Internet Shutdowns in Africa: 2024 Sees Record Highs with $1.56 Billion in Losses
African countries experienced a financial loss of $1.56 billion due to 32,938 hours of internet downtime in 2024, affecting 111.2 million people.
Alexis Rowe
The US Treasury Department has fallen victim to a "major" security incident, with a China-based threat actor gaining access to several employee workstations and unclassified documents. According to a letter to lawmakers seen by The Verge, the breach occurred when the hacker exploited a vulnerability in the third-party remote management software used by the Treasury Department.
The software, provided by BeyondTrust, was breached on December 8th, allowing the threat actor to steal a key used to secure a cloud-based service for remotely providing technical support to Treasury Departmental Offices (DO) end users. With the stolen key, the hacker was able to override security measures and remotely access the workstations and unclassified documents of Treasury Department employees.
The Treasury Department has attributed the attack to a China state-sponsored Advanced Persistent Threat (APT) hacker and has worked with the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI to respond to the incident. According to a spokesperson, the compromised BeyondTrust service has been taken offline, and there is no evidence to suggest the threat actor still has access to Treasury systems or information.
This security breach is linked to a previously disclosed incident by BeyondTrust, which affected customers using its remote support software. In that incident, a compromised API key was used to gain unauthorized access to customer systems. BeyondTrust has stated that it immediately revoked the API key, notified impacted customers, and suspended the affected instances.
The attack highlights the ongoing threat of cyberattacks on government agencies and the importance of robust cybersecurity measures. The Treasury Department has emphasized its commitment to protecting its systems and data, stating that it has "significantly bolstered its cyber defense" over the past four years and will continue to work with private and public sector partners to safeguard the financial system from threat actors.
This incident serves as a reminder of the need for vigilance in the face of increasingly sophisticated cyber threats. As the White House has noted, cyberattacks on critical infrastructure, including clean energy systems, are becoming more frequent and pose a significant risk to national security. The use of encrypted messaging and other security measures can help mitigate these risks, but a comprehensive approach to cybersecurity is essential to protecting sensitive information and systems.
The Treasury Department's breach also underscores the importance of third-party risk management, as the vulnerability in the remote management software used by the agency was exploited by the hacker. This incident serves as a warning to organizations to carefully evaluate the security practices of their third-party vendors and to implement robust security measures to prevent similar breaches.
In conclusion, the security breach at the US Treasury Department is a sobering reminder of the ongoing threat of cyberattacks and the need for constant vigilance and improvement in cybersecurity measures. As the threat landscape continues to evolve, it is essential for government agencies and private organizations to work together to protect sensitive information and systems from threat actors.
African countries experienced a financial loss of $1.56 billion due to 32,938 hours of internet downtime in 2024, affecting 111.2 million people.
Drata, a security compliance automation platform, acquires SafeBase, a software security review startup, for $250 million to enhance its offerings and expand its customer base.
Dub, a new fintech startup, is changing the investing game with an influencer-driven marketplace where users can follow top investors and copy their portfolios, raising $17 million in seed funding.
Copyright © 2024 Starfolk. All rights reserved.