Treasury Secretary Janet Yellen’s computer was infiltrated by Chinese state-sponsored hackers, according to reports confirmed by Bloomberg News on Thursday.
The breach, described as a “major incident” by Treasury officials, also targeted computers belonging to two of Yellen’s deputies: Deputy Secretary Wally Adeyemo and Acting Under Secretary Brad Smith.
CHINESE HACKERS BREACH U.S. TREASURY COMPUTERS
Chinese state-sponsored hackers reportedly infiltrated the U.S. Treasury Department in December, compromising systems, including devices belonging to Treasury Secretary Janet Yellen and her deputies.
Hackers accessed fewer… pic.twitter.com/uwA7e3Rti8
— Mario Nawfal (@MarioNawfal) January 17, 2025
Celebrate Trump’s Historic 2024 Victory with the Exclusive Trump 47th President Collection!
The attack, which occurred in December, compromised the computer systems of the Treasury Department by exploiting a vulnerability in a third-party cybersecurity service provider, BeyondTrust, a work-from-home software app.
BESSENT: China was able to hack the US Treasury Dept using a Work-From-Home App
An app that was supported by the Biden Adminpic.twitter.com/A6bHRPzQdB
— Jack Poso (@JackPosobiec) January 16, 2025
Treasury officials confirmed that fewer than 50 unclassified files were accessed on Yellen’s computer.
Additionally, the breach affected more than 400 laptops and desktops, with employee usernames, passwords, and over 3,000 unclassified personal files stolen.
Treasury emails and classified materials, however, were not breached, officials said.
Investigators believe the hack was orchestrated by Chinese state-sponsored groups identified as Silk Typhoon and UNC5221.
These groups reportedly focused their efforts on Treasury operations related to sanctions, intelligence, and international affairs. Hackers also accessed “law enforcement sensitive” data tied to the Committee on Foreign Investment in the U.S., which evaluates national security risks associated with foreign investments.
The hackers reportedly worked outside normal business hours to avoid detection.
Following the breach, the Treasury Department alerted the Cybersecurity and Infrastructure Security Agency (CISA) and sought assistance from the FBI and other intelligence agencies.
Treasury officials spent Wednesday and Thursday briefing lawmakers and staff on Capitol Hill about the incident.
Treasury spokesperson Chris Hayden declined to provide additional details to Bloomberg when asked about the situation on Thursday.
China’s foreign ministry spokesperson Mao Ning responded to the allegations at the time, stating, “China has always opposed all forms of hacker attacks.”
This incident is the latest in a series of high-profile cyber intrusions attributed to Chinese hackers.
In 2023, email accounts belonging to key U.S. officials, including Commerce Secretary Gina Raimondo and U.S. Ambassador to China Nicholas Burns, were also breached.
The timing of the Treasury hack coincides with heightened scrutiny of U.S.-China relations.
Joe Biden last met with Chinese President Xi Jinping in November 2024 at the Asia-Pacific Economic Cooperation summit in Lima, Peru, shortly after President-elect Donald Trump’s reelection.
Before leaving office on Monday, President Biden is expected to sign an executive order aimed at bolstering America’s cybersecurity defenses.
The order will establish minimum cybersecurity standards for government technology contractors, requiring them to prove compliance.
The executive order is also expected to enhance measures for punishing foreign governments involved in cyberattacks, including those associated with China and Russia.
Treasury officials believe this policy could help deter future breaches like the one involving BeyondTrust’s systems.
The breach exposes the ongoing vulnerability of U.S. government systems to sophisticated cyberattacks and highlights the need for stronger protections against state-sponsored hacking.
The opinions expressed by contributors and/or content partners are their own and do not necessarily reflect the views of LifeZette. Contact us for guidelines on submitting your own commentary.
Read the full article here