• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisa: no wider federal impact from treasury cyberattack, investigation ongoing

CISA: No Wider Federal Impact from Treasury Cyberattack, Investigation Ongoing

You are here: Home / General Cyber Security News / CISA: No Wider Federal Impact from Treasury Cyberattack, Investigation Ongoing
January 7, 2025

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday said there are no indications that the cyber attack targeting the Treasury Department impacted other federal agencies.

The agency said it’s working closely with the Treasury Department and BeyondTrust to get a better understanding of the breach and mitigate its impacts.

“The security of federal systems and the data they protect is of critical importance to our national security,” CISA said. “We are working aggressively to safeguard against any further impacts and will provide updates, as appropriate.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The latest statement comes a week after the Treasury Department said it was the victim of a “major cybersecurity incident” that allowed Chinese state-sponsored threat actors to remotely access some computers and unclassified documents.

The cyber attack, which came to light in early December 2024, involved a breach of BeyondTrust’s systems that allowed the adversary to infiltrate some of the company’s Remote Support SaaS instances by making use of a compromised Remote Support SaaS API key.

In an updated statement on January 6, 2025, BeyondTrust said “no new customers have been identified beyond those we have communicated with previously.” China has denied allegations that it breached the U.S. Treasury Department.

Cybersecurity

Data shared by attack surface management company Censys shows that as many as 13,548 exposed BeyondTrust Remote Support and Privileged Remote Access instances have been observed online as of January 6.

Last week, the Treasury Department’s Office of Foreign Assets Control (OFAC) announced sanctions against a Chinese cybersecurity company, Integrity Technology Group, Incorporated, accusing it of lending infrastructure support to another hacking group called Flax Typhoon as part of a long-running campaign against U.S. critical infrastructure.

The attack against the Treasury is the latest in a wave of intrusions perpetrated by Chinese threat actors such as Volt Typhoon and Salt Typhoon targeting U.S. critical infrastructure and telecommunications networks, respectively.

The Wall Street Journal revealed that among the nine telecom companies breached by Salt Typhoon are Charter Communications, Consolidated Communications, and Windstream. Some of the other entities previously identified included AT&T, T-Mobile, Verizon, and Lumen Technologies.

In a new report published today, Bloomberg said the Chinese state-sponsored threat group dubbed APT41 penetrated the executive branch of the Philippines government and siphoned sensitive data related to disputes over the South China Sea as part of a yearslong campaign from early 2023 to June 2024.

China Ramps Up Cyber Attacks on Taiwan

The developments also follow a report from Taiwan’s National Security Bureau (NSB), warning of increasing sophistication of cyber attacks orchestrated by China against the country. A total of 906 cases of cyber incidents have been registered against government and private sector entities in 2024, up from 752 in 2023.

The modus operandi entails typically exploiting vulnerabilities in Netcom devices and utilizing living-off-the-land (LotL) techniques to establish footholds, evade detection, and deploy malware for follow-on attacks and data theft. Alternative attack chains involve sending spear-phishing emails to Taiwanese civil servants.

Other widely observed Chinese attacks against Taiwanese targets are listed below –

  • Distributed denial-of-service (DDoS) attacks on transportation and financial sectors coinciding with military drills by the People’s Liberation Army (PLA)
  • Ransomware attacks on the manufacturing sector
  • Targeting high-tech startups to steal patented technologies
  • Theft of personal data of Taiwanese nationals to sell them on underground cybercrime forums.
  • Criticism of Taiwan’s cybersecurity capabilities on social media platforms to erode confidence in the government

“Attacking the communications field, mainly telecommunications industry, has grown by 650%, and attacking the fields of transportation and defense supply chain have grown by 70% and 57%, respectively,” the NSB said.

Cybersecurity

“By applying diverse hacking techniques, China has conducted reconnaissance, set cyber ambushes, and stolen data through hacking operations targeting Taiwan’s government, critical infrastructure, and key private enterprises.”

The NSB has also called out China for conducting influence operations against Taiwan, conducting disinformation campaigns seeking to undermine public confidence in the government and heighten social divisions via social media platforms like Facebook and X.

Notable among the tactics is the extensive use of inauthentic accounts to flood comment sections on social media platforms used by Taiwanese people to disseminate manipulated videos and meme images. Malicious cyber activities have also been found to hijack Taiwanese users’ social media accounts to spread disinformation.

“China has been using Deepfake technology to fabricate video clips of Taiwanese political figures’ speeches, attempting to mislead the Taiwanese public’s perception and understanding,” the NSB said.

“In particular, China actively establishes convergence media brands or proxy accounts on platforms such as Weibo, TikTok, and Instagram, working to spread official media content and Taiwan-focused propaganda.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «moxa alerts users to high severity vulnerabilities in cellular and secure Moxa Alerts Users to High-Severity Vulnerabilities in Cellular and Secure Routers
Next Post: New EAGERBEE Variant Targets ISPs and Governments with Advanced Backdoor Capabilities new eagerbee variant targets isps and governments with advanced backdoor»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.