HomeCyber BalkansThe Treasury Department breached via BeyondTrust service

The Treasury Department breached via BeyondTrust service

Published on

spot_img

The recent cyber attack on the U.S. Treasury Department has brought to light the sophistication and persistence of Chinese state-sponsored threat actors. The breach, which occurred earlier this month, was traced back to a compromised cloud service provided by BeyondTrust, a privileged access management vendor. The Treasury Department disclosed the incident in a letter to members of the U.S. Senate Committee on Banking, Housing, and Urban Affairs, stating that an advanced persistent threat (APT) group had gained access to its systems.

According to the letter, the breach was a result of a compromised API key for BeyondTrust’s Remote Support services, which allowed threat actors to remotely access certain workstations and unclassified documents within the Treasury Department. BeyondTrust had issued a security advisory on December 8, alerting customers to the breach and revealing that a limited number of Remote Support SaaS customers were affected.

The exact method by which the threat actors obtained BeyondTrust’s API key remains unclear, although the vendor had disclosed two vulnerabilities affecting its Privileged Remote Access and Remote Support tools earlier in the month. BeyondTrust has not specified how these vulnerabilities were exploited in the breach involving the stolen API key.

In response to the incident, BeyondTrust took the compromised service offline and has been cooperating with law enforcement and third-party investigators to analyze the breach. The Treasury Department confirmed that there is no evidence to suggest the attackers maintained continued access to its data. The department has been collaborating with CISA, the FBI, and the U.S. intelligence community to understand the full impact of the breach.

The Treasury Department’s letter attributed the incident to a China state-sponsored APT actor, although the specific APT group responsible was not identified. This breach is just the latest in a string of cyber attacks by state-sponsored hackers linked to the People’s Republic of China. Last month, CISA and the FBI reported that PRC-affiliated hackers had breached U.S. telecommunications providers, accessing systems used for law enforcement agency requests.

The breach underscores the ongoing threat posed by nation-state actors in cyberspace and the need for heightened vigilance and cybersecurity measures to protect sensitive government data. As investigations into the breach continue, organizations are urged to remain vigilant and implement robust security protocols to defend against similar attacks in the future.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...