Our website uses cookies to enhance and personalize your experience and to display advertisements (if any). Our website may also include third party cookies such as Google Adsense, Google Analytics, Youtube. By using the website, you consent to the use of cookies. We have updated our Privacy Policy. Please click the button to view our Privacy Policy.

National Guard suffered year-long cyberattack by Chinese ‘Salt Typhoon’ group, DHS states

National Guard hacked by Chinese ‘Salt Typhoon’ campaign for nearly a year, DHS memo says

An internal memo from the U.S. Department of Homeland Security (DHS) recently revealed a lengthy cyber attack on National Guard systems. The attack is believed to be the work of a Chinese-affiliated hacking organization referred to in cybersecurity fields as “Salt Typhoon.” The memo indicates that the cybercriminals had unauthorized access for nearly a year until they were identified and expelled.

The security intrusion, allegedly unnoticed for numerous months, has sparked fresh worries among government cybersecurity specialists and defense authorities regarding the weaknesses within networks linked to the military. Although authorities have not revealed the complete scope of the data breach, the document suggests that the intruders managed to view and possibly obtain sensitive, confidential data.

Salt Typhoon, which has been previously associated with Beijing-backed cyber activities, is known for its stealthy techniques and long-term persistence in targets it deems strategically important. The group typically leverages sophisticated phishing campaigns, compromised credentials, and exploited software vulnerabilities to infiltrate networks, then operates quietly to avoid detection.






Document

The document from DHS highlights that although the perpetrators did not seem to interfere with operations or technology, the aim of the infiltration was probably exploration and prolonged information collection. By having sustained access, the team could have obtained understanding of military coordination, emergency management plans, personnel logistics, or planning systems linked to national and overseas missions.


The National Guard plays a pivotal role in disaster response, civil support operations, and state-level defense initiatives. As a component of both state and federal government, it serves as a critical bridge between local security frameworks and national defense. Any breach in its communications or administrative systems could potentially weaken coordination during crises or provide adversaries with strategic advantages in future operations.

Cybersecurity experts are currently engaged in identifying the intruders’ access point, analyzing the extent of the security breach, and determining if there was any movement into other linked defense systems. Although the first reports indicate that the attack was confined to certain Guard-related networks, worries remain about possible consequences affecting wider Department of Defense (DoD) systems.

Authorities knowledgeable about the inquiry stressed that sensitive systems remained untouched and that operational readiness was not impacted by the breach. Nonetheless, the duration during which the intruders were not identified has increased demands for enhanced cybersecurity surveillance, more funding for threat identification tools, and closer collaboration between state agencies and national cyber defense teams.

The suspected involvement of Salt Typhoon ties the incident to broader concerns over Chinese state-sponsored cyber activities, which U.S. intelligence officials have repeatedly warned are increasing in scope and ambition. These campaigns often target sectors critical to national security, including defense contractors, public infrastructure, health care, and energy.

Cybersecurity companies monitoring Salt Typhoon describe the group as especially skilled at keeping a low profile. Their methods frequently involve avoiding setting off typical security alerts, utilizing valid administrative credentials, and performing activities during local after-hours to reduce the chance of being detected. Additionally, they have been noted for altering system logs and deactivating monitoring features to hide their presence even more.

In response to the breach, federal and state cybersecurity teams have conducted forensic reviews and implemented containment measures. Patch management protocols have been updated, access credentials reset, and new layers of monitoring deployed across affected systems. The DHS has issued recommendations to other National Guard units and affiliated defense agencies to review their own systems for indicators of compromise.

The incident highlights the challenges the U.S. faces in defending against advanced persistent threats (APTs) from well-funded foreign adversaries. As these actors continue to refine their techniques, defending systems that straddle both federal and state jurisdictions becomes increasingly complex. The National Guard’s unique dual authority structure makes coordinated cybersecurity efforts essential—but also challenging.

Government officials have acknowledged the security incident, with certain individuals advocating for legislative examinations to gain clarity on the nature of the breach and identify any foundational weaknesses that must be resolved. A number of congressional representatives have additionally encouraged the enlargement of budgets dedicated to cyber readiness and the enhancement of collaborative information sharing efforts between the public and private sectors.

The U.S. government has taken various steps in recent years to strengthen its cybersecurity posture, including the creation of the Cybersecurity and Infrastructure Security Agency (CISA), enhancements to the National Cybersecurity Strategy, and joint exercises with private sector partners. However, incidents like this serve as reminders that even heavily defended systems remain vulnerable without constant vigilance and proactive defense measures.

This latest breach follows a string of high-profile cyber intrusions attributed to Chinese hacking groups, including those targeting federal agencies, research institutions, and supply chain partners. The Biden administration has previously sanctioned several Chinese individuals and entities connected to malicious cyber activity and has pressed for international cooperation in identifying and deterring state-sponsored cyber aggression.

The enduring effects of the Salt Typhoon incursion are currently under evaluation. Should information have been extracted during the prolonged access time, the pilfered data might be utilized to guide hostile decision processes, sway misinformation efforts, or aid in forthcoming cyber activities.

As the DHS and the National Guard continue to investigate the breach, cybersecurity experts warn that similar campaigns may still be active in other areas of government. Increased coordination, real-time data sharing, and faster response times will be crucial in countering future intrusions.

Ultimately, the Salt Typhoon incident reflects the evolving nature of modern espionage. Rather than relying solely on physical surveillance or human intelligence, state-sponsored groups are now leveraging digital infiltration as a primary means of gathering sensitive information. Addressing this threat will require not only technical solutions but also strategic policy reforms and sustained investment in cyber defense infrastructure.

By Miles Spencer

You may also like

  • Medical-Grade Wearables: The Future of Health Monitoring

  • The Rise of Vector Search in Databases

  • Decoding Gluten: When to Say No, When to Say Yes

  • Quantum Computing for Business: Current Practical Applications