China Reportedly Hacked Email Systems Used by U.S. Congressional Staff

Chinese state-sponsored hackers have compromised email systems used by staff working on powerful House committees, according to a Financial Times report published Wednesday.

The intrusions, attributed to the notorious Salt Typhoon group, targeted email accounts of aides serving on committees responsible for overseeing China policy, foreign affairs, intelligence, and armed services operations.

The breach represents a significant escalation in ongoing cyberespionage efforts targeting the U.S. government’s legislative branch.

While the exact number of compromised accounts remains unclear, sources familiar with the matter indicated that attackers gained access to email infrastructure used by multiple congressional offices between December and early January.

The report did not specify whether the hackers successfully accessed lawmakers’ communications, only confirming that staff email systems were infiltrated.

Salt Typhoon, widely believed to be operating on behalf of Chinese intelligence services, has become one of the most sophisticated threats to American national security interests.

The group’s previous operations have exposed extensive telecommunications metadata belonging to millions of Americans and intercepted sensitive communications involving prominent U.S. politicians and government officials.

Despite mounting evidence of Chinese involvement, Beijing continues to deny responsibility for the hacking campaigns.

The timing of this breach coincides with heightened tensions between Washington and Beijing over trade, technology competition, and Taiwan.

Congressional staff members working on these committees have access to classified information, intelligence briefings, and strategic policy discussions that would be highly valuable to foreign intelligence agencies.

The potential exposure of such sensitive communications could compromise ongoing diplomatic negotiations and intelligence operations.

Federal authorities have launched an investigation into the incident, but the FBI declined to provide specific details on the breach’s scope or response measures.

White House officials and representatives from the affected committees have remained largely silent publicly, focusing instead on coordinating the government’s response through classified channels.

This breach follows a series of high-profile cyber incidents targeting Congress in recent months. In November, the Congressional Budget Office suffered a similar breach, with potential unauthorized access to communications between the nonpartisan agency and Senate offices.

These incidents underscore the persistent vulnerability of American legislative institutions to sophisticated state-sponsored cyber operations.

The U.S. previously imposed sanctions on alleged Salt Typhoon operatives, including hacker Yin Kecheng and the cybersecurity firm Sichuan Juxinhe Network Technology, to deter future attacks.

However, the continued targeting of congressional infrastructure suggests that economic penalties have done little to deter Chinese espionage against the American government.

Congressional leaders are expected to demand answers from intelligence agencies about how the breach occurred and what steps are being taken to prevent future infiltrations of sensitive government networks.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyber Press as a Preferred Source in Google.

The post China Reportedly Hacked Email Systems Used by U.S. Congressional Staff appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading