Chinese Hackers Breached UK Downing Street Phones for Years

Chinese Hackers Breached Phones at Heart of UK Government, Global Spy Campaign Revealed

The420.in Staff
5 Min Read

Telecom networks in UK, US and allied nations compromised for years; attackers allegedly able to record calls, track locations and access messages

Mobile phones operating at the very centre of the British government were compromised as part of a years-long global cyber-espionage campaign allegedly linked to China, raising serious concerns over the security of political communications across Western democracies.

According to reports cited by international media, hackers gained access to telecommunications networks connected to Downing Street, enabling them to intercept calls, read text messages and track the locations of users. The intrusion is believed to be part of a wider operation targeting telecom infrastructure in multiple countries, including the United States and other members of the Five Eyes intelligence alliance.

US authorities are understood to have alerted allies in 2024 after uncovering evidence that state-linked hacking groups had infiltrated telecom companies worldwide. Intelligence assessments suggest the breaches may date back to at least 2021, though their scale and depth became fully apparent only years later.

Certified Cyber Crime Investigator Course Launched by Centre for Police Technology

Officials familiar with the investigation said the attackers had broad and sustained access to core telecom systems, allowing them to monitor communications “at will.” This reportedly included the capability to geolocate millions of individuals and listen to phone calls without detection, making the operation one of the most serious cyber intrusions into Western communications networks in recent years.

British media reports quoted sources describing the breach as reaching “right into the heart of Downing Street,” with concerns that phones used by senior government figures and staff may have been exposed. The scale of the compromise has prompted renewed scrutiny of how sensitive political communications are protected in an era of increasingly sophisticated cyber warfare.

The hacking campaign is believed to have affected multiple governments simultaneously, with telecom networks in the US, Australia, Canada and New Zealand also targeted. Experts say telecom infrastructure remains a high-value target because access to these systems provides intelligence agencies with vast amounts of metadata and real-time communications.

In response to the findings, US federal authorities in 2024 urged telecom operators to strengthen network security and take urgent steps to detect and remove malicious activity. The guidance was aimed at preventing further intrusions and limiting the damage from existing breaches.

A joint cybersecurity advisory issued in August 2025 by US and allied agencies warned that Chinese state-sponsored actors were continuing to target global telecom networks. The advisory said the activity overlapped with industry tracking of a threat group commonly referred to as “Salt Typhoon,” which has been linked to large-scale espionage operations.

Cybersecurity experts describe Salt Typhoon as one of the most prominent actors in the global cyber-espionage landscape. While public attention has largely focused on US targets, analysts say the group’s operations have extended across Europe, the Middle East and Africa, hitting telecom firms, government bodies and technology companies.

In the UK, concerns have also been raised about the timing of the attacks, with reports suggesting there were multiple hacking incidents affecting government phones over several years. Officials are now examining whether sensitive political discussions or strategic information may have been exposed during that period.

China has previously rejected allegations of state-sponsored hacking, dismissing such claims as baseless and lacking evidence. However, Western governments maintain that the scale and sophistication of the telecom breaches point to well-resourced actors with strategic intelligence objectives.

Downing Street has been approached for comment, though officials have so far declined to discuss operational details related to cybersecurity. Analysts say the revelations are likely to intensify calls for stricter security standards for telecom providers and a reassessment of how governments communicate in a digitally hostile environment.

The incident underscores growing fears that critical civilian infrastructure has become a frontline in geopolitical rivalry, with telecom networks offering a powerful window into the inner workings of governments and societies alike.

About the author – Rehan Khan is a law student and legal journalist with a keen interest in cybercrime, digital fraud, and emerging technology laws. He writes on the intersection of law, cybersecurity, and online safety, focusing on developments that impact individuals and institutions in India.

Stay Connected