{"id":89068,"date":"2024-12-31T00:16:14","date_gmt":"2024-12-31T00:16:14","guid":{"rendered":"https:\/\/neclink.com\/index.php\/2024\/12\/31\/the-us-treasury-department-says-it-was-hacked-in-a-china-linked-cyberattack\/"},"modified":"2024-12-31T00:16:14","modified_gmt":"2024-12-31T00:16:14","slug":"the-us-treasury-department-says-it-was-hacked-in-a-china-linked-cyberattack","status":"publish","type":"post","link":"https:\/\/neclink.com\/index.php\/2024\/12\/31\/the-us-treasury-department-says-it-was-hacked-in-a-china-linked-cyberattack\/","title":{"rendered":"The US Treasury Department says it was hacked in a China-linked cyberattack"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Documents and workstations at the US Treasury Department were accessed during a cyberattack, <a data-i13n=\"elm:context_link;elmt:doNotAffiliate;cpos:1;pos:1\" class=\"link \" href=\"https:\/\/www.nytimes.com\/2024\/12\/30\/us\/politics\/china-hack-treasury.html\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:The New York Times;elm:context_link;elmt:doNotAffiliate;cpos:1;pos:1;itc:0;sec:content-canvas\"><em>The New York Times<\/em><\/a><em>\u00a0<\/em>reports. The attack was linked to a &#8220;China state-sponsored Advanced Persistent Threat actor&#8221; and has been characterized as &#8220;a major cybersecurity incident.&#8221;<\/p>\n<p><a data-i13n=\"elm:context_link;elmt:doNotAffiliate;cpos:2;pos:1\" class=\"link \" href=\"https:\/\/www.documentcloud.org\/documents\/25472698-letter-from-treasury-re-december-2024-cyberattack\/\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:According to a letter;elm:context_link;elmt:doNotAffiliate;cpos:2;pos:1;itc:0;sec:content-canvas\">According to a letter<\/a> the Treasury Department shared with lawmakers (<a data-i13n=\"elm:context_link;elmt:doNotAffiliate;cpos:3;pos:1\" class=\"link \" href=\"https:\/\/techcrunch.com\/2024\/12\/30\/us-treasury-says-china-stole-documents-in-major-cyberattack\/\" data-ylk=\"slk:via TechCrunch;elm:context_link;elmt:doNotAffiliate;cpos:3;pos:1;itc:0;sec:content-canvas\">via TechCrunch<\/a>), US officials were made aware of the issue on December 8, when BeyondTrust, a third-party software company, shared that a security key used to provide technical support was used to access workstations and unclassified documents.<\/p>\n<p>The Treasury Department said that it has worked with the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI to understand the full scope of the breach, but hasn&#8217;t shared how long files and workstations were accessible or what was actually accessed. Engadget has contacted the US Treasury Department and will update this article once we know more.<\/p>\n<p>The cyberattack follows a similarly concerning, but separate <a data-i13n=\"elm:context_link;elmt:doNotAffiliate;cpos:4;pos:1\" class=\"link \" href=\"https:\/\/www.engadget.com\/cybersecurity\/fbi-suspects-china-linked-hackers-accessed-officials-call-logs-and-sms-messages-report-says-000434865.html\" data-ylk=\"slk:breach of US telecom carriers;elm:context_link;elmt:doNotAffiliate;cpos:4;pos:1;itc:0;sec:content-canvas\">breach of US telecom carriers<\/a> that came to light in October 2024. That cyberattack was perpetrated by a Chinese hacking group referred to as &#8220;Salt Typhoon.&#8221; Attackers gained access to unencrypted SMS messages and call logs of politicians, government officials and others for<a data-i13n=\"elm:context_link;elmt:doNotAffiliate;cpos:5;pos:1\" class=\"link \" href=\"https:\/\/www.engadget.com\/cybersecurity\/new-report-details-vast-spying-by-china-linked-telecom-hackers-010347224.html\" data-ylk=\"slk:months;elm:context_link;elmt:doNotAffiliate;cpos:5;pos:1;itc:0;sec:content-canvas\"> months<\/a> before the breach was discovered.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.engadget.com\/cybersecurity\/the-us-treasury-department-says-it-was-hacked-in-a-china-linked-cyberattack-230114104.html?src=rss\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Documents and workstations at the US Treasury Department were accessed during a cyberattack, The New York Times\u00a0reports. The attack was linked to a &#8220;China state-sponsored<\/p>\n","protected":false},"author":1,"featured_media":89069,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[157],"tags":[],"class_list":["post-89068","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gadget"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts\/89068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/comments?post=89068"}],"version-history":[{"count":0,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts\/89068\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/media\/89069"}],"wp:attachment":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/media?parent=89068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/categories?post=89068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/tags?post=89068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}