Workflow
“北京时间”遭美国网攻更多细节曝光
Xin Lang Cai Jing·2025-10-19 20:17

Core Viewpoint - The Chinese Academy of Sciences National Time Service Center has become a target for U.S. cyberattacks, which aim to steal sensitive data and compromise its operations [2][3][6]. Group 1: Cyberattack Details - The U.S. has conducted long-term, high-intensity infiltration attacks on the National Time Service Center, utilizing advanced espionage tools [2][3]. - Starting in 2022, the U.S. exploited vulnerabilities in foreign mobile phone services to gain control over the phones of multiple staff members, allowing for the theft of sensitive information [2][3]. - From August 2023 to June 2024, the U.S. deployed a new network warfare platform, using 42 specialized cyberattack tools to target various internal systems of the National Time Service Center [3][6]. Group 2: Importance of the National Time Service Center - The National Time Service Center, originally established in 1966, is responsible for generating and broadcasting the national standard time, which is crucial for the functioning of various sectors including finance, telecommunications, and scientific research [4][5]. - The precision of national standard time is vital; even a millisecond discrepancy can lead to significant operational failures, such as widespread power outages or substantial financial losses in stock trading [4][5]. Group 3: International Standing and Developments - China's share in the international standard time calculation has increased from 5.66% in 2021 to 19.51%, positioning it as the second highest globally [5]. - The National Time Service Center is currently developing a high-precision ground-based timing system to enhance the security, reliability, and accuracy of its timing services [5]. Group 4: Nature of Cyber Threats - The cyberattacks are characterized as Advanced Persistent Threats (APT), which are systematic and strategic actions aimed at monitoring and potentially disrupting critical infrastructure in other countries [6][7]. - The U.S. employs various techniques, including the use of "jump servers" located in different regions, to obscure the source of attacks and enhance the effectiveness of their cyber operations [6][7].