fredag, juni 20, 2025
enkle.dk
  • IT og Software
  • Service og Ydelser
  • Sundhed og Skønhed
  • Friluftsliv og Sport
No Result
View All Result
  • IT og Software
  • Service og Ydelser
  • Sundhed og Skønhed
  • Friluftsliv og Sport
No Result
View All Result
enkle.dk
No Result
View All Result
Home IT og Software

China-Linked Cyber Threat Group Hacks US Treasury Department

China-Linked Cyber Threat Group Hacks US Treasury Department
Share on FacebookShare on Twitter

A Chinese-state-sponsored cyberattack compromised the U.S. Treasury, gaining access to classified documents through a vulnerability through third-party cybersecurity provider BeyondTrust. The breach, revealed on Dec. 31, underscores the growing sophistication of state-backed cyber espionage efforts.

“Treasury takes very seriously all threats against our systems, and the data it holds,” a department spokesperson said in a statement. “Over the last four years, Treasury has significantly bolstered its cyber defense, and we will continue to work with both private and public sector partners to protect our financial system from threat actors.”

Threat actors stole a key to BeyondTrust

BeyondTrust reported the breach to the Treasury Department on Dec. 8. The Treasury, in turn, reported the attack to the Cybersecurity and Infrastructure Agency and the FBI.

Representatives of the Chinese government told reporters the nation was not responsible for the breach. A spokesperson for the Chinese Embassy in Washington told Reuters attributions of nation-state-sponsored threat actors to China were “smear attacks against China without any factual basis.”

The breach occurred after “a threat actor had gained access to a key used by the vendor to secure a cloud-based service used to remotely provide technical support for Treasury Departmental Offices (DO) end users,” according to a letter from treasury officials acquired by Reuters.

What types of documents were exploited?

According to the BBC, targeted documents included:

  • Information about President-elect Donald Trump and Vice President-elect JD Vance.
  • Data related to Vice President Kamala Harris’s 2024 presidential campaign.
  • A database of phone numbers subject to law enforcement surveillance.

It is unknown whether this information was specifically targeted or happened to be within the available data.

Since the attack, the Treasury has worked with third-party security specialists, the intelligence community, the FBI, and CISA to investigate. The Treasury identified the cyber threat as an Advanced Persistent Threat actor, which NIST defines as a “sophisticated” adversary using multiple tactics to gain continuous access to its target.

According to the letter from the Treasury, BeyondTrust took the affected service offline. This strategy blocked the threat actors’ access to the department’s information.

As the Washington Post highlighted, the Treasury plays a key role in economic sanctions, which President-elect Trump may leverage against Chinese goods.

“The uptick in Chinese cyberattacks on U.S. infrastructure reflects broader strategic priorities, including countering U.S. influence, achieving technological dominance and preparing for potential geopolitical confrontations,” James Turgal, VP of global cyber risk and board relations at Optiv and former FBI assistant director of information and technology, said in an email to TechRepublic.

SEE: In early December the US sanctioned Chinese cybersecurity firm Sichuan Silence for alleged involvement in ransomware attacks. 

Salt Typhoon targeted US infrastructure in 2024

The breach of the Treasury was part of a series of attacks on U.S. government agencies and infrastructure in 2024. Many of these incidents have been traced to China-sponsored threat actors, including Salt Typhoon

Active Since 2020, Salt Typhoon has been recognized for its cyber espionage operations that have targeted critical infrastructure sectors globally. The group targeted at least eight US telecommunications companies, including AT&T and Verizon, as well as Cisco and defense contractors.

“The attack underscores the urgent need for robust cybersecurity frameworks to protect against escalating threats targeting the telecommunications sector,” the FCC wrote in early December.

What does this mean for cybersecurity professionals?

