US Treasury hacked by state-sponsored Chinese APT group

0
3K

The U.S. Treasury Department Dec. 30 informed Congress that it sustained a “major cybersecurity incident” at the hands of a state-sponsored Chinese group in which a BeyondTrust API key was hacked, resulting in the compromise of Treasury workstations and the theft of unclassified documents.

 

In a letter to the Senate Committee on Banking, Housing and Urban Affairs, Aditi Hardikar, assistant secretary for management at Treasury, said that on Dec. 8, BeyondTrust notified Treasury that the threat actor used the stolen key to access the department’s systems.

Hardikar told the Senators that the compromised BeyondTrust cloud service was taken offline and that there was no evidence indicating that the threat actor has continued its access to Treasury information.

The Treasury Department will offer more information on this incident in its 30-day follow-up report later in January.

This incident joins a growing list of attacks on security firms, including Okta, LastPass, SolarWinds, and Snowflake, said former NSA expert Evan Dornbush.

“In today's interconnected landscape, the perimeter has all but vanished,” said Dornbush. “A single zero-day exploit against a vendor can cripple your own operations. The BeyondTrust response, while remarkably swift, underscores this harsh reality.”

The latest release by Treasury makes a little more sense of CISA’s Dec. 19 announcement of adding the BeyondTrust vulnerability CVE-2024-12356 to the KEV list, said John Bambenek, president at Bambenek Consulting.

Bambenek said at the time, CISA announced a limited number of customer’s Remote Support SaaS instances were targeted: it now appears that the U.S. Treasury was one of those customers.

While it’s a stunning year-end announcement from Treasury, we still don’t know how many workstations were compromised, which documents were stolen, and which advanced persistent threat (APT) conducted the campaign.

Given the recent stories about Chinese threat actor Salt Typhoon attacking up to nine U.S. telecoms, some speculated that they were the culprits.

But as of the afternoon of Dec. 31, no further details had emerged.    

“At this point, I don’t see anything to indicate clearly that it’s Salt Typhoon beyond it being the Chinese APT on people’s mind because of the recent telecom breaches,” said Bambenek. “However, that doesn’t mean it couldn’t be either.”

Dornbush gave some further context to the BeyondTrust hack, pointing out that they moved quickly. The hack was initially discovered on Dec. 2, with the root cause identified by Dec. 5. Clients were notified on Dec. 8, and BeyondTrust released on patch Dec. 16.

“Sixteen days from discovery to mitigation, patching, disclosure, and attribution is impressive,” said Dornbush. “However, this speed doesn't negate the fundamental problem: their zero-days are your problem. While BeyondTrust acted quickly, the attackers likely exfiltrated data long before the patch was available. In smash-and-grab operations like this, data theft doesn't take 16 days.”

 

 

***

 

 

Wow
1
Cerca
Categorie
Leggi tutto
Real Time Facts
Sydney Jews Fear for Their Safety After Large-Scale Antisemitic Vandalism
Buildings and cars were spray painted and some were torched causing $100,000 of damage  ...
By Israel Swords of Iron Ops 2024-11-24 12:56:58 0 3K
Analysis
OpEd - How do we create peace in Gaza?
Oct. 7th, 2023, was the day that the world should have come to its senses and said, “No...
By Israel Swords of Iron Ops 2024-01-09 09:31:33 0 7K
News & Politics
THEY WANT YOU CRUSHED & ENSLAVED. WEF’S MOST INSANE AND TYRANNICAL PLANS EXPOSED
The World Economic Forum — cradle of globalists and utopians — has pushed some of the...
By NavyVetUnited 2025-05-23 08:08:00 0 2K
News & Politics
Russia ready for contacts with Trump administration, ball is in US court, syas Russian FM Lavrov
Russia is open to contacts with the US under the Donald Trump administration, the ball is in the...
By NavyVetUnited 2024-11-14 13:52:53 0 4K
PAID POST