Site icon Check Point Blog

What You Need to Know about the US Treasury Breach – and How to Protect Your Organization from a “Major Incident”

US officials have announced that threat actors linked to China have leveraged vulnerabilities in BeyondTrust’s remote support software to steal documents in what Treasury Department officials called a “major incident” in a letter to lawmakers. The investigation is still ongoing, but we can outline several key details, insights, and remediation pathways based on available facts. This breach highlights the increasing frequency of cyber attacks, as Check Point Research (CPR) found that in November, organizations in the U.S. faced an average of 1,345 cyber-attacks per week. Government entities were among the top three most targeted industries for ransomware.

According to reports, the attack leveraged two specific vulnerabilities in BeyondTrust’s remote support software:

It’s reported that attackers acquired a digital signing key for the software, which enabled them to masquerade as legitimate users with privileged access. This allowed them to access unclassified workstations and documents in Treasury’s systems, compromising sensitive, but not classified, data. Organizations everywhere that deploy the same software are at risk for similar or more serious breaches. Check Point recommends immediate action to patch the relevant intrusion points and ensure a resilient cyber security posture to deal with further attacks, with an emphasis on prevention.

Security teams can reference the following “defense-in-depth” framework to structure a response plan for the BeyondTrust vulnerabilities in the short term while building a prevention-focused, comprehensive, and effective cyber posture for the long term. 

The first step in the wake of these attacks on the Treasury must be to remediate the specific vulnerabilities that permitted unauthorized access to their systems. Typically, however, it’s not the weaknesses you see that lead to trouble – it’s the ones you don’t see. By combining proactive vulnerability management, real-time monitoring, and a defense-in-depth strategy, organizations can mitigate risks posed by similar attacks on a continuous basis into the future.

Exit mobile version