China Accuses The US Of Spying On Huawei

The persistent and escalating argument between Washington and Beijing over technology and security issues has taken a new twist, with China accusing the US of hacking into the core servers of Chinese telecoms firm Huawei in in attempts to steal critical data. 

The charges of digital spying being made by China's Ministry of State Security (MSS) relate to events dating from 2009 and come at a time of increasing geopolitical tensions between the two countries.

In a message posted on WeChat, the Chinese government said US intelligence agencies have "done everything possible" to conduct surveillance, secret theft, and intrusions on many countries around the world, including China, using a "powerful cyber attack arsenal." Specifics about the alleged hacks were not shared. It focused on the US National Security Agency's (NSA) Computer Network Operations as having "repeatedly carried out systematic and platform-based attacks" against the country to plunder its "important data resources."

The post went on to claim that the cyber-warfare intelligence-gathering unit hacked Huawei's servers in 2009 and that it had carried out "tens of thousands of malicious network attacks" on domestic entities, including the Northwestern Polytechnical University.

A further allegation is that Washington has forced the implantation of backdoors into software and equipment produced by technology companies, enlisting the help of its global technology brands to monitor and steal data.

China's National Computer Virus Emergency Response Centre (NCVERC) is said to have isolated a spyware artifact known as 'Second Date' when dealing with an incident at the public research university that was allegedly developed by the NSA and stealthily implanted on "thousands of network devices in many countries around the world."

Details about Second Date were recently reported by South China Morning Post and China Daily, describing it as a cross-platform malware capable of monitoring and hijacking network traffic as well as injecting malicious code. Germany, Japan, South Korea, India, and Taiwan are believed to be some of the countries targeted by the spyware. "The US intelligence agency has used these large-scale weapons and equipment to carry out cyber attacks and cyber espionage operations for more than ten years against China, Russia and other 45 countries and regions around the world," MSS said, adding the attacks targeted telecom, scientific research, economy, energy and military sectors.

MSS also has said that the US has forced technology companies to install backdoors in their software and equipment to conduct cyber espionage and steal data and to track mobile phone users.

"It has long been an open secret that the United States has long relied on its technological advantages to conduct large-scale eavesdropping on countries around the world, including its allies, and carried out cyber theft activities," the MSS said, adding Russia, Iran, China, and North Korea are its main targets... At the same time, the United States is trying its best to portray itself as a cyber-attack victim, inciting and coercing other countries to join the so-called 'clean network' program under the banner of maintaining network security, in an attempt to eliminate Chinese companies from the international network market."

In July 2023, after Microsoft said that a China-linked espionage campaign had been mounted by an actor codenamed Storm-0558 targeting two dozen organisations in the US and Europe, China responded by calling the US "the world's biggest hacking empire and global cyber thief."

The Hacker News:     Weixin:     South China Morning Post:     China Daily:     The Times Of India:    

The Register:     Security Boulevard                                      Image; geralt

You Might Also Read: 

Spy Agencies Warn Of New Threats From Chinese Hackers:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« British Online Safety Bill Will Restrict Social Media
The US Security Standard For IoT Devices »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cavirin

Cavirin

Cavirin’s Automated Risk Analysis Platform reduces risk and automates security and compliance.

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

VisionWare

VisionWare

VisionWare provide consulting services and solutions in areas covering both physical and digital security.

Recorded Future

Recorded Future

Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

Axence

Axence

Axence provides professional solutions for the comprehensive management of IT infrastructure for companies and institutions all over the world.

RiskRecon

RiskRecon

RiskRecon makes it easy to gain deep, risk contextualized insight into the cybersecurity risk performance of all of your third parties.

ACROS Security

ACROS Security

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements.

BotRx

BotRx

BotRx is the only AI-enabled, automated fraud protection technology that allows fast & easy deployment - continually keeping invisible bad bots and agents at bay, so you can rest easy.

Mayhem

Mayhem

Mayhem, by ForAllSecure, is a developer-first application and API security testing solution.

Securden

Securden

Securden provide an all-in-one Platform for Next-Gen Privileged Access Governance, helping you to prevent identity thefts, malware propagation, cyber attacks, and insider exploitation.

Sec-Ops

Sec-Ops

Sec-Ops is a forward thinking cyber security company, formed by a group of security enthusiasts with years of experience and backgrounds in the technology and the government industries.

Lumifi

Lumifi

Lumifi provide end-to-end cybersecurity resilience solutions with a specialty in managed detection and response (MDR) services.

Solcon Capital

Solcon Capital

Solcon Capital is a forward-looking, technology-focused investment firm that is committed to identifying and investing in the most promising areas of innovation and development in the tech industry.

Redcoat AI

Redcoat AI

Redcoat AI provide a comprehensive security platform that continuously evolves with the threats and opportunities presented by AI.