US Sanctions Chinese Hacker & Firm for Treasury, Critical Infrastructure Breaches

* [Threat Intelligence](/threat-intelligence)* [Cyberattacks -& Data Breaches](/cyberattacks-data-breaches)* [Cybersecurity Operations](/cybersecurity-operations)US Sanctions Chinese Hacker -& Firm for Treasury, Critical Infrastructure Breaches US Sanctions Chinese Hacker -& Firm for Treasury, Critical Infrastructure BreachesUS Sanctions Chinese Hacker -& Firm for Treasury, Critical Infrastructure Breaches=======================================================================================================================================================================================================================================================The cyber actor played a role in the Treasury breach as well as attacks on critical infrastructure, linked to China-backed advanced persistent threat (APT) group Salt Typhoon. ![Picture of Kristina Beek, Associate Editor, Dark Reading](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2248772495e9caeb/64f17d73018a7c55e8822fc1/KristinaB.jpg?width=100&auto=webp&quality=80&disable=upscale ‘Picture of Kristina Beek, Associate Editor, Dark Reading’) [Kristina Beek, Associate Editor, Dark Reading](/author/kristinabeek)January 17, 2025 1 Min Read ![A US money bill depicting the Treasury building](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc7205fa2f86b9161/677d6406316bc6282770b674/treasury1800_trekandshoot_alamy.jpg?width=1280&auto=webp&quality=95&format=jpg&disable=upscale ‘A US money bill depicting the Treasury building’) Source: Trek and Shoot via Alamy Stock Photo [](https://www.linkedin.com/sharing/share-offsite/?url=https://www.darkreading.com/threat-intelligence/us-sanctions-chinese-hacker-treasury-critical-infrastructure-breaches)[](http://www.facebook.com/sharer/sharer.php?u=https://www.darkreading.com/threat-intelligence/us-sanctions-chinese-hacker-treasury-critical-infrastructure-breaches)[](http://www.twitter.com/intent/tweet?url=https://www.darkreading.com/threat-intelligence/us-sanctions-chinese-hacker-treasury-critical-infrastructure-breaches)[](https://www.reddit.com/submit?url=https://www.darkreading.com/threat-intelligence/us-sanctions-chinese-hacker-treasury-critical-infrastructure-breaches&title=US%20Sanctions%20Chinese%20Hacker%20%26%20Firm%20for%20Treasury%2C%20Critical%20Infrastructure%20Breaches)[](/cdn-cgi/l/email-protection#ab94d8dec9c1cec8df96fef88bf8cac5c8dfc2c4c5d88be8c3c2c5ced8ce8be3cac8c0ced98b8dcac6db908bedc2d9c68bcdc4d98bffd9cecad8ded9d2878be8d9c2dfc2c8cac78be2c5cdd9cad8dfd9dec8dfded9ce8be9d9cecac8c3ced88dcac6db90c9c4cfd296e28e999bdfc3c4deccc3df8e999bdfc3ce8e999bcdc4c7c7c4dcc2c5cc8e999bcdd9c4c68e999befcad9c08e999bf9cecacfc2c5cc8e999bc6c2ccc3df8e999bc2c5dfced9ced8df8e999bd2c4de858e9bef8e9bea8e9bef8e9bea8e999bfef88e999bf8cac5c8dfc2c4c5d88e999be8c3c2c5ced8ce8e999be3cac8c0ced98e999b8e999d8e999bedc2d9c68e999bcdc4d98e999bffd9cecad8ded9d28e99e88e999be8d9c2dfc2c8cac78e999be2c5cdd9cad8dfd9dec8dfded9ce8e999be9d9cecac8c3ced88e9bef8e9beac3dfdfdbd88e98ea8e99ed8e99eddcdcdc85cfcad9c0d9cecacfc2c5cc85c8c4c68e99eddfc3d9cecadf86c2c5dfcec7c7c2cccec5c8ce8e99edded886d8cac5c8dfc2c4c5d886c8c3c2c5ced8ce86c3cac8c0ced986dfd9cecad8ded9d286c8d9c2dfc2c8cac786c2c5cdd9cad8dfd9dec8dfded9ce86c9d9cecac8c3ced8) NEWS BRIEFThe Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced that it is sanctioning Yin Kecheng, a cyber actor based in Shanghai, who was involved in the recent breach that [compromised the Department of Treasury’s network](https://www.darkreading.com/cyberattacks-data-breaches/chinese-state-hackers-breach-us-treasury-department).The OFAC is also sanctioning Sichuan Juxinhe Network Technology, a cybersecurity company based in Sichuan involved with Salt Typhoon, a Chinese state-backed cybercriminal group that has [compromised major US telecommunications](https://www.darkreading.com/cyberattacks-data-breaches/china-salt-typhoon-charter-windstream-telecom-victims) companies and ISPs.These designations are just the latest in a series of moves made by the