{"id":152203,"date":"2025-01-04T18:03:46","date_gmt":"2025-01-04T18:03:46","guid":{"rendered":"https:\/\/globetimeline.com\/ar\/tech\/rewrite-this-title-in-arabic-us-treasury-says-chinese-state-backed-actor-hacked-its-computers\/"},"modified":"2025-01-04T18:03:46","modified_gmt":"2025-01-04T18:03:46","slug":"rewrite-this-title-in-arabic-us-treasury-says-chinese-state-backed-actor-hacked-its-computers","status":"publish","type":"post","link":"https:\/\/globetimeline.com\/ar\/tech\/rewrite-this-title-in-arabic-us-treasury-says-chinese-state-backed-actor-hacked-its-computers\/","title":{"rendered":"rewrite this title in Arabic US Treasury says Chinese state-backed actor hacked its computers"},"content":{"rendered":"<p>Summarize this content to 2000 words in 6 paragraphs in Arabic Unlock the White House Watch newsletter for freeYour guide to what the 2024 US election means for Washington and the worldA Chinese state-sponsored actor hacked the US Treasury department through a third-party service provider in a \u201cmajor cyber security incident\u201d, the agency said on Monday.In a letter to the Senate banking committee seen by the Financial Times, the Treasury department said it had been informed on December 8 by software company BeyondTrust that a hacker had breached several remote government workstations by obtaining a security key and had in turn gained access to unclassified documents on them.\u201cBased on available indicators, the incident has been attributed to a China state-sponsored Advanced Persistent Threat (APT) actor,\u201d the letter said. \u201cIn accordance with Treasury policy, intrusions attributable to an APT are considered a major cyber security incident.\u201dThe department said it had been working with the FBI and other investigators in the wider intelligence community to determine the impact of the hack. It added that \u201cat this time there is no evidence indicating the threat actor has continued access to Treasury information\u201d.In a separate statement on Monday, a Treasury spokesperson said the agency \u201ctakes very seriously all threats against our systems, and the data it holds\u201d. \u201cWe will continue to work with both private and public sector partners to protect our financial system from threat actors,\u201d the person added.Liu Pengyu, the spokesperson for the Chinese embassy in Washington, said on Monday: \u201cWe hope that relevant parties will adopt a professional and responsible attitude when characterising cyber incidents, basing their conclusions on sufficient evidence rather than unfounded speculation and accusations.\u201d \u201cThe US needs to stop using cyber security to smear and slander China, and stop spreading all kinds of disinformation about the so-called Chinese hacking threats,\u201d he added. The breach is the latest cyber security violation involving US targets allegedly carried out on behalf of China.In October, the Biden administration said it was investigating what the FBI and the Cybersecurity and Infrastructure Security Agency said was \u201cunauthorised access to commercial telecommunications infrastructure by actors affiliated with the People\u2019s Republic of China\u201d. Hackers reportedly targeted the phones of president-elect Donald Trump and his running mate JD Vance in the lead-up to the US election. Underscoring the level of concern, the commerce department in September took steps to limit China\u2019s access to Americans\u2019 data by proposing a ban on Chinese software and hardware for vehicles with a built-in internet connection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summarize this content to 2000 words in 6 paragraphs in Arabic Unlock the White House Watch newsletter for freeYour guide to what the 2024 US election means for Washington and the worldA Chinese state-sponsored actor hacked the US Treasury department through a third-party service provider in a \u201cmajor cyber security incident\u201d, the agency said on<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[63],"tags":[],"class_list":{"0":"post-152203","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-tech"},"_links":{"self":[{"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/posts\/152203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/comments?post=152203"}],"version-history":[{"count":0,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/posts\/152203\/revisions"}],"wp:attachment":[{"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/media?parent=152203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/categories?post=152203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/tags?post=152203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}