China Denies Role in US Treasury Hack as Officials Point to State-Backed Attack

Beijing calls allegations 'malicious hype' as Washington investigates cyberattack targeting government email systems

  • US Treasury workstations experienced unauthorized access from suspected Chinese threat actors.
  • BeyondTrust, a third-party service provider, detected the breach on December 8.
  • Chinese embassy spokesperson explicitly denies involvement in the incident.
  • Breach allowed remote access to unclassified Treasury documents.
  • US Treasury Assistant Secretary confirms Chinese state-sponsored APT attribution.

US Treasury Reports Chinese-Linked Breach of Employee Systems

- Advertisement -

The US Treasury Department disclosed a security incident involving unauthorized access to employee workstations, with officials attributing the breach to Chinese state-sponsored actors. The revelation comes amid escalating Cybersecurity tensions between the two global powers.

Incident Detection and Response

According to China-hackers-treasury-workstations/index.html”>reports, Treasury officials learned of the breach through BeyondTrust, their security software provider, on December 8. The incident, classified as “major,” permitted remote access to certain unclassified documents within the department’s systems.

Assistant Secretary for Management Aditi Hardikar outlined the situation in a letter to lawmakers dated December 30. The communication specifically identified the threat as an Advanced Persistent Threat (APT) actor – a term describing sophisticated, state-sponsored cyber operations.

Diplomatic Fallout

The Chinese embassy in Washington DC promptly contested these allegations. A spokesperson issued an official statement to Reuters, explicitly rejecting any connection to the incident. This response aligns with China’s historical pattern of denying involvement in international cyber operations.

- Advertisement -

The breach highlights ongoing cybersecurity challenges facing US financial institutions. APT groups typically employ sophisticated techniques to maintain long-term unauthorized access to networks while evading detection systems. This incident underscores the persistent nature of state-sponsored cyber threats targeting critical financial infrastructure.

✅ Follow BITNEWSBOT on Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Aave Founder’s $30M Mansion Fuels Fee Debate

A heated governance debate over control of the Aave brand has reignited within the...

Canada Regulator Unveils Stricter Crypto Custody Rules

Canada's investment regulator, CIRO, has introduced a stricter Digital Asset Custody Framework to mitigate...

Ethereum’s Next Upgrade, Hegota, Takes Shape

Ethereum developers are planning the Hegota upgrade while finalizing the upcoming "Glamsterdam" update.Fork-choice inclusion...

Tesla Adds Model Y Variant, Cuts Premium S and X

Tesla launched a new Model Y All-Wheel Drive variant and renamed its standard version,...

Hedera’s Hiero Swift SDK Adds Swift 6 Support in v0.47.0

Hedera's Hiero Swift SDK now officially supports Swift 6.0, 6.1, and 6.2 as of...
- Advertisement -

Must Read

10 Best Crypto to Mine Without Special Hardware Equipment

A lot of people mostly think that it takes a difficult process to mine cryptocurrency. today we are going to show you some of...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!