DHS: National Guard compromised for nearly a year by Chinese ‘Salt Typhoon’ hacking campaign

A recent internal memorandum from the U.S. Department of Homeland Security (DHS) has shed light on a prolonged cyber intrusion targeting National Guard systems, allegedly carried out by a Chinese-linked hacking group known in cybersecurity circles as “Salt Typhoon.” According to the memo, the threat actors maintained unauthorized access for close to a year before being detected and removed.

The breach, which reportedly went undetected for several months, has raised new concerns among federal cybersecurity experts and defense officials about vulnerabilities within military-affiliated networks. While officials have not disclosed the full extent of the compromised information, the memo indicates that the intruders were able to observe and potentially extract sensitive, non-public data.

Salt Typhoon, which has been previously associated with Beijing-backed cyber activities, is known for its stealthy techniques and long-term persistence in targets it deems strategically important. The group typically leverages sophisticated phishing campaigns, compromised credentials, and exploited software vulnerabilities to infiltrate networks, then operates quietly to avoid detection.






Document

The document from DHS highlights that although the perpetrators did not seem to interfere with operations or technology, the aim of the infiltration was probably exploration and prolonged information collection. By having sustained access, the team could have obtained understanding of military coordination, emergency management plans, personnel logistics, or planning systems linked to national and overseas missions.


The National Guard is essential in managing disaster relief efforts, providing civil support, and conducting defense initiatives at a state level. Operating as part of both the state and federal governments, it acts as an important link between local security measures and national defense strategies. Any compromise in its communication or administrative systems could hinder crisis coordination or give adversaries a strategic edge in future operations.

Cybersecurity experts are currently engaged in identifying the intruders’ access point, analyzing the extent of the security breach, and determining if there was any movement into other linked defense systems. Although the first reports indicate that the attack was confined to certain Guard-related networks, worries remain about possible consequences affecting wider Department of Defense (DoD) systems.

Authorities knowledgeable about the inquiry stressed that sensitive systems remained untouched and that operational readiness was not impacted by the breach. Nonetheless, the duration during which the intruders were not identified has increased demands for enhanced cybersecurity surveillance, more funding for threat identification tools, and closer collaboration between state agencies and national cyber defense teams.

The potential connection of Salt Typhoon links the situation to wider issues regarding cyber actions allegedly backed by the Chinese government. U.S. intelligence representatives have consistently cautioned that such activities are growing in reach and aspiration. These efforts frequently focus on areas essential to national security, such as defense contractors, public infrastructure, health services, and energy sectors.

Cybersecurity firms tracking Salt Typhoon describe the group as particularly adept at maintaining low profiles. Their techniques often include avoiding triggering standard security alarms, using legitimate administrative credentials, and conducting operations during local off-hours to minimize detection. They have also been known to manipulate system logs and disable monitoring functions to further conceal their presence.

Following the breach, both federal and state cybersecurity units performed forensic examinations and have executed measures to contain the situation. Protocols for managing patches have been revised, access credentials have been refreshed, and additional monitoring has been introduced for the impacted systems. The DHS has provided guidance to other units of the National Guard and related defense agencies to assess their own systems for signs of intrusion.

The incident highlights the challenges the U.S. faces in defending against advanced persistent threats (APTs) from well-funded foreign adversaries. As these actors continue to refine their techniques, defending systems that straddle both federal and state jurisdictions becomes increasingly complex. The National Guard’s unique dual authority structure makes coordinated cybersecurity efforts essential—but also challenging.

Lawmakers have taken note of the breach, with some calling for congressional hearings to better understand how the intrusion occurred and what systemic vulnerabilities need to be addressed. Several members of Congress have also urged an expansion of cyber readiness budgets and support for public-private information sharing initiatives.

Durante los últimos años, el gobierno de EE. UU. ha implementado diferentes medidas para mejorar su posición en ciberseguridad, tales como la creación de la Cybersecurity and Infrastructure Security Agency (CISA), mejoras en la Estrategia Nacional de Ciberseguridad y ejercicios conjuntos con compañías del sector privado. Sin embargo, situaciones como esta recuerdan que incluso los sistemas altamente protegidos siguen siendo vulnerables sin vigilancia constante y acciones defensivas proactivas.

Este reciente incumplimiento sucede tras una serie de destacados ciberataques atribuidos a grupos de hackers chinos, que han estado dirigidos a entidades federales, instituciones de investigación y socios de la cadena de suministro. El gobierno de Biden ya ha sancionado a varios individuos y entidades chinas relacionadas con actividades cibernéticas maliciosas y ha impulsado la cooperación internacional para identificar y frenar la ciberagresión patrocinada por estados.

The enduring effects of the Salt Typhoon incursion are currently under evaluation. Should information have been extracted during the prolonged access time, the pilfered data might be utilized to guide hostile decision processes, sway misinformation efforts, or aid in forthcoming cyber activities.

As the DHS and the National Guard persist in examining the breach, cybersecurity specialists caution that comparable efforts might still be operational in different sectors of the government. Enhanced collaboration, immediate data exchange, and swifter response times will be vital to thwart upcoming intrusions.

Ultimately, the Salt Typhoon incident reflects the evolving nature of modern espionage. Rather than relying solely on physical surveillance or human intelligence, state-sponsored groups are now leveraging digital infiltration as a primary means of gathering sensitive information. Addressing this threat will require not only technical solutions but also strategic policy reforms and sustained investment in cyber defense infrastructure.

You May Also Like