>
Putin Calls Up 160,000 Men to Russian Army in Latest Conscription Drive, at Crucial Moment...
ELECTION FRAUD AGAIN: Liberal Susan Crawford did not win the election last night.
NATO WENT EVIL IN THE EU: Marine Le Pen, the NATO op to get her, the context around it...
The DOGE of War: TOP 10 MEMES – Watch MAGA
Watch the Jetson Personal Air Vehicle take flight, then order your own
Microneedles extract harmful cells, deliver drugs into chronic wounds
SpaceX Gigabay Will Help Increase Starship Production to Goal of 365 Ships Per Year
Nearly 100% of bacterial infections can now be identified in under 3 hours
World's first long-life sodium-ion power bank launched
3D-Printed Gun Components - Part 1, by M.B.
2 MW Nuclear Fusion Propulsion in Orbit Demo of Components in 2027
FCC Allows SpaceX Starlink Direct to Cellphone Power for 4G/5G Speeds
In a letter seen by NBC News, Aditi Hardikar, assistant secretary for management of the U.S. Department of the Treasury, wrote that the office was notified on Dec. 8 of the breach. The letter is addressed to Sen. Sherrod Brown, D-Ohio, and Sen. Tim Scott, R-S.C., the chairman and ranking member, respectively, of the Committee on Banking, Housing and Urban Affairs.
The information accessed by the "threat actor" included unclassified documents, according to the letter.
China denied the U.S. allegations.
"China consistently opposes all forms of hacking and is firmly against the spread of false information targeting China for political purposes," Ministry of Foreign Affairs spokesperson Mao Ning told reporters at a daily briefing.
Hardikar wrote that the U.S. Treasury was told by "a third-party software service provider, BeyondTrust, that a threat actor had gained access to a key used by the vendor to secure a cloud-based service used to remotely provide technical support for Treasury Departmental Offices (DO) end users."
With this access, the "threat actor" was able to override certain security measures and get into the department's user workstations.
The U.S. Treasury has been working with the Cybersecurity and Infrastructure Security Agency, the FBI and other members of the intelligence community, as well as "third-party forensic investigators to fully characterize the incident and determine its overall impact," the letter reads.