Threat actors entered Treasury Department systems through BeyondTrust. The breach may be related to the Salt Typhoon attacks reported throughout the year. A Chinese-state-sponsored cyberattack ...
BeyondTrust, a Johns Creek-based software vendor, notified Treasury on Dec. 8 that a threat actor had obtained access to a digital key BeyondTrust uses to provide remote tech support for the ...
On December 8, the Treasury was notified by BeyondTrust that a key used for remote technical support had been pilfered, meaning that a threat actor could access some Departmental Office workstations ...
The hack, described as a "major incident" by Treasury officials, involved the compromise of a third-party cybersecurity service provider, BeyondTrust, and resulted in the theft of unclassified ...
The application offers remote technical support to its employees. The compromised third-party service - called BeyondTrust - has since been taken offline, officials said. There was no evidence to ...
The cybersecurity firm, BeyondTrust, was the first to become aware of the breach, alerting the Treasury Department on December 8th. According to the Treasury, the hackers broke into employee ...
The US Treasury has confirmed it suffered a breach The compromise came through third party systems BeyondTrust China have denied any involvement The US Treasury Department has confirmed that ...
"On December 8, 2024, Treasury was notified by a third-party software service provider, BeyondTrust, that a threat actor had gained access to a key used by the vendor to secure a cloud-based service ...
The details of the hack were in a letter shared by Reuters, which advised that on Dec. 8, the Treasury Department was notified by a third-party software provider, BeyondTrust Corp., that a threat ...
The attackers exploited vulnerabilities in remote tech support software provided by the identity and access management firm BeyondTrust, and Treasury said in its letter to lawmakers that “the ...
The hackers stole a key from a third-party software service provider, BeyondTrust, and used it to override security and gain access to Treasury Department workstations, according to the letter ...