25 August 2025
When people think of hacking, they often picture lone geniuses in hoodies breaking into computers for fun or profit. But the truth is far bigger—and far scarier. Around the world, critical systems like power grids, water supplies, and telecom networks are increasingly being probed and attacked, not by lone hackers, but by state-backed groups. And many of these campaigns have something in common: support from China-based technology companies.
The Companies Behind the Curtain
In August 2025, an international coalition of governments publicly called out three Chinese tech firms—Sichuan Juxinhe Network Technology, Huanyu Tianqiong Information Technology, and Sichuan Zhixin Ruijie Network Technology—for helping run cyber operations against more than 600 companies in 80 countries. Investigators say these firms provided tools and services that made it easier for hackers to slip into telecoms, energy companies, and government networks.
For years, Western intelligence agencies have suspected that some Chinese companies act as quiet partners in Beijing’s global cyber strategy. Now the evidence is becoming public.
Botnets, Backdoors, and Everyday Devices
What makes these attacks so effective is that they don’t just target high-end servers in secure offices. Instead, they often hijack everyday devices—routers, webcams, and Wi-Fi boxes sitting in homes and small businesses. One campaign, nicknamed Flax Typhoon, built a botnet of more than 260,000 compromised devices worldwide. From there, hackers had a ready-made army of machines to launch cyberattacks.
And behind it all? Reports link the operation to a Beijing-based company called Integrity Technology Group. What looked like a normal business on the surface turned out to be a hub for coordinating cyberattacks.
Attacks Aimed at the Heart of Infrastructure
This isn’t just about stealing passwords or company secrets. The real danger is how these groups focus on critical infrastructure—the systems that keep daily life running.
- Water utilities
- Natural gas pipelines
- Telecommunications networks
- Hospitals and medical manufacturing
In some cases, hackers exploited vulnerabilities in SAP software to get inside water and energy companies. In others, they found zero-day flaws in systems like VMware and Fortinet, which many businesses rely on for virtual networks. Experts warn these breaches aren’t just about spying—they’re about laying the groundwork to disrupt services in a future conflict.
Why This Matters to Everyone
This story isn’t just about geopolitics—it’s about how much of our daily life depends on networks that are now under quiet siege by communist China.
Imagine losing power, water, or mobile networks during a crisis because China had already planted digital “landmines” in the system.
What Can Be Done?
Governments are beginning to respond. The U.S. has sanctioned several Chinese firms, while the EU and allies are tightening security standards for telecom and utility companies. But the real challenge is global: these attacks don’t stop at borders.
Experts say the answer lies in:
- Stronger supply-chain scrutiny – knowing exactly where hardware and software come from.
- Faster patching of vulnerabilities – so hackers can’t exploit known flaws.
- International cooperation – sharing intelligence quickly when attacks are detected.
Final Thoughts
China’s rise as a cyber power has been fueled not only by state agencies but also by seemingly legitimate companies controlled by the Chinese government that provide the infrastructure for global campaigns..
The big question remains: can the Western nations secure their critical networks before China hits them hard?
At present they can not!