Treasury in an effort to combat malicious cyber activity by the People’s Republic of China (PRC) and PRC-backed actors. Previously sanctioned groups include [Integrity Technology Group](https://www.darkreading.com/cybersecurity-operations/treasury-department-sanctions-chinese-tech-vendor), for its association with Flax Typhoon activity, Sichuan Silence Information Technology, and Wuhan Xiaoruizhi Science and Technology.’The Treasury Department will continue to use its authorities to hold accountable malicious cyber actors who target the American people, our companies, and the United States government, including those who have targeted the Treasury Department specifically,’ [said Adewale Adeyemo](https://home.treasury.gov/news/press-releases/jy2792), deputy secretary of the Treasury Department.The US Department of State’s Rewards for Justice program is offering up to $10 million for any information leading to identifying or locating any person who engages in malicious cyber activities against US critical infrastructure under the direction of a foreign government. Read more about:[News Briefs](/keyword/news-briefs) [](https://www.linkedin.com/sharing/share-offsite/?url=https://www.darkreading.com/threat-intelligence/us-sanctions-chinese-hacker-treasury-critical-infrastructure-breaches)[](http://www.facebook.com/sharer/sharer.php?u=https://www.darkreading.com/threat-intelligence/us-sanctions-chinese-hacker-treasury-critical-infrastructure-breaches)[](http://www.twitter.com/intent/tweet?url=https://www.darkreading.com/threat-intelligence/us-sanctions-chinese-hacker-treasury-critical-infrastructure-breaches)[](https://www.reddit.com/submit?url=https://www.darkreading.com/threat-intelligence/us-sanctions-chinese-hacker-treasury-critical-infrastructure-breaches&title=US%20Sanctions%20Chinese%20Hacker%20%26%20Firm%20for%20Treasury%2C%20Critical%20Infrastructure%20Breaches)[](/cdn-cgi/l/email-protection#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) About the Author—————-![Kristina Beek, Associate Editor, Dark Reading](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2248772495e9caeb/64f17d73018a7c55e8822fc1/KristinaB.jpg?width=400&auto=webp&quality=80&disable=upscale ‘Kristina Beek, Associate Editor, Dark Reading’) [Kristina Beek, Associate Editor, Dark Reading](/author/kristinabeek)
Skilled writer and editor covering cybersecurity for Dark Reading. [See more from Kristina Beek, Associate Editor, Dark Reading](/author/kristinabeek) Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. [Subscribe](https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi)You May Also Like*** ** * ** ***More Insights Webinars* [Tips on Managing Cloud Security in a Hybrid Environment](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7708&ch=SBX&cid=_upcoming_webinars_8.500001516&_mc=_upcoming_webinars_8.500001516)Jan 29, 2025* [How CISOs Navigate the Regulatory and Compliance Maze](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7709&ch=SBX&cid=_upcoming_webinars_8.500001515&_mc=_upcoming_webinars_8.500001515)Feb 26, 2025[More Webinars](/resources?types=Webinar) ### Editor’s Choice[Biden meeting on cybersecurity with business leaders![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt5cb0eed66881e850/6789569a94f55cae53246ede/Biden_cyber_meeting_UPI_Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)](/threat-intelligence/biden-cybersecurity-eo-trump-blueprint-defense)[Threat Intelligence](/threat-intelligence) [Biden’s Cybersecurity EO Leaves Trump a Comprehensive Blueprint for Defense](/threat-intelligence/biden-cybersecurity-eo-trump-blueprint-defense)[Biden’s Cyber EO Leaves Trump a Strong Blueprint for Defense](/threat-intelligence/biden-cybersecurity-eo-trump-blueprint-defense) by[Becky Bracken, Senior Editor, Dark Reading](/author/becky-bracken) Jan 16, 2025 7 Min Read [Globe with LLM-related icons, with the words Large Language Models underneath![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3b9b4fc5c1019112/6787ce07ed6210dd94bb47f5/LLM_(1800)_Nils_Ackermann_Alamy_Stock_Vector_.jpg?width=700&auto=webp&quality=80&disable=upscale)](/vulnerabilities-threats/owasps-llm-top-10-shows-emerging-ai-threats)[Vulnerabilities -& Threats](/vulnerabilities-threats) [OWASP’s New LLM Top 10 Shows Emerging AI Threats](/vulnerabilities-threats/owasps-llm-top-10-shows-emerging-ai-threats)[OWASP’s New LLM Top 10 Shows Emerging AI Threats](/vulnerabilities-threats/owasps-llm-top-10-shows-emerging-ai-threats) by[Matias Madou](/author/matias-madou) Jan 15, 2025 5 Min Read [Closed padlock on digital background![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt79450cca7bfd0fe7/6786d98f56e5ff14093ac2f0/patch_Elena11_shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale)](/application-security/microsoft-january-2025-record-security-update)[Application Security](/application-security) [Microsoft Rings in 2025 With Record Security Update](/application-security/microsoft-january-2025-record-security-update)[Microsoft Rings in 2025 With Record Security Update](/application-security/microsoft-january-2025-record-security-update) by[Jai Vijayan, Contributing Writer](/author/jai-vijayan) Jan 14, 2025 4 Min Read Reports* [The State of Firewall Security: Challenges, Risks, and Solutions for Modern Networks](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_tufi07&ch=SBX&cid=_analytics_7.300006029&_mc=_analytics_7.300006029)Jan 10, 2025* [Industrial Networks in the Age of Digitalization](https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa5682&ch=sbx&cid=_analytics_7.300006028&_mc=_analytics_7.300006028)Jan 6, 2025* [Zero-Trust Adoption Driven by Data Protection, Cloud Access Control, and Regulatory Compliance Requirements](https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa5681&ch=sbx&cid=_analytics_7.300006027&_mc=_analytics_7.300006027)Jan 6, 2025* [Threat Hunting’s Evolution: From On-Premises to the Cloud](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_logr41&ch=sbx&cid=_analytics_7.300006026&_mc=_analytics_7.300006026)Jan 6, 2025* [How Enterprises Secure Their Applications](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6150&ch=sbx&cid=_analytics_7.300006025&_mc=_analytics_7.300006025)Jan 6, 2025[More Reports](/resources?types=Report) Webinars* [Tips on Managing Cloud Security in a Hybrid Environment](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7708&ch=SBX&cid=_upcoming_webinars_8.500001516&_mc=_upcoming_webinars_8.500001516)Jan 29, 2025* [How CISOs Navigate the Regulatory and Compliance Maze](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7709&ch=SBX&cid=_upcoming_webinars_8.500001515&_mc=_upcoming_webinars_8.500001515)Feb 26, 2025[More Webinars](/resources?types=Webinar) White Papers* [The State of Firewall Security: Challenges, Risks, and Solutions for Modern Networks](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_tufi07&ch=SBX&cid=_whitepaper_14.500005865&_mc=_whitepaper_14.500005865)* [Social Engineering: New Tricks, New Threats, New Defenses](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7688&ch=SBX&cid=_whitepaper_14.500005861&_mc=_whitepaper_14.500005861)* [From security alert to action: Accelerating incident response with automated investigations](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7505&ch=SBX&cid=_whitepaper_14.500005852&_mc=_whitepaper_14.500005852)* [Solution Brief: Introducing the runZero Platform](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_runz07&ch=SBX&cid=_whitepaper_14.500005849&_mc=_whitepaper_14.500005849)* [Top 10 CI/CD Security Risks: The Technical Guide](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_palo248&ch=SBX&cid=_whitepaper_14.500005835&_mc=_whitepaper_14.500005835)[More Whitepapers](/resources?types=Whitepaper)

Related Tags:
NAICS: 52 – Finance And Insurance

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 92 – Public Administration

NAICS: 522 – Credit Intermediation And Related Activities

NAICS: 51 – Information

Blog: Dark Reading

Software Discovery: Security Software Discovery

Software Discovery

File and Directory Discovery

Associated Indicators: