Loading stock data...

China Denies Involvement After Major Breach of US Treasury Workstations

Chinese Government Denies Responsibility for US Treasury Breach

Threat Actor Gains Remote Access to Unclassified Documents

The Chinese government has denied responsibility for a recent breach at the US Treasury, which allowed a threat actor to gain remote access to certain unclassified documents. The incident, which was reported earlier this month, has sparked concerns about the security of sensitive information and the potential implications for national security.

Background on the Breach

According to reports, United States Treasury officials informed lawmakers in a December 30 letter that they were notified of the "major incident" by third-party software service provider BeyondTrust on December 8. The letter was obtained by TechCrunch and other outlets, including CNN.

In the letter, Aditi Hardikar, assistant secretary for management at the Treasury, stated: "Based on available indicators, the incident has been attributed to a Chinese state-sponsored Advanced Persistent Threat (APT) actor." This attribution is based on evidence collected by investigators, who have been working with the Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation, US intelligence agencies, and third-party forensic investigators.

Chinese Government Denies Responsibility

The Chinese government has denied any involvement in the breach, stating that it "firmly opposes the U.S.’s smear attacks against China without any factual basis." This response is consistent with previous statements made by the Chinese government in similar situations, where they have consistently denied any involvement in cyberattacks.

Compromised Service Taken Offline

Treasury officials have assured lawmakers that the compromised service has been taken offline to prevent further unauthorized access. Hardikar told US senators Sherrod Brown and Tim Scott of the Banking Committee: "There is no evidence indicating the threat actor has continued access to Treasury systems or information."

However, this assurance may not be enough to alleviate concerns about the potential risks associated with the breach. The incident highlights the need for robust security measures to protect sensitive information from unauthorized access.

How the Breach Happened

BeyondTrust, which provides remote support services to the Treasury, reported identifying a security incident in its Remote Support product on December 2. After "anomalous behavior" was confirmed on December 5, BeyondTrust immediately revoked the API key and notified impacted customers soon after. Law enforcement was also notified, and BeyondTrust has been supporting the investigative efforts.

A 30-day supplemental report will be provided by the Treasury under the Federal Information Security Modernization Act, which will provide more details about the breach.

Rising Concerns About Cybersecurity

The US Treasury breach is just one of several high-profile incidents in recent times that have highlighted concerns about cybersecurity. The most recent Salt Typhoon breach, for example, allowed cybercriminals to access phone calls and text messages from lawmakers.

In another incident, Chinese hackers used a fake Skype app to target crypto users in a new phishing scam. This trend is part of a larger pattern of increasingly sophisticated cyberattacks that are putting sensitive information at risk.

Crypto Industry Under Attack

The crypto industry has been particularly vulnerable to cyber attacks this year, with thieves stealing over $2.3 billion worth of crypto assets across 165 major incidents in 2024. This represents a 40% increase compared to 2023, according to blockchain security firm Cyvers.

This rise in access control breaches, particularly on centralized exchanges and custodian platforms, has sparked concerns about the need for greater regulation and security measures in the industry.

White Hats Form Team to Fight Crypto Hacks

In response to these threats, a team of white hats known as "SEAL 911" has been formed to fight crypto hacks in real-time. This initiative aims to provide a coordinated response to cyberattacks, leveraging expertise from around the world to protect sensitive information and prevent further breaches.

Conclusion

The US Treasury breach highlights the ongoing risks associated with cyber attacks and the need for robust security measures to protect sensitive information. As the threat landscape continues to evolve, it is essential that governments and organizations prioritize cybersecurity and work together to share best practices and respond to emerging threats.

By staying informed about these issues and taking proactive steps to protect against cyberattacks, we can reduce the risk of breaches like this occurring in the future.