DHS warns National Guard hacked by Chinese ‘Salt Typhoon’ group for nearly a year

A recent internal memorandum from the U.S. Department of Homeland Security (DHS) has shed light on a prolonged cyber intrusion targeting National Guard systems, allegedly carried out by a Chinese-linked hacking group known in cybersecurity circles as “Salt Typhoon.” According to the memo, the threat actors maintained unauthorized access for close to a year before being detected and removed.

The security intrusion, allegedly unnoticed for numerous months, has sparked fresh worries among government cybersecurity specialists and defense authorities regarding the weaknesses within networks linked to the military. Although authorities have not revealed the complete scope of the data breach, the document suggests that the intruders managed to view and possibly obtain sensitive, confidential data.

Salt Typhoon, which has historically been linked to cyber operations supported by Beijing, is recognized for its covert methods and enduring presence in targets it considers of strategic significance. The group generally employs advanced phishing tactics, compromised user credentials, and exploited software holes to penetrate networks and subsequently functions discreetly to evade identification.

The memo from DHS underscores that while the attackers did not appear to disrupt operations or systems, the focus of the breach was likely reconnaissance and long-term intelligence gathering. By maintaining access for an extended period, the group may have gained insights into military coordination, emergency response frameworks, personnel movements, or planning infrastructure related to domestic and international deployments.

The National Guard plays a pivotal role in disaster response, civil support operations, and state-level defense initiatives. As a component of both state and federal government, it serves as a critical bridge between local security frameworks and national defense. Any breach in its communications or administrative systems could potentially weaken coordination during crises or provide adversaries with strategic advantages in future operations.

Cybersecurity analysts are now working to trace the attackers’ entry point, assess the depth of the breach, and evaluate whether any lateral movement occurred into other interconnected defense systems. While initial reports suggest the attack was isolated to specific Guard-related networks, concerns persist over potential spillover effects into broader Department of Defense (DoD) systems.

Authorities knowledgeable about the inquiry stressed that sensitive systems remained untouched and that operational readiness was not impacted by the breach. Nonetheless, the duration during which the intruders were not identified has increased demands for enhanced cybersecurity surveillance, more funding for threat identification tools, and closer collaboration between state agencies and national cyber defense teams.

The suspected involvement of Salt Typhoon ties the incident to broader concerns over Chinese state-sponsored cyber activities, which U.S. intelligence officials have repeatedly warned are increasing in scope and ambition. These campaigns often target sectors critical to national security, including defense contractors, public infrastructure, health care, and energy.

Cybersecurity firms tracking Salt Typhoon describe the group as particularly adept at maintaining low profiles. Their techniques often include avoiding triggering standard security alarms, using legitimate administrative credentials, and conducting operations during local off-hours to minimize detection. They have also been known to manipulate system logs and disable monitoring functions to further conceal their presence.

Following the breach, both federal and state cybersecurity units performed forensic examinations and have executed measures to contain the situation. Protocols for managing patches have been revised, access credentials have been refreshed, and additional monitoring has been introduced for the impacted systems. The DHS has provided guidance to other units of the National Guard and related defense agencies to assess their own systems for signs of intrusion.

The incident highlights the challenges the U.S. faces in defending against advanced persistent threats (APTs) from well-funded foreign adversaries. As these actors continue to refine their techniques, defending systems that straddle both federal and state jurisdictions becomes increasingly complex. The National Guard’s unique dual authority structure makes coordinated cybersecurity efforts essential—but also challenging.

Government officials have acknowledged the security incident, with certain individuals advocating for legislative examinations to gain clarity on the nature of the breach and identify any foundational weaknesses that must be resolved. A number of congressional representatives have additionally encouraged the enlargement of budgets dedicated to cyber readiness and the enhancement of collaborative information sharing efforts between the public and private sectors.

The U.S. government has taken various steps in recent years to strengthen its cybersecurity posture, including the creation of the Cybersecurity and Infrastructure Security Agency (CISA), enhancements to the National Cybersecurity Strategy, and joint exercises with private sector partners. However, incidents like this serve as reminders that even heavily defended systems remain vulnerable without constant vigilance and proactive defense measures.

This latest breach follows a string of high-profile cyber intrusions attributed to Chinese hacking groups, including those targeting federal agencies, research institutions, and supply chain partners. The Biden administration has previously sanctioned several Chinese individuals and entities connected to malicious cyber activity and has pressed for international cooperation in identifying and deterring state-sponsored cyber aggression.

The enduring effects of the Salt Typhoon incursion are currently under evaluation. Should information have been extracted during the prolonged access time, the pilfered data might be utilized to guide hostile decision processes, sway misinformation efforts, or aid in forthcoming cyber activities.

As the DHS and the National Guard persist in examining the breach, cybersecurity specialists caution that comparable efforts might still be operational in different sectors of the government. Enhanced collaboration, immediate data exchange, and swifter response times will be vital to thwart upcoming intrusions.

Ultimately, the Salt Typhoon incident reflects the evolving nature of modern espionage. Rather than relying solely on physical surveillance or human intelligence, state-sponsored groups are now leveraging digital infiltration as a primary means of gathering sensitive information. Addressing this threat will require not only technical solutions but also strategic policy reforms and sustained investment in cyber defense infrastructure.

By Kaiane Ibarra

Related Posts