In December, the U.S. government issued security guidance to telecommunications companies attempting to disrupt a pattern of Chinese state-affiliated actors breaching domestic organizations. The guidance suggested that companies use comprehensive alerting mechanisms, leverage network flow monitoring solutions, limit exposure of management traffic to the Internet, and harden various aspects of systems and devices. Specific Cisco devices may call for additional precautions.

Læs også

Bøder og udvisninger for ulovligt arbejde

Fradrag kan stoppe dumping af asbest i naturen

A Chinese-state-sponsored cyberattack compromised the U.S. Treasury, gaining access to classified documents through a vulnerability through third-party cybersecurity provider BeyondTrust. The breach, revealed on Dec. 31, underscores the growing sophistication of state-backed cyber espionage efforts.

“Treasury takes very seriously all threats against our systems, and the data it holds,” a department spokesperson said in a statement. “Over the last four years, Treasury has significantly bolstered its cyber defense, and we will continue to work with both private and public sector partners to protect our financial system from threat actors.”

Threat actors stole a key to BeyondTrust

BeyondTrust reported the breach to the Treasury Department on Dec. 8. The Treasury, in turn, reported the attack to the Cybersecurity and Infrastructure Agency and the FBI.

Representatives of the Chinese government told reporters the nation was not responsible for the breach. A spokesperson for the Chinese Embassy in Washington told Reuters attributions of nation-state-sponsored threat actors to China were “smear attacks against China without any factual basis.”

The breach occurred after “a threat actor had gained access to a key used by the vendor to secure a cloud-based service used to remotely provide technical support for Treasury Departmental Offices (DO) end users,” according to a letter from treasury officials acquired by Reuters.

What types of documents were exploited?

According to the BBC, targeted documents included:

  • Information about President-elect Donald Trump and Vice President-elect JD Vance.
  • Data related to Vice President Kamala Harris’s 2024 presidential campaign.
  • A database of phone numbers subject to law enforcement surveillance.

It is unknown whether this information was specifically targeted or happened to be within the available data.

Since the attack, the Treasury has worked with third-party security specialists, the intelligence community, the FBI, and CISA to investigate. The Treasury identified the cyber threat as an Advanced Persistent Threat actor, which NIST defines as a “sophisticated” adversary using multiple tactics to gain continuous access to its target.

According to the letter from the Treasury, BeyondTrust took the affected service offline. This strategy blocked the threat actors’ access to the department’s information.

As the Washington Post highlighted, the Treasury plays a key role in economic sanctions, which President-elect Trump may leverage against Chinese goods.

“The uptick in Chinese cyberattacks on U.S. infrastructure reflects broader strategic priorities, including countering U.S. influence, achieving technological dominance and preparing for potential geopolitical confrontations,” James Turgal, VP of global cyber risk and board relations at Optiv and former FBI assistant director of information and technology, said in an email to TechRepublic.

SEE: In early December the US sanctioned Chinese cybersecurity firm Sichuan Silence for alleged involvement in ransomware attacks. 

Salt Typhoon targeted US infrastructure in 2024

The breach of the Treasury was part of a series of attacks on U.S. government agencies and infrastructure in 2024. Many of these incidents have been traced to China-sponsored threat actors, including Salt Typhoon

Active Since 2020, Salt Typhoon has been recognized for its cyber espionage operations that have targeted critical infrastructure sectors globally. The group targeted at least eight US telecommunications companies, including AT&T and Verizon, as well as Cisco and defense contractors.

“The attack underscores the urgent need for robust cybersecurity frameworks to protect against escalating threats targeting the telecommunications sector,” the FCC wrote in early December.

What does this mean for cybersecurity professionals?

In December, the U.S. government issued security guidance to telecommunications companies attempting to disrupt a pattern of Chinese state-affiliated actors breaching domestic organizations. The guidance suggested that companies use comprehensive alerting mechanisms, leverage network flow monitoring solutions, limit exposure of management traffic to the Internet, and harden various aspects of systems and devices. Specific Cisco devices may call for additional precautions.

