Chinese Salt Typhoon Campaign Hacks U.S. Congress Email Systems

Related

Depthfirst Secures $40M to Advance AI-Driven Vulnerability Management

What happened Cybersecurity startup Depthfirst has raised $40 million in...

Critical Cal.com Authentication Bypass Lets Attackers Take Over User Accounts

What happened A critical Cal.com authentication bypass lets attackers take...

International Takedown Disrupts RedVDS Cybercrime Platform Driving Phishing and Fraud

What happened International takedown disrupts RedVDS cybercrime platform driving phishing...

Share

What happened

A Chinese Salt Typhoon campaign compromised email systems used by staff on multiple U.S. Congress committees, including the House China Committee, foreign affairs, intelligence, and armed services staff. The espionage operation attributed to China’s Ministry of State Security involved unauthorized access to unencrypted email platforms, text, and voicemail systems used by congressional staff members. The breach was identified in December 2025 and represents an expansion of Salt Typhoon’s cyber espionage targeting against U.S. communications networks. While details of the exact intrusion vector are limited, the campaign continues longstanding efforts to infiltrate and monitor high-value political and policy-related communications. China’s government has publicly denied involvement, calling allegations “politically motivated disinformation.”

Who is affected

Staffers and officials associated with key U.S. House committees have had direct exposure to compromised communications; legislative operations and connected federal network systems face indirect intelligence risk.

Why CISOs should care

This incident highlights the strategic threat posed by advanced persistent state-sponsored actors targeting government communications, underscoring risks to confidentiality, national security, and inter-agency coordination.

3 practical actions

Review and harden email systems: Ensure secure configuration and monitoring of government and enterprise email infrastructure.

Enforce strong encryption: Mandate end-to-end encryption for sensitive communications.

Enhance threat monitoring: Deploy advanced intrusion detection and anomaly tracking on staff accounts and network logs.