The U.S. Treasury Department recently fell victim to a cyber-attack orchestrated by a state-sponsored actor in China. This breach resulted in unauthorized access to government employees’ workstations and unclassified documents, as announced by the Biden administration on Monday.
This incident comes on the heels of revelations that China has compromised U.S. telecommunications systems, allowing them to intercept phone conversations and text messages of U.S. officials and other individuals.
On December 8, BeyondTrust, a third-party software service provider, notified the Treasury Department that the hacker had obtained a security key. This key granted remote access to specific Treasury workstations and the associated documents. The department informed lawmakers of this development in a formal letter.
In response to the breach, the Treasury Department worked in conjunction with the F.B.I., the intelligence community, and other investigative bodies to evaluate the extent of the impact. The compromised service has been taken offline, and there is no indication that the Chinese state actor still has access to Treasury data.
A Treasury spokesperson underscored the department’s dedication to safeguarding its systems and the information stored within them from cyber threats. They reiterated the commitment to collaborating with private sector entities and government agencies to fortify the financial infrastructure.
The Treasury Department refrained from disclosing the specific timeline of the incident but assured that additional details would be provided in a forthcoming supplemental report to Congress.
In a related development, a separate Chinese hacking group known as Salt Typhoon breached U.S. telecommunications systems, raising concerns about the vulnerability of American infrastructure. Microsoft’s cybersecurity team identified this hack in the summer, allowing China access to conversations involving prominent figures such as Donald J. Trump and JD Vance.
This content was auto-generated and verified by an editor. For further details, refer to our Terms and Conditions.