Subscribe to Here’s the Deal, our politics
newsletter for analysis you won’t find anywhere else.
Thank you. Please check your inbox to confirm.
President Joe Biden’s 2023 State of the Union address
WATCH: Biden envisions hundreds of thousands more jobs to rebuild U.S. pride
By Associated Press
Live updates: State of the Union 2023
The state of our union, in 6 charts
By Jenna Cohen, Hannah Grabenstein, Joshua Barajas
By Justin Stabley
Ken Dilanian and Ricardo Alonso-Zaldivar, Associated Press
Ken Dilanian and Ricardo Alonso-Zaldivar, Associated Press
Leave your feedback
WASHINGTON — China-based hackers are suspected once again of breaking into U.S. government computer networks, and the entire federal workforce could be at risk this time.
The Department of Homeland Security said in a statement that data from the Office of Personnel Management — the human resources department for the federal government — and the Interior Department had been compromised.
“The FBI is conducting an investigation to identify how and why this occurred,” the statement Thursday said.
The hackers were believed to be based in China, said Sen. Susan Collins, a Maine Republican.
Collins, a member of the Senate Intelligence Committee, said the breach was “yet another indication of a foreign power probing successfully and focusing on what appears to be data that would identify people with security clearances.”
But in Beijing Friday, the Chinese Foreign Ministry dismissed the allegations.
A spokesman for the ministry, Hong Lei said at a regular news briefing that Beijing hopes the U.S. would be “less suspicious and stop making any unverified allegations, but show more trust and participate more in cooperation.”
Beijing routinely dismisses any allegation of its official involvement in cyberattacks on foreign targets, while invariably noting that China is itself the target of hacking attacks and calling for greater international cooperation in combating hacking.
“We know that hacker attacks are conducted anonymously, across nations, and that it is hard to track the source,” Hong said. “It’s irresponsible and unscientific to make conjectural, trumped-up allegations without deep investigation.”
A U.S. official, who declined to be named because he was not authorized to publicly discuss the data breach, said the breach could potentially affect every federal agency. One key question is whether intelligence agency employee information was stolen. Former government employees are affected as well.
The Office of Personnel Management conducts more than 90 percent of federal background investigations, according to its website.
The agency said it is offering credit monitoring and identity theft insurance for 18 months to individuals potentially affected. The National Treasury Employees Union, which represents workers in 31 federal agencies, said it is encouraging members to sign up for the monitoring as soon as possible.
In November, a former DHS contractor disclosed another cyberbreach that compromised the private files of more than 25,000 DHS workers and thousands of other federal employees.
Cybersecurity experts also noted that the OPM was targeted a year ago in a cyberattack that was suspected of originating in China. In that case, authorities reported no personal information was stolen.
Chinese groups have persistently attacked U.S. agencies and companies, including insurers and health-care providers, said Adam Meyers, vice president for intelligence at Irvine, California-based CrowdStrike, which has studied Chinese hacking groups extensively.
The Chinese groups may be looking for information that can be used to approach or compromise people who could provide useful intelligence, Meyers said. “If they know someone has a large financial debt, or a relative with a health condition, or any other avenues that make them susceptible to monetary targeting or coercion, that information would be useful.”
One expert said hackers could use information from government personnel files for financial gain. In a recent case disclosed by the IRS, hackers appear to have obtained tax return information by posing as taxpayers, using personal information gleaned from previous commercial breaches, said Rick Holland, an information security analyst at Forrester Research.
“Given what OPM does around security clearances, and the level of detail they acquire when doing these investigations, both on the subjects of the investigations and their contacts and references, it would be a vast amount of information,” Holland added.
DHS said its intrusion detection system, known as EINSTEIN, which screens federal Internet traffic to identify potential cyberthreats, identified the hack of OPM’s systems and the Interior Department’s data center, which is shared by other federal agencies.
It was unclear why the EINSTEIN system didn’t detect the breach until after so many records had been copied and removed.
“DHS is continuing to monitor federal networks for any suspicious activity and is working aggressively with the affected agencies to conduct investigative analysis to assess the extent of this alleged intrusion,” the statement said.
Cybersecurity expert Morgan Wright of the Center for Digital Government, an advisory institute, said EINSTEIN “certainly appears to be a failure at this point. The government would be better off outsourcing their security to the private sector where’s there at least some accountability.”
Senate Intelligence Committee Chairman Richard Burr, R-N.C., said the government must overhaul its cybersecurity defenses. “Our response to these attacks can no longer simply be notifying people after their personal information has been stolen,” he said. “We must start to prevent these breaches in the first place.”
Associated Press writers Donna Cassata, Alicia A. Caldwell and Kevin Freking in Washington, Brandon Bailey in San Francisco and Ian Mader in Beijing contributed to this report.
Support Provided By: