Back to all incidents

US Treasury — BeyondTrust supply-chain breach

Silk Typhoon used a stolen BeyondTrust API key to access US Treasury workstations including those of the sanctions team at OFAC and the foreign-investment reviewers at CFIUS.

Target
US Treasury — BeyondTrust supply-chain breach
Date public
8 December 2024
Sector
Government
Attack type
Supply Chain
Threat actor
Silk Typhoon (Chinese state-sponsored)
Severity
High
Region
United States

BeyondTrust makes remote-support software — the kind of tool that IT help-desk staff use to take control of your computer screen when they're fixing a problem. The US Treasury Department used it. In December 2024, Treasury disclosed that Chinese state-sponsored hackers had obtained a BeyondTrust API key — a digital credential that gave them access to the remote-support sessions — and used it to access the workstations of Treasury employees. The particular employees whose computers were accessed is what made this incident so serious. The compromised workstations included those of the Office of Foreign Assets Control — the team that designs and enforces US economic sanctions against China, Russia, Iran and others. And those of CFIUS — the Committee on Foreign Investment in the United States, which reviews whether Chinese or other foreign companies should be allowed to buy US businesses. In other words: the hackers may have read the documents on the desks of the people designing sanctions against China and deciding which Chinese investments to block. US officials attributed the breach to Silk Typhoon, a Chinese intelligence group. The incident prompted significant reassessment of which third-party support tools can have privileged access to the most sensitive parts of the US government's network.

What happened

On 8 December 2024 BeyondTrust notified the US Department of the Treasury that a threat actor had obtained a BeyondTrust API key and used it to override security controls in BeyondTrust’s cloud-based Remote Support SaaS product. The Treasury Department disclosed the breach in a letter to the Senate Banking Committee on 30 December 2024, characterising it as a “major cybersecurity incident.”

The access obtained via the compromised API key permitted the attacker to remotely access Treasury employee workstations — the same capability available to legitimate IT help-desk staff using BeyondTrust Remote Support for internal support operations. The workstations accessed included those of employees at the Office of Foreign Assets Control (OFAC), the Treasury office responsible for designing, implementing, and enforcing US economic sanctions regimes against foreign states, entities, and individuals. They also included workstations of staff at the Committee on Foreign Investment in the United States (CFIUS), which reviews proposed foreign acquisitions of US companies for national security implications.

US officials and security researchers attributed the intrusion to Silk Typhoon, a Chinese state-sponsored threat group previously designated Hafnium by Microsoft, which conducted the 2021 mass-exploitation of Microsoft Exchange Server vulnerabilities. The compromise was classified as espionage — the goal was intelligence collection, not disruption or financial theft. Treasury stated that the BeyondTrust service had been taken offline upon discovery of the incident and that there was no evidence of continued access.

How it worked

BeyondTrust Remote Support is a remote-access tool used by IT support teams to assist end users by viewing and controlling their workstations. It operates as a SaaS product with an API that allows programmatic integration with internal IT systems — for example, triggering support sessions from a helpdesk ticket, or authenticating sessions against an internal identity provider.

The attacker obtained a BeyondTrust API key — a credential that allows programmatic access to the BeyondTrust platform with privileges associated with the key’s configured permissions. With this key, they were able to initiate remote-support sessions to Treasury workstations, overriding normal access controls. The specific method by which the API key was obtained was not disclosed in BeyondTrust’s initial disclosures; BeyondTrust confirmed that the key was used to access its Remote Support SaaS infrastructure rather than being obtained by compromising Treasury’s own systems directly.

The intrusion path is a supply-chain attack in the classic sense: rather than attacking the target organisation directly, the attacker compromised a trusted third-party tool that had privileged access to the target’s systems. BeyondTrust Remote Support, by design, must be able to access Treasury employee workstations to fulfil its IT-support function. That functional access made the BeyondTrust API key as valuable as a direct credential for Treasury’s own systems.

The intelligence value of the access obtained is significant and was the evident purpose of the operation. OFAC designs and maintains the US sanctions architecture — its workstations hold documents related to sanctions designations in development, internal legal analysis, and communications with other agencies. CFIUS workstations hold assessments of foreign investment proposals, analysis of national security risks posed by specific acquisitions, and inter-agency deliberations about which deals to approve or block. Both represent primary foreign-intelligence targets for a Chinese state espionage operation; China is directly subject to OFAC sanctions and is the most frequently reviewed investing nation in CFIUS proceedings.

Timeline

  • Before December 2024 — Silk Typhoon operators obtain a BeyondTrust API key, through means not publicly disclosed; conduct reconnaissance of Treasury’s BeyondTrust environment.
  • 8 December 2024 — BeyondTrust detects the compromise of its Remote Support SaaS infrastructure; notifies the Treasury Department.
  • December 2024 — Treasury takes the BeyondTrust service offline; conducts forensic investigation with CISA and the FBI.
  • 30 December 2024 — Treasury files letter with the Senate Banking Committee disclosing the breach as a “major cybersecurity incident”; discloses the compromise of OFAC and CFIUS workstations.
  • January 2025 — Silk Typhoon attribution confirmed by US officials and Microsoft researchers; incident linked to broader Chinese espionage campaign.
  • 2025 — US government review of privileged third-party SaaS access to sensitive agency endpoints underway; BeyondTrust incident cited in Congressional hearings on federal contractor security.

What defenders should learn

The Treasury BeyondTrust breach is the clearest recent example of a principle that security architects have documented but organisations have been slow to operationalise: the security of privileged third-party tools is part of the attack surface of the organisations they serve. A remote-support tool that can access any employee workstation on demand has, from a threat-modelling perspective, the same access level as a domain administrator. Its security should be treated accordingly.

The specific control that failed — API key security — is a broad and recurring issue. API keys are credentials. Like passwords, they can be stolen, leaked, or compromised. Unlike passwords, they typically do not expire, are rarely rotated, and are often stored in configurations, scripts, or version-control repositories in ways that increase their exposure surface. Organisations that issue API keys to third-party service providers should treat those keys with the same lifecycle management, monitoring, and access-scoping discipline applied to privileged human credentials: minimum required permissions, short validity periods where operationally feasible, and monitoring for any use that deviates from expected patterns.

The intelligence targeting logic of the Treasury incident should be internalised as a threat-prioritisation principle for government agencies. The most valuable targets for foreign intelligence are not necessarily the largest or most prominent agencies — they are the agencies whose specific functions most directly affect the adversary. For China, OFAC (which can designate Chinese entities for sanctions) and CFIUS (which can block Chinese investment) are among the highest-value intelligence targets in the US government. Any agency or organisation whose work directly concerns an adversary’s interests should treat that as an elevated targeting context and apply proportionally elevated controls to the tools and infrastructure that access its most sensitive systems.

The supply-chain attack surface that the BeyondTrust incident illustrates extends beyond IT support tools. Any third-party SaaS product with privileged access to sensitive endpoints — endpoint management, monitoring, vulnerability scanning, identity providers, document management — creates a potential pivot from the vendor to the customer. The question for security architects is: for each third-party tool with privileged access to our environment, if that tool’s credentials or infrastructure were compromised, what could an attacker reach? The answer should drive both the access-minimisation architecture and the vendor-security due-diligence requirements.

Controls that would have helped

Defender controls catalogued in the Controls Desk that would have changed the outcome of this incident, or limited its blast radius. Sourced from regulator and framework guidance — never vendors.

Sources

Back to all incidents