Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 1, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 1, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 1, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 1, 2025

      My top 5 must-play PC games for the second half of 2025 — Will they live up to the hype?

      June 1, 2025

      A week of hell with my Windows 11 PC really makes me appreciate the simplicity of Google’s Chromebook laptops

      June 1, 2025

      Elden Ring Nightreign Night Aspect: How to beat Heolstor the Nightlord, the final boss

      June 1, 2025

      New Xbox games launching this week, from June 2 through June 8 — Zenless Zone Zero finally comes to Xbox

      June 1, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Student Record Android App using SQLite

      June 1, 2025
      Recent

      Student Record Android App using SQLite

      June 1, 2025

      When Array uses less memory than Uint8Array (in V8)

      June 1, 2025

      Laravel 12 Starter Kits: Definite Guide Which to Choose

      June 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      My top 5 must-play PC games for the second half of 2025 — Will they live up to the hype?

      June 1, 2025
      Recent

      My top 5 must-play PC games for the second half of 2025 — Will they live up to the hype?

      June 1, 2025

      A week of hell with my Windows 11 PC really makes me appreciate the simplicity of Google’s Chromebook laptops

      June 1, 2025

      Elden Ring Nightreign Night Aspect: How to beat Heolstor the Nightlord, the final boss

      June 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Hackers Had Access to 150,000 Emails in U.S. Treasury Email Breach

    Hackers Had Access to 150,000 Emails in U.S. Treasury Email Breach

    April 9, 2025
    Hackers Had Access to 150,000 Emails in U.S. Treasury Email Breach

    U.S. Treasury email breach

    The U.S. Treasury Department’s Office of the Comptroller of the Currency (OCC) has notified Congress of “a major information security incident” involving threat actor access to about 150,000 department emails.

    While the official announcement of the U.S. Treasury email breach was short on details, Bloomberg reported that a draft letter to Congress said that the unknown hackers had access to about 100 bank regulators’ accounts and 150,000 e-mails from June 2023 until they were “discovered and ousted earlier this year.”

    The announcement marks a significant step up from what was termed a “limited” incident in the initial announcement in February.

    U.S. Treasury Email Breach Included Sensitive Financial Information

    The OCC regulates all national banks and federal savings associations as well as federal branches and agencies of foreign banks, making a breach of the independent financial agency potentially significant.

    The official statement said the OCC first became aware of the incident on Feb. 11, 2025, when the agency “learned of unusual interactions between a system administrative account in its office automation environment and OCC user mailboxes.”

    After confirming the activity was unauthorized, the agency’s incident response protocols were initialized, which included engaging an independent third-party incident assessment and reporting the incident to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The compromised administrative accounts were disabled and unauthorized access terminated.

    While the review is ongoing, the OCC and the Treasury Department concluded that “based on the content of the emails and attachments reviewed thus far … the incident met the conditions necessary to be classified as a major incident.”

    Investigators determined that the access to executives’ and employees’ emails “included highly sensitive information relating to the financial condition of federally regulated financial institutions used in its examinations and supervisory oversight processes.”

    Not The First Treasury Department Breach

    While the threat actor in the OCC breach remains unknown, the breach’s initial disclosure closely followed a Treasury Department breach reported by the New York Times in December 2024 that was attributed to China-linked hackers.

    China-linked threat actors are also believed to have been behind attacks on nine U.S. telecom networks, persistent infiltration of U.S. critical infrastructure – possibly in preparation for an attack on Taiwan – as well as July 2023 email breaches of senior U.S. government officials responsible for handling relations with the People’s Republic of China (PRC).

    “[W]hat we have found is likely just the tip of the iceberg,” outgoing CISA Director Jen Easterly wrote in January. “This unrelenting PRC campaign underscores the urgent need for robust cyber defense and vigilance across public and private sectors.”

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleSmashing Security podcast #412: Signalgate sucks, and the quandary of quishing
    Next Article The Power of Linux Shell Environment Variables

    Related Posts

    Artificial Intelligence

    Markus Buehler receives 2025 Washington Award

    June 1, 2025
    Artificial Intelligence

    LWiAI Podcast #201 – GPT 4.5, Sonnet 3.7, Grok 3, Phi 4

    June 1, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    CVE-2025-2772 – BEC Technologies Router Credentials Disclosure Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar

    Development

    NativePHP for iOS

    Development

    How new Facebook policies incentivize spreading misinformation

    News & Updates

    Highlights

    The best bamboo sheets for summer are 35% off for Memorial Day

    May 23, 2025

    Cozy Earth makes soft, silky sheets, towels, bed sets, and more — and you can…

    Sam Altman doubts he’ll be smarter than GPT-5 after promising the model would outperform the “mildly embarrassing” GPT-4 with “high scientific certainty”

    February 10, 2025

    Myths about malware: an exploit is the same as malware

    April 9, 2025

    CVE-2025-4888 – Code-projects Pharmacy Management System Buffer Overflow Vulnerability

    May 18, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.