网络攻击
Search documents
美方为何攻击我国家授时中心?一图看懂
Xin Lang Cai Jing· 2025-10-19 19:17
Core Points - The Chinese National Security Agency announced evidence of cyberattacks by the U.S. National Security Agency targeting the National Time Service Center in China, starting from 2022 [1] - The U.S. exploited vulnerabilities in a foreign brand's SMS service to secretly control the mobile devices of several staff members at the National Time Service Center, stealing sensitive data [1] - From August 2023 to June 2024, the U.S. is reported to have used 42 specialized cyberattack tools to conduct large-scale attacks on the National Time Service Center, aiming to penetrate high-precision ground timing systems [1] Group 1 - The National Time Service Center, located in Xi'an, Shaanxi Province, is responsible for generating and maintaining the national standard time, which aligns closely with Coordinated Universal Time (UTC) [3] - The center is considered an ideal location for timekeeping due to its stable geological structure [4] - The core equipment, atomic clocks, have been running continuously for 60 million years with an accumulated error of less than one second [4] Group 2 - Any deviation in timekeeping can lead to significant consequences, such as power grid disruptions causing large-scale blackouts if the timing is off by milliseconds [5] - A time difference of one millisecond could result in changes worth billions in international stock market transactions [6] - A nanosecond discrepancy could affect the positioning accuracy of the BeiDou system by 30 centimeters [7]
玉渊谭天丨美方为何攻击中国国家授时中心?一图看懂“分秒不差”的重要性
Xin Lang Cai Jing· 2025-10-19 05:24
Core Points - The U.S. National Security Agency has been accused of cyberattacks on China's National Time Service Center, with evidence of infiltration and data theft from staff mobile devices since 2022 [1][10] - From August 2023 to June 2024, the U.S. is reported to have deployed 42 specialized cyberattack tools to conduct large-scale attacks on the National Time Service Center, aiming to penetrate high-precision ground timing systems [1][10] Summary by Relevant Sections Cybersecurity Threats - The U.S. has exploited vulnerabilities in a foreign brand's mobile SMS service to gain unauthorized access to the mobile devices of multiple staff members at the National Time Service Center [1][10] - The attacks are characterized as being conducted with national-level intensity, indicating a significant threat to China's timing infrastructure [1][10] Importance of the National Time Service Center - The National Time Service Center is crucial for maintaining the national standard time, which is aligned with Coordinated Universal Time (UTC) [3] - It is located in Xi'an, Shaanxi Province, chosen for its stable geological structure and ability to cover signals nationwide [3][4] Implications of Timing Errors - Even a one-second deviation in time can lead to significant disruptions, such as power outages due to timing errors in power stations [5] - A microsecond error could result in billions in changes in international stock market transactions [6] - Timing inaccuracies can also affect the precision of satellite positioning systems like BeiDou, leading to location errors of up to 30 centimeters [6][7]
破案!美国安局入侵我国家授时中心
中国能源报· 2025-10-19 03:07
Core Viewpoint - The article discusses a significant cyber attack orchestrated by the U.S. National Security Agency (NSA) against China's National Time Service Center, highlighting the implications for national security and the integrity of "Beijing Time" [1][4]. Group 1: Cyber Attack Details - The NSA has been conducting a systematic and progressive cyber attack against the National Time Service Center since March 2022, utilizing vulnerabilities in mobile messaging services to gain access to sensitive information [4]. - From April 2023, the NSA repeatedly used stolen login credentials to infiltrate the center's computer systems, probing into the network infrastructure [4]. - Between August 2023 and June 2024, the NSA deployed a new cyber warfare platform with 42 specialized attack tools to launch high-intensity cyber assaults on multiple internal networks of the National Time Service Center [4]. Group 2: Importance of the National Time Service Center - The National Time Service Center, located in Xi'an, Shaanxi Province, is responsible for generating, maintaining, and broadcasting "Beijing Time," providing critical timing services for various sectors including communication, finance, power, transportation, surveying, and national defense [2]. - The center has developed a world-leading autonomous time measurement system and established a major scientific infrastructure for high-precision ground-based timing systems [2]. Group 3: Attack Methodology - The NSA's cyber attacks are characterized by their timing, often occurring during late night to early morning hours in Beijing, and they utilize virtual private servers from various global locations to obscure the source of the attacks [4]. - Techniques employed include forging digital certificates to bypass antivirus software and using strong encryption algorithms to erase traces of the attacks [4].
