China Denies Role in US Treasury Hack as Officials Point to State-Backed Attack

Beijing calls allegations 'malicious hype' as Washington investigates cyberattack targeting government email systems

  • US Treasury workstations experienced unauthorized access from suspected Chinese threat actors.
  • BeyondTrust, a third-party service provider, detected the breach on December 8.
  • Chinese embassy spokesperson explicitly denies involvement in the incident.
  • Breach allowed remote access to unclassified Treasury documents.
  • US Treasury Assistant Secretary confirms Chinese state-sponsored APT attribution.

US Treasury Reports Chinese-Linked Breach of Employee Systems

- Advertisement -

The US Treasury Department disclosed a security incident involving unauthorized access to employee workstations, with officials attributing the breach to Chinese state-sponsored actors. The revelation comes amid escalating Cybersecurity tensions between the two global powers.

Incident Detection and Response

According to China-hackers-treasury-workstations/index.html”>reports, Treasury officials learned of the breach through BeyondTrust, their security software provider, on December 8. The incident, classified as “major,” permitted remote access to certain unclassified documents within the department’s systems.

Assistant Secretary for Management Aditi Hardikar outlined the situation in a letter to lawmakers dated December 30. The communication specifically identified the threat as an Advanced Persistent Threat (APT) actor – a term describing sophisticated, state-sponsored cyber operations.

Diplomatic Fallout

The Chinese embassy in Washington DC promptly contested these allegations. A spokesperson issued an official statement to Reuters, explicitly rejecting any connection to the incident. This response aligns with China’s historical pattern of denying involvement in international cyber operations.

The breach highlights ongoing cybersecurity challenges facing US financial institutions. APT groups typically employ sophisticated techniques to maintain long-term unauthorized access to networks while evading detection systems. This incident underscores the persistent nature of state-sponsored cyber threats targeting critical financial infrastructure.

✅ Follow BITNEWSBOT on Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest

Michael Saylor Invites Joe Rogan to Discuss Bitcoin on Podcast

Michael Saylor has shown interest in discussing Bitcoin on The Joe Rogan Experience podcast.The idea has generated excitement in the Bitcoin community, with some...

Congress Debates Stablecoin Bill Amid Rising Bank and Crypto Tensions

U.S. lawmakers are moving forward with the Senate Guiding and Establishing National Innovation for U.S. Stablecoins (GENIUS) Act, with debates set to resume after...

American Engineer Drugged, Robbed in Sophisticated London Crypto Heist

An American software engineer lost approximately $123,000 in cryptocurrency after being drugged and robbed in London.The victim was targeted by an impersonator posing as...

Max Keiser Doubts New Bitcoin Treasuries’ Discipline in Bear Market

Bitcoin-focused companies are increasingly copying the treasury strategy used by Michael Saylor's Strategy.Max Keiser raised doubts about whether these newer companies can maintain commitment...

South Korea Election Puts Crypto Policy at Center of Debate

Nearly one-third of South Koreans hold digital assets, making crypto a vital issue in the upcoming presidential election.Both major parties support crypto exchange-traded funds...

Must Read

7 Best NFT Marketplaces for Every Need

Open Sea | Pianity | Foundation | Magic Eden | SuperRare | Rarible | Theta Drop | Other Platforms | About NFTs | FAQ...