{"id":378150,"date":"2025-08-27T17:16:10","date_gmt":"2025-08-27T17:16:10","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/378150\/"},"modified":"2025-08-27T17:16:10","modified_gmt":"2025-08-27T17:16:10","slug":"uk-us-and-allies-call-out-chinese-tech-firms-for-aiding-global-cyber-attacks-politico","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/378150\/","title":{"rendered":"UK, US and allies call out Chinese tech firms for aiding global cyber attacks \u2013 POLITICO"},"content":{"rendered":"<p>Salt Typhoon\u2019s activities have previously been <a href=\"https:\/\/www.rusi.org\/explore-our-research\/publications\/commentary\/typhoons-cyberspace\" target=\"_blank\" rel=\"noopener\">described by Ciaran Martin, the first head of NCSC<\/a>, as \u201cChina doing a \u2018Snowden\u2019 to America,&#8221; by accessing vast amounts of U.S. communications data through a \u201cstrategic spying operation of breathtaking audacity.\u201d<\/p>\n<p>The companies \u2014 Sichuan Juxinhe Network Technology Co Ltd, Beijing Huanyu Tianqiong Information Technology Co, and Sichuan Zhixin Ruijie Network Technology Co Ltd \u2014 were named by Britain alongside 12 other countries\u2019 intelligence agencies, including partners in the Five Eyes intelligence tie-up such as the United States.<\/p>\n<p>The NCSC said malicious cyber activity linked to these companies had \u201ctargeted nationally significant organizations around the world\u201d since 2021. Targets included government, telecommunications, transportation and military infrastructure. The British spy agency added that a \u201ccluster of activity\u201d had been observed in the U.K.<\/p>\n<p>Britain and its allies alleged on Wednesday that these companies \u201cprovide cyber-related products and services to China\u2019s intelligence services, including multiple units in the People\u2019s Liberation Army and Ministry of State Security.\u201d<\/p>\n<p>They added that the data stolen through telecommunications, internet and transportation services can help Chinese intelligence track targets\u2019 communications and movements around the world.<\/p>\n<p>In 2024, the U.S. was <a href=\"https:\/\/www.politico.com\/news\/2024\/11\/06\/chinese-hackers-american-cell-phones-00187873\" target=\"_blank\" rel=\"noopener\">hit by one of the worst cyberattacks in its history<\/a> after China was able to get access to mobile data related to millions of Americans by burrowing inside major U.S. providers including Verizon, AT&amp;T and Lumen. <a href=\"https:\/\/www.nytimes.com\/2024\/10\/25\/us\/politics\/trump-vance-hack.html\" target=\"_blank\" rel=\"noopener\">The New York Times reported<\/a> ahead of the 2024 election that this included data from phones used by now-President Donald Trump and his Vice President JD Vance.<\/p>\n<p>Richard Horne, the NCSC\u2019s chief executive, said in a statement that his agency was &#8220;deeply concerned by the irresponsible behavior&#8221; of the companies named, who had &#8220;enabled an unrestrained campaign of malicious cyber activities on a global scale.&#8221;<\/p>\n<p>Earlier this month Dan Jarvis, the U.K. government\u2019s security minister, <a href=\"https:\/\/www.politico.eu\/article\/uk-minister-security-tech-assets-government-british-library\/\" target=\"_blank\" rel=\"noopener\">told POLITICO<\/a> that hackers and hostile states could face repercussions including retaliatory cyber attacks for targeting British institutions.<\/p>\n","protected":false},"excerpt":{"rendered":"Salt Typhoon\u2019s activities have previously been described by Ciaran Martin, the first head of NCSC, as \u201cChina doing&hellip;\n","protected":false},"author":2,"featured_media":378151,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[1213,748,1395,131894,2001,2437,7694,107169,2814,32,33,393,2002,4884,11579,2348,6084,2817,2818,601,2597,547,1144,712,811,1199,51417,16,15,49,1764],"class_list":{"0":"post-378150","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-uk","8":"category-united-kingdom","9":"tag-americas","10":"tag-britain","11":"tag-china","12":"tag-ciaran-martin","13":"tag-communications","14":"tag-companies","15":"tag-critical-infrastructure","16":"tag-dan-jarvis","17":"tag-data","18":"tag-donald-trump","19":"tag-elections","20":"tag-england","21":"tag-espionage","22":"tag-great-britain","23":"tag-hackers","24":"tag-history","25":"tag-infrastructure","26":"tag-intelligence","27":"tag-intelligence-services","28":"tag-jd-vance","29":"tag-military","30":"tag-mobile","31":"tag-northern-ireland","32":"tag-scotland","33":"tag-security","34":"tag-services","35":"tag-spying","36":"tag-uk","37":"tag-united-kingdom","38":"tag-united-states","39":"tag-wales"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/115101865416446361","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/378150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=378150"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/378150\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/378151"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=378150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=378150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=378150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}