Our website use cookies to improve and personalize your experience and to display advertisements(if any). Our website may also include cookies from third parties like Google Adsense, Google Analytics, Youtube. By using the website, you consent to the use of cookies. We have updated our Privacy Policy. Please click on the button to check our Privacy Policy.

DHS memo exposes Chinese ‘Salt Typhoon’ hacking National Guard for nearly a year

National Guard hacked by Chinese ‘Salt Typhoon’ campaign for nearly a year, DHS memo says

An internal memo from the U.S. Department of Homeland Security (DHS) recently revealed a lengthy cyber attack on National Guard systems. The attack is believed to be the work of a Chinese-affiliated hacking organization referred to in cybersecurity fields as “Salt Typhoon.” The memo indicates that the cybercriminals had unauthorized access for nearly a year until they were identified and expelled.

The security intrusion, allegedly unnoticed for numerous months, has sparked fresh worries among government cybersecurity specialists and defense authorities regarding the weaknesses within networks linked to the military. Although authorities have not revealed the complete scope of the data breach, the document suggests that the intruders managed to view and possibly obtain sensitive, confidential data.

Salt Typhoon, which has been previously associated with Beijing-backed cyber activities, is known for its stealthy techniques and long-term persistence in targets it deems strategically important. The group typically leverages sophisticated phishing campaigns, compromised credentials, and exploited software vulnerabilities to infiltrate networks, then operates quietly to avoid detection.

The memo from DHS underscores that while the attackers did not appear to disrupt operations or systems, the focus of the breach was likely reconnaissance and long-term intelligence gathering. By maintaining access for an extended period, the group may have gained insights into military coordination, emergency response frameworks, personnel movements, or planning infrastructure related to domestic and international deployments.

The National Guard is essential in managing disaster relief efforts, providing civil support, and conducting defense initiatives at a state level. Operating as part of both the state and federal governments, it acts as an important link between local security measures and national defense strategies. Any compromise in its communication or administrative systems could hinder crisis coordination or give adversaries a strategic edge in future operations.

Cybersecurity analysts are now working to trace the attackers’ entry point, assess the depth of the breach, and evaluate whether any lateral movement occurred into other interconnected defense systems. While initial reports suggest the attack was isolated to specific Guard-related networks, concerns persist over potential spillover effects into broader Department of Defense (DoD) systems.

Officials familiar with the investigation emphasized that no classified systems were compromised and that the breach did not affect operational readiness. However, the length of time during which the attackers remained undetected has intensified calls for improved cybersecurity monitoring, greater investment in threat detection tools, and tighter coordination between state-level agencies and federal cyber defense units.

The suspected involvement of Salt Typhoon ties the incident to broader concerns over Chinese state-sponsored cyber activities, which U.S. intelligence officials have repeatedly warned are increasing in scope and ambition. These campaigns often target sectors critical to national security, including defense contractors, public infrastructure, health care, and energy.

Cybersecurity firms tracking Salt Typhoon describe the group as particularly adept at maintaining low profiles. Their techniques often include avoiding triggering standard security alarms, using legitimate administrative credentials, and conducting operations during local off-hours to minimize detection. They have also been known to manipulate system logs and disable monitoring functions to further conceal their presence.

In response to the breach, federal and state cybersecurity teams have conducted forensic reviews and implemented containment measures. Patch management protocols have been updated, access credentials reset, and new layers of monitoring deployed across affected systems. The DHS has issued recommendations to other National Guard units and affiliated defense agencies to review their own systems for indicators of compromise.

The incident highlights the challenges the U.S. faces in defending against advanced persistent threats (APTs) from well-funded foreign adversaries. As these actors continue to refine their techniques, defending systems that straddle both federal and state jurisdictions becomes increasingly complex. The National Guard’s unique dual authority structure makes coordinated cybersecurity efforts essential—but also challenging.

Government officials have acknowledged the security incident, with certain individuals advocating for legislative examinations to gain clarity on the nature of the breach and identify any foundational weaknesses that must be resolved. A number of congressional representatives have additionally encouraged the enlargement of budgets dedicated to cyber readiness and the enhancement of collaborative information sharing efforts between the public and private sectors.

The U.S. government has taken various steps in recent years to strengthen its cybersecurity posture, including the creation of the Cybersecurity and Infrastructure Security Agency (CISA), enhancements to the National Cybersecurity Strategy, and joint exercises with private sector partners. However, incidents like this serve as reminders that even heavily defended systems remain vulnerable without constant vigilance and proactive defense measures.

Este reciente incumplimiento sucede tras una serie de destacados ciberataques atribuidos a grupos de hackers chinos, que han estado dirigidos a entidades federales, instituciones de investigación y socios de la cadena de suministro. El gobierno de Biden ya ha sancionado a varios individuos y entidades chinas relacionadas con actividades cibernéticas maliciosas y ha impulsado la cooperación internacional para identificar y frenar la ciberagresión patrocinada por estados.

The enduring effects of the Salt Typhoon incursion are currently under evaluation. Should information have been extracted during the prolonged access time, the pilfered data might be utilized to guide hostile decision processes, sway misinformation efforts, or aid in forthcoming cyber activities.

As the DHS and the National Guard persist in examining the breach, cybersecurity specialists caution that comparable efforts might still be operational in different sectors of the government. Enhanced collaboration, immediate data exchange, and swifter response times will be vital to thwart upcoming intrusions.

In the end, the Salt Typhoon event highlights the changing landscape of contemporary espionage. Instead of depending purely on physical monitoring or human intelligence, state-backed entities are now utilizing digital infiltration as a key method to collect sensitive data. Tackling this challenge will necessitate not just technical solutions but also strategic policy adjustments and continuous investment in cyber defense infrastructure.