Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    Amazon blames human employees for an AI coding agent’s mistake

    Amazon blames human employees for an AI coding agent’s mistake

    February 20, 2026
    Trump Mobile is just Liberty Mobile in gold foil

    Trump Mobile is just Liberty Mobile in gold foil

    February 20, 2026
    Smart glasses in court are a privacy nightmare

    Smart glasses in court are a privacy nightmare

    February 20, 2026
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » US Treasury Department Admits It Got Hacked by China
    Security

    US Treasury Department Admits It Got Hacked by China

    News RoomBy News RoomJanuary 3, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    US Treasury Department Admits It Got Hacked by China

    A disclosure notice to the United States Congress on Monday revealed that the US Treasury Department suffered a breach earlier this month that allowed hackers to remotely access some Treasury computers and “certain unclassified documents.”

    The attackers exploited vulnerabilities in remote tech support software provided by the identity and access management firm BeyondTrust, and Treasury said in its letter to lawmakers that “the incident has been attributed to a China state-sponsored Advanced Persistent Threat (APT) actor.” Reuters first reported the disclosure and its contents.

    In the notice, Treasury officials said that BeyondTrust notified the agency of the incident on December 8 after attackers were able to steal an authentication key and use it to bypass system defenses and gain access to Treasury workstations.

    “The compromised BeyondTrust service has been taken offline and at this time there is no evidence indicating the threat actor has continued access to Treasury information,” Treasury assistant secretary for management Aditi Hardikar wrote the lawmakers. “In accordance with Treasury policy, intrusions attributable to an APT are considered a major cybersecurity incident.”

    The disclosure says that Treasury has been collaborating with the FBI, the Cybersecurity and Infrastructure Security Agency, and the intelligence community broadly as well as private “forensic investigators” to evaluate the situation. The Treasury and FBI did not immediately return WIRED’s request for additional information about the breach. CISA referred questions back to the Treasury Department.

    In response to questions about the Treasury Department breach notification, BeyondTrust spokesperson Mike Bradshaw said in a statement that, “BeyondTrust previously identified and took measures to address a security incident in early December 2024 that involved the Remote Support product. BeyondTrust notified the limited number of customers who were involved, and it has been working to support those customers since then.”

    On December 8, BeyondTrust published an alert that it has continued to update about “a security incident that involved a limited number of Remote Support SaaS customers.” (SaaS stands for “software as a service.”) Though the notification does not say that the US Treasury was one of the impacted customers, the timeline and details appear to line up with the Treasury disclosure, including acknowledgment from BeyondTrust that attackers compromised an application programming interface key.

    The BeyondTrust alert mentions two exploited vulnerabilities involved in the situation—the critical command injection vulnerability “CVE-2024-12356” and the medium-severity command injection vulnerability “CVE-2024-12686.” CISA added the former CVE to its “Known Exploited Vulnerabilities Catalog” on December 19. Command injection vulnerabilities are common application flaws that can be easily exploited to gain access to a target’s systems.

    “I cannot believe that we’re seeing command injection vulnerabilities in 2024 in any products, let alone a secure remote access product that’s supposed to have additional vetting for use by the US government,” says Jake Williams, vice president of research and development at the cybersecurity consultancy Hunter Strategy and a former NSA hacker. “They are some of the easiest bugs to identify and remediate at this point.”

    BeyondTrust is an accredited “Federal Risk and Authorization Management Program” vendor, but Williams speculates that it is possible that the Treasury was using a non-FedRAMP version of the company’s Remote Support and Privileged Remote Access cloud products. If the breach actually affected FedRAMP-certified cloud infrastructure, though, Williams says, “it might be the first breach of one and almost certainly the first time FedRAMP cloud tools were abused to facilitate remote access to a customer’s systems.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleNew evidence suggests Elon Musk is cosplaying his superfan Adrian Dittmann
    Next Article The Tesla Cybertruck isn’t living up to expectations

    Related Posts

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    December 6, 2025
    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    December 5, 2025
    Your Data Might Determine How Much You Pay for Eggs

    Your Data Might Determine How Much You Pay for Eggs

    December 4, 2025
    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    December 4, 2025
    This Hacker Conference Installed a Literal Antivirus Monitoring System

    This Hacker Conference Installed a Literal Antivirus Monitoring System

    December 4, 2025
    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    December 4, 2025
    Our Picks
    Trump Mobile is just Liberty Mobile in gold foil

    Trump Mobile is just Liberty Mobile in gold foil

    February 20, 2026
    Smart glasses in court are a privacy nightmare

    Smart glasses in court are a privacy nightmare

    February 20, 2026
    Prediction markets want to eat the news

    Prediction markets want to eat the news

    February 20, 2026
    Meta will ruin its smart glasses by being Meta

    Meta will ruin its smart glasses by being Meta

    February 20, 2026
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    West Virginia sues Apple for allegedly letting child abuse spread in iCloud News

    West Virginia sues Apple for allegedly letting child abuse spread in iCloud

    By News RoomFebruary 19, 2026

    West Virginia has filed a lawsuit against Apple, accusing the company of allowing the distribution…

    Texas is suing TP-Link over its ties to China

    Texas is suing TP-Link over its ties to China

    February 19, 2026
    The executive that helped build Meta’s ad machine is trying to expose it

    The executive that helped build Meta’s ad machine is trying to expose it

    February 19, 2026
    A K+ bounty is waiting for anyone who can unplug Ring doorbells from Amazon’s cloud

    A $10K+ bounty is waiting for anyone who can unplug Ring doorbells from Amazon’s cloud

    February 19, 2026
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2026 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.