$4.99/mo - Save 61% With Exclusive 2-Year Plan + 4 Months Free!Claim Now

Chinese Hackers Breach US Treasury, Exploit Vendor Access

  • Last updated January 3, 2025
  • written by
    Writer

Washington, December 31, 2024Chinese hackers breached the U.S. Treasury by exploiting a vendor vulnerability, exposing federal systems to cyber-espionage risks. 

In a shocking revelation, the U.S. Treasury Department confirmed it was targeted by Chinese state-backed hackers who exploited vulnerabilities in a third-party software provider. This breach has been labeled a major cybersecurity incident” by federal officials, raising alarming questions about the nation’s digital defenses.

The hackers gained access through BeyondTrust, a vendor that provides critical cloud-based technical support services. According to a letter sent to Congress, the breach exposed unclassified documents and remotely accessed Treasury workstations, potentially compromising sensitive information.

The Cybersecurity and Infrastructure Security Agency, FBI, and other intelligence bodies are investigating the incident. The breach is part of a broader wave of alleged cyber-espionage attacks by Chinese state-sponsored groups, including the infamous Salt Typhoon, which recently infiltrated U.S. telecom networks.

The Chinese embassy in Washington dismissed the allegations, claiming:

This breach also jeopardizes contracts with BeyondTrust, valued at over $4 million and spanning agencies like the Department of Defense and Veterans Affairs. Officials have taken the compromised system offline and assured there’s no ongoing threat to Treasury systems.

Governor Dan McKee called for stricter oversight, warning:


Other News At VPNRanks


Hey, wait!

Stay informed on the latest privacy updates, cybersecurity insights, and internet freedom news by following VPNRanks news daily! As your primary resource for critical updates in online security, we ensure you’re always in the know. Make VPNRanks your go-to guide for safeguarding your digital life!

Leave a Reply

Your email address will not be published. Required fields are marked *