Related Posts

Bøder og udvisninger for ulovligt arbejde
IT og Software

Bøder og udvisninger for ulovligt arbejde

2. februar 2025
Fradrag kan stoppe dumping af asbest i naturen
IT og Software

Fradrag kan stoppe dumping af asbest i naturen

2. februar 2025
Norlys’ navn misbruges i forsøg på sms-svindel
IT og Software

Norlys’ navn misbruges i forsøg på sms-svindel

31. januar 2025
Næsten 500 virksomheder har fået asbestautorisation
IT og Software

Næsten 500 virksomheder har fået asbestautorisation

31. januar 2025
Stor renovering af Folketinget sparket til hjørne
IT og Software

Stor renovering af Folketinget sparket til hjørne

31. januar 2025
Sikkerheden skal være i orden
IT og Software

Sikkerheden skal være i orden

31. januar 2025
Next Post
IBM’s Acquisition of HashiCorp Investigated by UK Competition Authority

IBM’s Acquisition of HashiCorp Investigated by UK Competition Authority

Skriv et svar Annuller svar

Din e-mailadresse vil ikke blive publiceret. Krævede felter er markeret med *

Populære nyheder

Eksplosion i interessen: Anette Abild undgår altid tre bilmærker, når hun importerer billige elbiler fra Tyskland

Eksplosion i interessen: Anette Abild undgår altid tre bilmærker, når hun importerer billige elbiler fra Tyskland

13. januar 2025
De har vidst det længe – nu har gymnasium gennemført fyringsrunde

De har vidst det længe – nu har gymnasium gennemført fyringsrunde

9. januar 2025
Emil Kellermann troede ikke, at forældrene vidste noget:  Han gik ud i køkkenet, tog nogle streger på komfuret og satte sig ind og spiste videre

Emil Kellermann troede ikke, at forældrene vidste noget: Han gik ud i køkkenet, tog nogle streger på komfuret og satte sig ind og spiste videre

6. januar 2025
Podcast: Forskerens hjemmelavede Wegovy: Sådan aktiverer du kroppens naturlige vægttabshormon

Podcast: Forskerens hjemmelavede Wegovy: Sådan aktiverer du kroppens naturlige vægttabshormon

15. januar 2025
Danmarks ældste ugeblad genopstår på papir

Danmarks ældste ugeblad genopstår på papir

23. april 2025

Om os

Velkommen til Enkle.dk, din pålidelige kilde til inspirerende og informativt indhold om sundhed og skønhed, IT og software, udendørs aktiviteter og sport, samt tjenester og fordele.

Kategorier

  • Friluftsliv og Sport
  • IT og Software
  • Service og Ydelser
  • Sundhed og Skønhed

Seneste indlæg

  • Tetra Pak New Food Technology Development Centre er åbnet
  • Nye modeller øger kreativiteten for brugerne
  • Antidug og øget hyldepræstation
  • Om Os
  • Kontakt os
  • Privatlivspolitik
  • Vilkår og Betingelser

© 2025 Enkle.dk. Alle rettigheder forbeholdes.

No Result
View All Result
  • IT og Software
  • Service og Ydelser
  • Sundhed og Skønhed
  • Friluftsliv og Sport

© 2025 Enkle.dk. Alle rettigheder forbeholdes.

Cookies
We serve cookies. If you think that's ok, just click "Accept all". You can also choose what kind of cookies you want by clicking "Settings". Read our cookie policy
Settings Accept all
Cookies
Choose what kind of cookies to accept. Your choice will be saved for one year. Read our cookie policy
  • Necessary
    These cookies are not optional. They are needed for the website to function.
  • Statistics
    In order for us to improve the website's functionality and structure, based on how the website is used.
  • Experience
    In order for our website to perform as well as possible during your visit. If you refuse these cookies, some functionality will disappear from the website.
  • Marketing
    By sharing your interests and behavior as you visit our site, you increase the chance of seeing personalized content and offers.
Save Accept all