U.S. National Guard HACKED: Data at Risk

National Guard logo over a distressed American flag.

For nearly a year, a Chinese state-sponsored hacking group, Salt Typhoon, has been rummaging through the U.S. National Guard’s network, raising serious concerns about national security.

At a Glance

  • Salt Typhoon, linked to China, breached a U.S. state’s Army National Guard network from March to December 2024.
  • The breach provided access to sensitive military and law enforcement data.
  • The hacking group has a history of targeting U.S. telecoms and political communications.
  • The incident underscores the vulnerabilities in U.S. cybersecurity defenses.

Chinese Espionage in the U.S. National Guard

For almost a year, from March to December 2024, Salt Typhoon, a notorious Chinese hacking group, infiltrated a U.S. state’s Army National Guard network. This breach, detailed in a DHS memo, has exposed sensitive military and law enforcement information, including personal data of service members. The U.S. Department of Defense discovered and reported this breach, which the National Guard Bureau confirmed, though they claimed it did not disrupt missions. The breach’s full scope and the data exfiltrated are still under investigation.

Salt Typhoon, also known as APT41, has been on the radar for years, linked directly to China’s Ministry of State Security. This group has a track record of conducting both cyber espionage for the Chinese government and financially motivated cybercrimes. Its ability to blend different operations makes it a particularly formidable and elusive threat. The breach into the National Guard’s network is not an isolated incident but part of a broader pattern of Chinese cyber intrusions targeting critical U.S. infrastructure.

Implications of the Breach

The implications of this breach are staggering. In the short term, there’s an immediate threat to the security of military and law enforcement data. Personal information of service members is at risk, and there’s a potential for follow-on attacks against other states and cybersecurity partners. The breach highlights the vulnerabilities in the dual-use networks of the National Guard, which operate under both state and federal authority, making them attractive targets for espionage.

Long-term, this breach could erode trust in U.S. cybersecurity defenses and escalate tensions between the U.S. and China. The U.S. government has already taken steps to disrupt Salt Typhoon’s infrastructure, including sanctioning a Chinese company allegedly supporting their operations. However, the group’s sophisticated tactics make containment and remediation highly challenging.

U.S. Response and Future Actions

In response to the breach, the U.S. has been working on enhancing its cybersecurity measures. The Department of Homeland Security warns that the breach could facilitate further attacks, urging for improved coordination between federal and state authorities. The U.S. government is also pressing for stronger cyber deterrence and is considering diplomatic responses to the ongoing cyber threat from China.

The breach underscores the need for comprehensive improvements in cybersecurity hygiene, threat intelligence sharing, and incident response coordination across sectors. This incident may also influence other nations’ perceptions of the security of U.S. military and government networks, potentially affecting international relations and cybersecurity policies.

Sources:

Google Cloud Blog

SecurityWeek

FBI

HHS