Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Vite 8.0 Is Out

    Hyperlinks in Terminal Emulators

    Can you instruct a robot to make a PBJ sandwich?

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      What the polls say about how Americans are using AI

      February 27, 2026

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026
    • Business

      Met Office ‘supercomputing as a service’ one year old

      March 12, 2026

      Tech hiring evolves as candidates ask for AI compute alongside pay and perks

      March 11, 2026

      Oracle is spending billions on AI data centers as cash flow turns negative

      March 11, 2026

      Google: Cloud attacks exploit flaws more than weak credentials

      March 10, 2026

      Could this be the key to eternal storage? Experts claim new DNA HDD can be ‘erased and overwritten repeatedly’

      March 9, 2026
    • Crypto

      Banks Respond to Kraken’s Federal Reserve Access as Trump Sides with Crypto

      March 4, 2026

      Hyperliquid and DEXs Break the Top 10 — Is the CEX Era Ending?

      March 4, 2026

      Consensus Hong Kong 2026: The Institutional Turn 

      March 4, 2026

      New Crypto Mutuum Finance (MUTM) Reports V1 Protocol Progress as Roadmap Enters Phase 3

      March 4, 2026

      Bitcoin Short Sellers Caught Off Guard in New White House Move

      March 4, 2026
    • Technology

      Vite 8.0 Is Out

      March 13, 2026

      Hyperlinks in Terminal Emulators

      March 13, 2026

      Can you instruct a robot to make a PBJ sandwich?

      March 13, 2026

      “This is not the computer for you”

      March 13, 2026

      Y Combinator-backed Random Labs launches Slate V1, claiming the first ‘swarm-native’ coding agent

      March 13, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»UK cyber security centre helps expose China-based cyber campaign
    Technology

    UK cyber security centre helps expose China-based cyber campaign

    TechAiVerseBy TechAiVerseAugust 30, 2025No Comments4 Mins Read3 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    UK cyber security centre helps expose China-based cyber campaign
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    UK cyber security centre helps expose China-based cyber campaign

    pinkeyes – stock.adobe.com

    GCHQ cyber security centre and its international partners release details of malicious cyber activity linked to Chinese businesses

    By

    • Karl Flinders,
      Chief reporter and senior editor EMEA

    Published: 28 Aug 2025 10:30

    Chinese technology companies have been linked to targeting governments and critical networks with malicious cyber attacks since 2021.

    Working with 12 international partners, GCHQ’s National Cyber Security Centre (NCSC) has made public links between three China-based technology companies and the global cyber campaign.

    Sichuan Juxinhe Network Technology, Beijing Huanyu Tianqiong Information Technology and Sichuan Zhixin Ruijie Network Technology have been named in the latest NCSC advisory.

    The NCSC worked on the advisory with counterparts in the US, Australia, Canada, New Zealand, Czechia, Finland, Germany, Italy, Japan, the Netherlands, Poland and Spain. 

    The advisory said the malicious campaign has targeted organisations in sectors including government, telecommunications, transportation and military infrastructure globally, since at least 2021, adding that a “cluster of activity” has been observed in the UK.

    The NCSC said data stolen could allow the Chinese intelligence services to identify and track targets’ communications and movements, and that attackers have had success taking advantage of common weaknesses rather than relying on bespoke malware or zero-day vulnerabilities.

    “Organisations of national significance in the UK are encouraged to proactively hunt for malicious activity and implement mitigative actions, including ensuring that edge devices are not exposed to known vulnerabilities and implementing security updates,” advised the NCSC.

    Concerning behaviour

    NCSC CEO Richard Horne said the organisation is “deeply concerned” by the “irresponsible behaviour of the named commercial entities”.

    “It is crucial organisations in targeted critical sectors heed this international warning about the threat posed by cyber actors, who have been exploiting publicly known – and so therefore fixable – vulnerabilities,” he added. 

    “In the face of sophisticated threats, network defenders must proactively hunt for malicious activity, as well as apply recommended mitigations based on indicators of compromise and regularly review network device logs for signs of unusual activity.” 

    John Hultquist, chief analyst at Google Threat Intelligence Group, said: “Though there are many Chinese cyber espionage actors regularly targeting the sector, this actor’s familiarity with telecommunications systems gives them a unique advantage, especially when it comes to evading detection.

    “Many of the highly successful Chinese cyber espionage actors we encounter have deep expertise in the technologies used by their targets, giving them an upper hand.”

    He said an ecosystem of contractors, academics and other facilitators are at the heart of Chinese cyber espionage. “Contractors are used to build tools and valuable exploits as well as carry out the dirty work of intrusion operations,” said Hultquist. “They have been instrumental in the rapid evolution of these operations and growing them to an unprecedented scale.”

    In April, the NCSC and partners issued advisories alerting individuals considered to be of interest to the Chinese intelligence services to two spyware variants, dubbed Moonshine and BadBazaar.

    The spyware variants both employ a technique known as trojanising, whereby they hide their malicious functionality inside apparently legitimate applications to access device functions such as microphones and cameras, location data, messages and photos.

    Last year, the NCSC and its counterpart, Five Eyes, accused a China-based company acting as a front for the state of running a massive botnet comprising over 250,000 internet-connected devices, about 8,500 of them located in the UK.

    The compromised devices include enterprise network and security tools such as routers and firewalls, and internet of things (IoT) products such as CCTV cameras and webcams. Unbeknownst to their owners, they are being used to conduct coordinated cyber attacks, including distributed denial of service attacks and malware delivery.

    Read more on Hackers and cybercrime prevention


    • UK at risk of Russian cyber and physical attacks as Ukraine seeks peace deal

      By: Bill Goodwin


    • NCSC issues warning over Chinese Moonshine and BadBazaar spyware

      By: Alex Scroxton


    • Treasury Department sanctions company tied to Salt Typhoon

      By: Arielle Waldman


    • China-based APTs waged 5-year campaign on Sophos firewalls

      By: Alexander Culafi

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleWhy Romania excels in international Olympiads
    Next Article How to manage Active Directory security
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Vite 8.0 Is Out

    March 13, 2026

    Hyperlinks in Terminal Emulators

    March 13, 2026

    Can you instruct a robot to make a PBJ sandwich?

    March 13, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025715 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025299 Views

    Wired Headphones Are Making A Comeback, And We Have Gen Z To Thank

    July 22, 2025210 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025172 Views
    Don't Miss
    Technology March 13, 2026

    Vite 8.0 Is Out

    Vite 8.0 Is OutMarch 12, 2026We’re thrilled to announce the stable release of Vite 8!…

    Hyperlinks in Terminal Emulators

    Can you instruct a robot to make a PBJ sandwich?

    “This is not the computer for you”

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Vite 8.0 Is Out

    March 13, 20263 Views

    Hyperlinks in Terminal Emulators

    March 13, 20262 Views

    Can you instruct a robot to make a PBJ sandwich?

    March 13, 20261 Views
    Most Popular

    Outbreak turns 30

    March 14, 20250 Views

    New SuperBlack ransomware exploits Fortinet auth bypass flaws

    March 14, 20250 Views

    CDs Offer Guaranteed Returns in an Uncertain Market. Today’s CD Rates, March 14, 2025

    March 14, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.