Golden Financier
  • Investing
  • Stock
  • Latest News
  • Editor’s Pick
  • Economy

    Stay updated with the latest news, exclusive offers, and special promotions. Sign up now and be the first to know! As a member, you'll receive curated content, insider tips, and invitations to exclusive events. Don't miss out on being part of something special.


    By opting in you agree to receive emails from us and our affiliates. Your information is secure and your privacy is protected.
    Popular Topics
    • Top crypto price predictions: Pepe Coin, Shiba Inu, Cardano
    • Trump may slash China tariffs to 50% as US-China trade talks heat up: report
    • Dollar gains weekly as markets pin hopes on US-China trade talks
    • Geopolitical tensions jeopardise energy flows in India and Pakistan
    • US solar tariffs disrupt global supply chains and reshape trade routes
    • About us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    Golden Financier
    • Investing
    • Stock
    • Latest News
    • Editor’s Pick
    • Economy
    • Stock

    China-linked hackers target US Treasury through compromised software provider in cyber attack

    • December 31, 2024
    • admin

    According to a letter sent to Congress, Chinese state-sponsored hackers accessed sensitive Treasury data through a compromised cloud-based service provided by BeyondTrust Inc.

    While the department has contained the immediate threat, the incident reveals significant risks in outsourcing critical infrastructure to external vendors.

    This breach comes amid escalating concerns over cyber-espionage campaigns targeting US agencies and private firms, raising questions about the robustness of existing security protocols.

    As international tensions flare, cybersecurity is emerging as a pivotal issue in safeguarding national interests.

    Chinese-linked hackers exploit software provider loophole

    Investigations into the Treasury breach revealed that hackers gained access via a key used by BeyondTrust to secure its cloud-based services.

    The attack allowed the perpetrators to infiltrate specific Treasury workstations and access unclassified documents.

    BeyondTrust, a federal contractor with over $4 million in government contracts, also serves the Departments of Defense, Veterans Affairs, and Justice.

    While the affected service has been disabled, the incident has drawn scrutiny to the broader ecosystem of third-party vendors.

    Experts are questioning whether stringent security audits are being conducted before awarding such contracts, particularly given the sensitive nature of the data involved.

    The breach highlights an alarming trend: state-backed actors increasingly targeting indirect entry points, such as contractors, to bypass direct security measures.

    The Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and other agencies are now collaborating on the investigation, aiming to prevent recurrence.

    China-US cyber tensions escalate

    This incident is part of a wider pattern of alleged cyber-espionage by Chinese state-sponsored groups.

    Notably, the Salt Typhoon group has been implicated in attacks on US telecommunications firms, reportedly accessing private communications of prominent political figures.

    These breaches come after a period of relative détente in US-China relations, complicating diplomatic efforts.

    China has denied involvement, with its Washington embassy accusing the US of “smear attacks” and demanding evidence.

    The timing of these incidents, coinciding with President Biden’s final month in office, has fuelled speculation about geopolitical motives.

    The Treasury hack and telecom espionage expose a critical vulnerability in the US government’s cyber defences: reliance on third-party vendors.

    With agencies dependent on private firms for operational support, the potential for supply chain infiltration becomes a pressing concern.

    These developments have reignited debates on domestic technological self-reliance and the need for stricter cybersecurity frameworks.

    What’s next for US cybersecurity policy?

    In response to these threats, the White House has pledged decisive action, including a ban on China Telecom and plans for stricter oversight of federal contractors.

    These measures align with broader efforts to hold Beijing accountable for cyberattacks while strengthening domestic cybersecurity infrastructure.

    The Treasury breach has also prompted a reassessment of vendor relationships.

    Moving forward, agencies are likely to demand enhanced compliance measures from contractors, ensuring better protection against state-sponsored threats.

    Meanwhile, cybersecurity experts are urging the administration to invest in advanced detection systems to identify breaches earlier.

    As the geopolitical stakes rise, the Treasury hack serves as a stark reminder of the need for proactive measures in securing the nation’s digital assets.

    The post China-linked hackers target US Treasury through compromised software provider in cyber attack appeared first on Invezz


    admin

    Previous Article
    • Stock

    Blackstone stock price could dive 22% before rebounding

    • December 31, 2024
    • admin
    View Post
    Next Article
    • Economy

    How will emerging market equities perform in 2025?

    • December 31, 2024
    • admin
    View Post

      Stay updated with the latest news, exclusive offers, and special promotions. Sign up now and be the first to know! As a member, you'll receive curated content, insider tips, and invitations to exclusive events. Don't miss out on being part of something special.


      By opting in you agree to receive emails from us and our affiliates. Your information is secure and your privacy is protected.
      Popular Topics
      • Top crypto price predictions: Pepe Coin, Shiba Inu, Cardano
      • Trump may slash China tariffs to 50% as US-China trade talks heat up: report
      • Dollar gains weekly as markets pin hopes on US-China trade talks
      • Geopolitical tensions jeopardise energy flows in India and Pakistan
      • US solar tariffs disrupt global supply chains and reshape trade routes

      Input your search keywords and press Enter.