Security

Cyber-crime

Chinese cyber-spies peek over shoulder of officials probing real-estate deals near American military bases

Gee, wonder why Beijing is so keen on the – checks notes – Committee on Foreign Investment in the US


Chinese cyber-spies who broke into the US Treasury Department also stole documents from officials investigating real-estate sales near American military bases, it's reported.

Citing three folks familiar with the matter, CNN said the Chinese government-backed snoops compromised the computer security of the Committee on Foreign Investment in the US (CFIUS), which reviews foreign money funneled into American businesses and real estate to assess national security risks.

Late last year, the Treasury expanded the committee's authority to review the purchase or lease of real estate close to US military bases. American lawmakers have expressed concern that Chinese government agents could buy up land near these bases and use the locations to spy on military activities.

A Treasury spokesperson did not immediately respond to The Register's inquiries. Previous reports indicated the same Chinese intruders also targeted the sanctions office, though did not access any classified information.

US officials are analyzing the national security impact of the stolen CFIUS files, anonymous sources told CNN. While none of the pilfered data appears to be classified, the concern is that the unclassified documents stolen in the raid could still provide useful intelligence to the Chinese government.

China has denied the American government's data theft and espionage allegations.

A Treasury spokesperson told CNN the snoops compromised a "third-party service provider" in December and then remotely accessed several Treasury user workstations and certain unclassified documents.

"Treasury takes very seriously all threats against our systems, and the data it holds," the spokesperson said. "Over the last four years, Treasury has significantly bolstered its cyber defense, and we will continue to work with both private and public sector partners to protect our financial system from threat actors."

Last week, the Treasury notified Congress about the latest Chinese intrusions. The disclosure comes as lawmakers and government officials are still struggling to understand the scope of the Salt Typhoon campaign, in which Beijing-backed spies compromised at least nine American telecommunications companies, giving agents the capability to pin-point the location of millions of people and record their calls.

The Treasury security breach continues a pattern of escalating cyber-intrusions that Uncle Sam has blamed on the Chinese government. ®

Send us news
7 Comments

Chinese cyber-spies reportedly targeted sanctions intel in US Treasury raid

OFAC, Office of the Treasury Secretary feared hit in data-snarfing swoop

More telcos confirm China Salt Typhoon security breaches as White House weighs in

Intrusions allowed Beijing to 'geolocate millions of individuals, record phone calls at will'

China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says

We are only seeing 'the tip of the iceberg,' Easterly warns

FBI wipes Chinese PlugX malware from thousands of Windows PCs in America

Hey, Xi: Zài jiàn!

Akamai to quit its CDN in China, seemingly not due to trouble from Beijing

Security and cloud compute have so much more upside than the boring business of shifting bits

After China's Salt Typhoon, the reconstruction starts now

If 40 years of faulty building gets blown down, don’t rebuild with the rubble

Charter, Consolidated, Windstream reportedly join China's Salt Typhoon victim list

Slow drip of compromised telecom networks continues

FCC to telcos: By law you must secure your networks from foreign spies. Get on it

Plus: Uncle Sam is cross with this one Chinese biz over Salt Typhoon mega-snooping

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

China's cyber intrusions took a sinister turn in 2024

From targeted espionage to pre-positioning - not that they are mutually exclusive

Mitel 0-day, 5-year-old Oracle RCE bug under active exploit

3 CVEs added to CISA's catalog