国家安全机关破获美国国家安全局重大网络攻击案
第一财经· 2025-10-19 02:07
来源 | 国家安全部 据国家安全部, 近期,国家安全机关破获一起美国重大网络攻击案,掌握美国国家安全局网络攻击入侵中国国家授时中心 的铁证,粉碎美方网攻窃密和渗透破坏的图谋,全力守护"北京时间"安全。 2025.10. 19 经国家安全机关填密调查发现,美国安局针对国家授时中心的网攻活动蓄谋已 久,呈现递进式、体系化特点。2022年3月25日起,美国安局利用某境外品牌手 机短信服务漏洞,秘密网攻控制国家授时中心多名工作人员的手机终端,窃取手 机内存储的敏感资料。2023年4月18日起,美国安局多次利用窃取的登录凭证, 入侵国家授时中心计算机,刺探该中心网络系统建设情况。2023年8月至2024年 6月,美国安局专门部署新型网络作战平台,启用42款特种网攻武器,对国家授 时中心多个内部网络系统实施高烈度网攻,并企图横向渗透至高精度地基授时系 统,预置瘫痪破坏能力。 机关買尽原形毕露 国家安全机关发现,美国安局网攻活动多选在北京时间深夜至凌晨发起,利用美 国本土、欧洲、亚洲等地的虚拟专用服务器作为"跳板"隐匿攻击源头,采取伪造 数字证书绕过杀毒软件等方式隐藏攻击行为,还使用了高强度的加密算法深度擦 除攻击痕迹,为 ...
美国入侵中国国家授时中心,破案了!
中国基金报· 2025-10-19 01:58
Core Viewpoint - The article highlights a significant cyber attack by the U.S. National Security Agency (NSA) against China's National Time Service Center, emphasizing the importance of safeguarding "Beijing Time" and the implications of such attacks on critical infrastructure and national security [2][4]. Group 1: Cyber Attack Details - The NSA's cyber attack activities against the National Time Service Center have been ongoing and exhibit a systematic and progressive nature [6]. - The attacks were primarily initiated during late night to early morning hours in Beijing, utilizing virtual private networks from the U.S., Europe, and Asia [7]. - Specific incidents include the use of vulnerabilities in foreign brand mobile SMS services to control staff mobile devices and steal sensitive data starting from March 25, 2022 [7]. - From April 18, 2023, the NSA repeatedly used stolen login credentials to infiltrate the National Time Service Center's computer systems [7]. - A new cyber warfare platform was deployed by the NSA from August 2023 to June 2024, utilizing 42 specialized cyber attack tools against multiple internal networks of the National Time Service Center [7]. Group 2: Attack Methods and Countermeasures - The NSA employed various sophisticated methods to conceal their attacks, including the use of forged digital certificates and high-strength encryption algorithms to erase traces of their activities [8]. - In response, national security agencies collected evidence of the attacks, guided the National Time Service Center in conducting investigations, and implemented upgraded preventive measures to eliminate potential threats [8]. Group 3: Broader Implications and Accusations - The article accuses the U.S. of being the primary disruptor in cyberspace, engaging in extensive cyber operations against various regions, including China, Southeast Asia, Europe, and South America [9][10]. - The U.S. is portrayed as hypocritical, often accusing others of cyber threats while simultaneously engaging in aggressive cyber espionage and attacks [10].
国安机关破获美国国家安全局重大网络攻击案
财联社· 2025-10-19 00:11
据央视新闻,近期, 国家安全机关破获一起美国重大网络攻击案,掌握美国国家安全局网络攻击入侵中国国家授时中心的铁证, 粉碎美方网攻窃 密和渗透破坏的图谋,全力守护"北京时间"安全。 2022年3月25日起,美国安局利用某境外品牌手机短信服务漏洞,秘密网攻控制国家授时中心多名工作人员的手机终端,窃取手机内存储 的敏感资料。 2023年4月18日起,美国安局多次利用窃取的登录凭证,入侵国家授时中心计算机,刺探该中心网络系统建设情况。 2023年8月至2024年6月,美国安局专门部署新型网络作战平台,启用42款特种网攻武器,对国家授时中心多个内部网络系统实施高烈度 网攻,并企图横向渗透至高精度地基授时系统,预置瘫痪破坏能力。 国家安全机关发现,美国安局网攻活动多选在北京时间深夜至凌晨发起, 利用美国本土、欧洲、亚洲等地的虚拟专用服务器作为"跳板"隐匿攻 击源头,采取伪造数字证书绕过杀毒软件等方式隐藏攻击行为, 还使用了高强度的加密算法深度擦除攻击痕迹,为实施网络攻击渗透活动可谓 无所不用其极。 国家安全机关见招拆招,固定美方网攻证据, 指导国家授时中心开展清查处置,斩断攻击链路,升级防范措施,消除危害隐患。 ...
