Security

CSO

Chinese cyber-spies reportedly targeted sanctions intel in US Treasury raid

OFAC, Office of the Treasury Secretary feared hit in data-snarfing swoop


Chinese spies who compromised the US Treasury Department's workstations reportedly stole data belonging to a government office responsible for sanctions against organizations and individuals.

On Monday, the Treasury sent a letter to Congress disclosing the cyberattack. Days later, we learned Beijing's snoops specifically targeted the Office of Foreign Assets Control (OFAC), which administers economic and trade sanctions, as well as the Office of the Treasury Secretary, according to a Washington Post report.

The security breach indicates the measures China is taking to gather intelligence on America and Uncle Sam in general, and particularly those related to Chinese entities that may soon face sanctions, the WaPo noted, citing anonymous US officials.

The December 30 letter that the Treasury's Assistant Secretary for Management Aditi Hardikar sent to US lawmakers blamed the intrusion on an earlier BeyondTrust security incident in which miscreants snatched an API key for the software maker's Remote Support SaaS product. This allowed the key's thieves to remotely access some Treasury office workstations and "certain, unclassified documents" maintained by those users.

Instances of BeyondTrust services that were compromised by the snoops were taken offline and at this time, "there is no evidence indicating the threat actor has continued access to Treasury information," the letter continued.

Neither the US Treasury nor China's Ministry of Foreign Affairs responded to The Register's inquiries about the security breach.

A BeyondTrust spokesperson directed customers to a now-updated advisory about the snafu, and told The Register it took steps to shore up its security. "All cloud instances have been patched for this vulnerability," the biz noted. "We have also released a patch for self-hosted versions."

"BeyondTrust notified the limited number of customers who were involved, and it has been working to support those customers since then," the spokesperson told us. "No other BeyondTrust products were involved. Law enforcement was notified and BeyondTrust has been supporting the investigative efforts." 

The Treasury letter also attributes the security breach to a "China state-sponsored Advanced Persistent Threat (APT) actor," which is noteworthy because US officials don't often play the blame game with other governments' cyber-espionage crews this early in the investigation.

"It is unusual for an early notice, especially in case of such breaches, to be able to make such clear attributions," SafeBreach Chief Information Security Officer Avishai Avivi said in an email to The Register

"Looking through the technical details provided by BeyondTrust, we can see that the vulnerability was associated with four IP addresses," Avivi continued.

"These addresses belong to DigitalOcean, a New Jersey Cloud Service Provider (CSP). This information indicates to me that the malicious actors used this cloud provider as a jumping-off point to infiltrate the BeyondTrust service and exploit the trusted connection to the US Treasury. The clear attribution suggests that the investigation was able to link these four addresses to accounts originating in China."

This latest Chinese intrusion into US networks comes as government officials and law enforcement continue to investigate another Beijing-backed snooping effort that compromised at least nine American telecommunications companies, giving them the "capability to geolocate millions of individuals" and "record phone calls at will."

This attack, which has been attributed to Salt Typhoon, has been called the "worst telecom hack" in US history, and was among the escalating cyber incidents the Feds blamed on the Chinese government in 2024. ®

Send us news
3 Comments

Xi know what you did last summer: China was all up in Republicans' email, says book

Of course, Microsoft is in the mix, isn't it

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack

Chinese spies suspected of 'moonlighting' as tawdry ransomware crooks

Some employees steal sticky notes, others 'borrow' malicious code

More victims of China's Salt Typhoon crew emerge: Telcos just now hit via Cisco bugs

Networks in US and beyond compromised by Beijing's super-snoops pulling off priv-esc attacks

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’

FYI: What NOT to search after committing a crime

With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare

244M purloined passwords added to Have I Been Pwned thanks to govt tip-off

US Cyber Command reportedly pauses cyberattacks on Russia

PLUS: Phishing suspects used fishing gear as alibi; Apple's 'Find My' can track PCs and Androids; and more

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process