Chinese hackers accessed Treasury workstations via a third-party software ... flagged that hackers had stolen a key "used by the vendor to secure a cloud-based service used to remotely provide ...
The Treasury said the attack resulted in access to some of its workstations, according to a letter to Congress seen by AFP. According to the Treasury, the incident happened earlier this month ...
The department did not provide details on how many workstations had been accessed ... flagged that hackers had stolen a key “used by the vendor to secure a cloud-based service used to remotely ...
On December 8, the Treasury was notified by BeyondTrust that a key used for remote technical support had been pilfered, meaning that a threat actor could access some Departmental Office workstations ...
The department did not provide details on how many workstations had been accessed ... flagged that hackers had stolen a key “used by the vendor to secure a cloud-based service used to remotely ...
The department didn't provide details on how many workstations had been accessed ... flagged that hackers had stolen a key "used by the vendor to secure a cloud-based service used to remotely ...
Chinese hackers have remotely accessed several US Treasury Department workstations and unclassified ... flagged that hackers had stolen a key “used by the vendor to secure a cloud-based service ...
FILE - American flags are displayed with Chinese flags on top of a trishaw on Sept. 16, 2018, in Beijing. (AP Photo/Andy Wong, File) ...
The hackers “gained access to a key used by the vendor to secure a cloud ... remotely access certain Treasury DO user workstations, and access certain unclassified documents maintained by ...
A key used by third party service provider BeyondTrust ... access an undisclosed number of Treasury workstations, and steal “certain unclassified documents,” in what it called a “major ...
Chinese hackers remotely accessed several U.S. Treasury Department workstations and unclassified ... flagged that hackers had stolen a key “used by the vendor to secure a cloud-based service ...