Hacker NewsInternational NewsNewsOther VideosUS NewsVideos

Chinese Hackers Breach U.S. Treasury in Major Cybersecurity Incident

US Treasury Cyberattack: Treasury hacked by Chinese state-sponsored actor

In a frightening trend for U.S. national security, the U.S. Treasury Department revealed a “major” state-sponsored hacking incident by China. The hack, which took place earlier this month, provided the Chinese hackers with remote control of several Treasury Department workstations as well as unclassified documents.

The intruder was made possible by a breached third-party cyber security service provider, BeyondTrust. The exploitation facilitated the attacking parties to evade the computer security guardrails of the Treasury, which shows the dangers that can be posed by third-party vendors in cyber security environments.

Treasury Deputy Secretary Wally Adeyemo explained the incident in a letter to some members of Congress that, “Upon learning of this incident, Treasury took swift action to respond to and investigate the incident, including taking steps to mitigate the effect to Treasury systems and data.”.

The scope of the breach is still under investigation, but it is said that they breached into employee workstations and some unclassified files. It has been confirmed by the Treasury Department that no classified systems were affected in this breach.

This is part of a larger pattern of Chinese cyber activity against U.S. institutions. One distinct but concurrent pattern is that of one Chinese hacking group called Salt Typhoon, which has been actively attempting to penetrate telecommunications networks globally, including the United States. The group used vulnerabilities in Cisco routers to penetrate at least five other telecom networks during December and January.

Cyber security experts were also concerned about these attacks. Google’s Mandiant Intelligence chief analyst, John Hultquist, further added, “For years, Chinese cyber espionage actors have strategically targeted the telecommunications sector to facilitate their wider regional espionage efforts.”

The U.S. government has also been firm on this matter. A Treasury spokesperson made the assertion, “Treasury has taken swift action to respond to this incident and mitigate any potential compromises”.

But China has firmly rejected these allegations. Chinese Foreign Ministry spokesperson Wang Wenbin refuted the charges, stating, “We firmly oppose and crack down on all forms of hacking attacks. We will never encourage, support or condone cyber attacks”.

With U.S.-China tensions regarding cybersecurity issues still at a high level, this event is a harsh reminder of the ongoing threat in cyberspace. This is to emphasize the importance of being on guard and having good cybersecurity measures, particularly for critical government agencies.

Chinese hackers remotely accessed workstations and documents in a 'major' cyber incident, U.S. Treasury says
The department is collaborating closely with the FBI and the Cybersecurity and Infrastructure Security Agency to thoroughly investigate the scope of the breach. (X/Grok2 AI)

The Treasury Department noted that it was cooperating closely with federal agencies and cybersecurity partners to contain the breach and deter subsequent breaches. While investigations are still unfolding, the overall scale of this cyber infiltration is yet to be known, but cybersecurity will certainly remain one of the leading issues in U.S.-China relations for a while to come.

Following is an overview of other such Chinese hacking of the United States:

These events reflect a trend of repeated and sophisticated cyber attacks that have been directed to China and that have been aimed at U.S. infrastructure sectors as well as government institutions. Note that although the events have been directed to China by both U.S. officials and cyber experts, China has remained adamant in denying participation in the events.

Jeffrey Childers
Journalist, editor, cybersecurity and computer science expert, social media management, roofing contractor.

6 Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
© The AEGIS Alliance™

The AEGIS Alliance Newsletter Signup!

Enter your info to join our newsletter.

Lists