Close Menu
The Watch
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    The Watch
    Subscribe
    • Home
    • Top Stories
      • USNORTHCOM
      • Homeland Defense
      • Chinese Communist Party (CCP)
      • Russia
    • USNORTHCOM AOR
      • Arctic
      • North America
      • Mexico
      • The Caribbean
    • eTalk/Panel
      • Arctic eTalks
      • Arctic Academic eTalks
      • RUSI NS Panels
      • Perry Center eTalks/Panels
      • Ted Stevens Center eTalks/Panels
    • ASFR
    • Journal
      • Enduring Partnerships – V6
        • Mutually Beneficial Trusted Partnerships
        • Regional Cooperation
        • U.S. Shares Military Capabilities
      • Special Reports
      • Archive
    • About Us
      • Contributors
    • Contact Us
    The Watch
    Subscribe
    Home » Coalition calls out Chinese companies over hacking campaign
    Chinese Communist Party (CCP)

    Coalition calls out Chinese companies over hacking campaign

    REUTERSBy REUTERSSeptember 19, 2025No Comments2 Mins Read
    An international coalition has identified three companies it says are responsible for a broad hacking campaign that fed information to China’s intelligence services.
    Share
    Facebook Twitter LinkedIn Pinterest Email

    An unusually broad coalition composed of the United States, its traditional English-speaking allies and other nations including Germany, Italy and Japan is calling out three Chinese companies over alleged hacking activity. In a 37-page advisory published August 27, the countries accused the firms Sichuan Juxinhe Network Technology, Beijing Huanyu Tianqiong Information Technology and Sichuan Zhixin Ruijie Network Technology of providing “cyber-related products and services to China’s intelligence services, including multiple units in the People’s Liberation Army and Ministry of State Security.”

    Sichuan Juxinhe already had been sanctioned by the U.S. Treasury over its alleged ties to a hacking group nicknamed Salt Typhoon, which has been accused of gobbling up vast amounts of U.S. residents’ call records, including communications from senior leadership in Washington. Beijing Huanyu Tianqiong and Sichuan Zhixin Ruijie both were allegedly hit by recent, and so far, unexplained, data leaks.

    Although U.S. officials have been complaining of China-linked hacking activity for decades, the breaches attributed to Salt Typhoon have stood out as particularly sweeping. One senator last year described its scope as “mind-boggling.” Another said it likely represented “the largest telecommunications hack in our nation’s history.”

    In an interview with The Wall Street Journal published August 27, the FBI’s top cyber official, Brett Leatherman, said Salt Typhoon was responsible for “one of the more consequential cyber espionage breaches we have seen here in the United States.” The Journal said the hackers targeted more than 80 countries and had shown varying levels of interest in more than 600 companies.

    The United States regularly calls out Chinese and other foreign entities over their alleged involvement in cyber espionage, and it has occasionally done so in conjunction with other members of the Five Eyes intelligence alliance: Australia, Canada, New Zealand and the United Kingdom.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Related Posts

    Japan, South Korea vow to work with U.S. to deter North Korea

    September 26, 2025

    Hegseth directs U.S. Army to form anti-drone task force

    September 24, 2025

    Marines conduct live-fire test of lethal drone munitions

    September 17, 2025
    Leave A Reply Cancel Reply

    V6. ENDURING PARTNERSHIPS
    V6. INSERT

    Subscribe and download the latest issue

    The Watch is provided FREE to military and security professionals.

    The Watch
    Facebook X (Twitter) Instagram Pinterest
    © 2025 The Watch.

    Type above and press Enter to search. Press Esc to cancel.

    Subscribe

    Join The Watch Community to receive important updates on

    Homeland Defense issues, events, and our monthly newsletter.

    Subscribe

    * indicates required