国家安全机关破获美国国家安全局重大网络攻击案
证券时报· 2025-10-19 00:08
Group 1 - The article discusses a significant cyber attack by the U.S. National Security Agency (NSA) targeting China's National Time Service Center, aiming to disrupt and steal sensitive information related to "Beijing Time" security [1] - The NSA exploited vulnerabilities in a foreign brand's mobile SMS service to gain access to the mobile devices of several staff members at the National Time Service Center, starting from March 25, 2022 [1] - From April 18, 2023, the NSA used stolen login credentials to infiltrate the computer systems of the National Time Service Center, probing into the network system's construction [1] Group 2 - The NSA deployed a new cyber warfare platform and utilized 42 specialized cyber attack tools to conduct high-intensity attacks on multiple internal network systems of the National Time Service Center from August 2023 to June 2024 [1] - The attacks were primarily launched during late night to early morning Beijing time, using virtual private servers from various locations to obscure the source of the attacks [1] - The National Security Agency took measures to gather evidence of the attacks, guide the National Time Service Center in clearing and addressing the threats, and enhance preventive measures to eliminate potential risks [1] Group 3 - The National Time Service Center, located in Xi'an, Shaanxi Province, is responsible for generating, maintaining, and broadcasting "Beijing Time," providing high-precision timing services for various sectors including communication, finance, power, transportation, surveying, and national defense [2]
小米车主遭网暴进展公布,6032人求援480人提交证据
Xin Lang Ke Ji· 2025-10-17 07:18
【#小米车主受网络攻击进展公布#:收集到6032人求援信息】小米集团公关部总经理王化发布关于小米 车主受到网络攻击的进展。 小米车主遭网络攻击专项援助信息收集表自9月26日发布以来,截止10月15日24:00,共计6032人参与, 480人提供了相关证据信息,且对应所需的援助类型(可多选)如下:提供固定证据指导338人、发布律 师函301人、诉讼支持245人。 网络攻击线索收集进度同步(10月16 日) [] 22 1169 149 63 @新浪科技 ...
捷豹路虎在网络攻击后恢复生产,但英国经销商撑不住了
Guan Cha Zhe Wang· 2025-10-10 02:52
【文/观察者网 潘昱辰 编辑/高莘】据路透社10月8日报道,捷豹路虎在遭受网络攻击而停工数周后,恢 复了其位于英国所有工厂的生产。然而英国最大的汽车经销商集团之一Vertu警告称,由于其捷豹路虎 展厅业务遭遇"严重中断",其年利润可能面临高达550万英镑(约合人民币5239万元)的损失,其中9月 单月的损失就达到200万英镑(约合人民币1905万元)。 捷豹路虎在英国有三家工厂,日产量约1000辆。其英国工厂员工约有3.3万名,并在全国供应链中支持 了10.4万个工作岗位。而自网络攻击以来,其多数员工都被要求呆在家里。 据英国广播公司(BBC)此 前报道,捷豹因停工每周亏损5000万英镑(约合人民币4.8亿元)。 就在9月28日,英国政府发布公告称,将向捷豹路虎提供15亿英镑(约合人民币143亿元)的贷款担保, 捷豹路虎将于5年内偿还。 此外,受到美国关税上调的影响,捷豹路虎今年第三季度销量同比下降17.1%,至8.55万辆,其中英国 销量下降近三分之一;而批发量同比下降24.2%至6.62万辆。 本文系观察者网独家稿件,未经授权,不得转载。 Vertu集团经营有10家捷豹路虎经销商,而9月通常是消费者购车换 ...
捷豹路虎遭网络攻击停产数周后宣布复产计划
Zhong Guo Xin Wen Wang· 2025-10-07 14:36
为缓解停工数周给小型零部件供应商带来的经营压力,捷豹路虎同时宣布,在生产重启阶段将向部分合 格供应商提供零部件预付现金。9月底,英国政府已向该公司提供贷款担保,用于支持其供应商体系。 中新社伦敦10月7日电 (记者欧阳开宇)捷豹路虎7日宣布,因网络攻击停工近六周的部分工厂将于8日恢 复生产。 捷豹路虎隶属于印度塔塔汽车公司,在英国拥有三家工厂,日均汽车产量约1000辆。此次率先重启的为 发动机和电池部门,主要生产线则计划于本周晚些时候恢复运转。 分析师估算,捷豹路虎因停产每周损失约5000万英镑(约4.7亿元人民币)。经济学家曾警告,此次长期停 工可能对英国制造业整体产出造成影响。 值得关注的是,捷豹路虎是今年英国又一遭网络攻击的知名企业。此前,英国主要零售商玛莎百货因数 据泄露被迫关闭网上商店两个月。 此外,就在上个月,欧洲多家机场值机服务遭遇勒索软件攻击,导致大量旅客滞留。英国媒体分析称, 这些事件凸显出全球企业在日益复杂和频繁的网络攻击面前的脆弱性。(完) (文章来源:中国新闻网) ...