclusion
As tensions continue to rise in the realm of cyber security, the claims made by the Chinese MSS serve as a reminder of the contentious nature of international cyber operations. With the NSA at the center of this latest dispute, it will be crucial to monitor how this situation evolves and what implications it may have for global cybersecurity strategies moving forward.