WASHINGTON (Reuters) – Hackers backed by a foreign government have been monitoring internal email traffic at the U.S. Treasury Department and an agency that decides internet and telecommunications policy, according to people familiar with the matter.FILE PHOTO: A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. REUTERS/Kacper Pempel/Illustration
There is concern within the U.S. intelligence community that the hackers who targeted Treasury and the Commerce Department’s National Telecommunications and Information Administration used a similar tool to break into other government agencies, according to three people briefed on the matter. The people did not say which other agencies.
“The United States government is aware of these reports and we are taking all necessary steps to identify and remedy any possible issues related to this situation,” said National Security Council spokesman John Ullyot.
The hack is so serious it led to a National Security Council meeting at the White House on Saturday, said one of the people familiar with the matter.
The breach presents a major challenge to the incoming administration of President-elect Joe Biden as officials investigate what information was stolen and try to ascertain what it will be used for. It is not uncommon for large scale cyber investigations to take months or years to complete.
“This is a much bigger story than one single agency,” said one of the people familiar with the matter. “This is a huge cyber espionage campaign targeting the U.S. government and its interests.”
Hackers broke into the NTIA’s office software, Microsoft’s Office 365. Staff emails at the agency were monitored by the hackers for months, sources said.
A Microsoft spokesperson did not immediately respond to a request for comment.
The hackers are “highly sophisticated” and have been able to trick the Microsoft platform’s authentication controls, according to a person familiar with the incident, who spoke on condition of anonymity because they were not allowed to speak to the press.
“This is a nation state,” said a different person briefed on the matter. “We just don’t know which one yet.”
The full scope of the breach is unclear. The investigation is still its early stages and involves a range of federal agencies, including the FBI, according to the three people familiar with the matter.
A spokesperson for the Cybersecurity and Infrastructure Security Agency said they have been “working closely with our agency partners regarding recently discovered activity on government networks. CISA is providing technical assistance to affected entities as they work to identify and mitigate any potential compromises.”
The FBI and U.S. National Security Agency did not immediately respond to a request for comment.
There is some indication that the email compromise at NTIA dates back to this summer, although it was only recently discovered, according to a senior U.S. official.
NTIA was among a group of agencies involved in the Trump administration’s effort to ban Chinese social media apps Tiktok and WeChat. The Trump administration has said such apps pose a national security threat. The affected Chinese companies deny the claim.
Reporting by Christopher Bing; Editing by Chris Sanders and Daniel Wallis
Our Standards: The Thomson Reuters Trust Principles.
REUTERS NEWS NOW
Subscribe to our daily curated newsletter to receive the latest exclusive Reuters c