Skip to content
Search

Latest Stories

cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

How Many ‘Wake-Up Calls’ Will it Take for US to Counter China Cyberattacks?

A former top cybersecurity official urges a ‘much more aggressive’ response to the cyber threat from China

A contract crew for Verizon, works on a cell tower in Orem, Utah. Verizon was among the telecommunications companies affected by cyberattacks linked to China (Photo by GEORGE FREY/AFP via Getty Images)

EXPERT INTERVIEW — The U.S. Treasury Department closed 2024 with the announcement that state-sponsored hackers from China had breached its systems in a “major incident.” The hackers compromised a third-party cybersecurity provider to access networks of the Office of the Treasury Secretary and the Office of Foreign Assets Control (OFAC) — the department entity that deals with economic sanctions. Treasury said the hackers accessed unclassified documents.

The hack is the latest in a series of sobering reminders of the cyber threat emanating from China – a threat manifested most profoundly in the so-called “Volt Typhoon” and “Salt Typhoon” attacks, which in the last two years have breached U.S. critical infrastructure and exposed vulnerabilities in areas from the water supply to the electric grid to telecommunications. In the case of the Salt Typhoon attacks, the breach compromised major U.S. telecommunications companies and went unnoticed until Microsoft alerted the government

Keep reading...Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Related Articles

AI-Powered Adversaries Require AI-Driven Defenses

OPINION — The use of artificial intelligence by adversaries has been the subject of exhaustive speculation. No one doubts that the technology will be [...] More

Trump’s Next Test: Kim Jong Un’s Bid for Legitimacy and a Nuclear Normalization Deal

EXPERT OPINION — North Korean leader Kim Jong Un is ready to do business with President Donald Trump. Over the past few years, Mr. Kim has burnished [...] More

The Hidden National Security Risk in Smart Cities

OPINION — It is worryingly easy to get hold of personal and sensitive data on American military and intelligence personnel. Earlier this year [...] More

The Future of U.S. Intelligence: Leaner, Smarter, and Tech-Focused

EXPERT OPINION — It is time to reimagine the US intelligence community (IC). The 1947 National Security Act established the CIA which arguably had [...] More

Forget Guerrillas and IEDs - The Next Asymmetric War Will Be Engineered

OPINION — For most of modern history, asymmetric conflict conjured a familiar image: guerrillas in the hills, insurgents planting roadside bombs, or [...] More

A Deniable Attack with Strategic Precision: Why the Red Hat Breach Looks More Like Statecraft Than Mere Crime

EXPERT PERSPECTIVE — The timing was no coincidence.As the U.S. federal government ground to a halt at 12:01 a.m. EDT on October 1, 2025, a [...] More

{{}}