DHS: National Guard compromised by Chinese ‘Salt Typhoon’ hackers for nearly 12 months

A recent internal memorandum from the U.S. Department of Homeland Security (DHS) has shed light on a prolonged cyber intrusion targeting National Guard systems, allegedly carried out by a Chinese-linked hacking group known in cybersecurity circles as “Salt Typhoon.” According to the memo, the threat actors maintained unauthorized access for close to a year before being detected and removed.

The security intrusion, allegedly unnoticed for numerous months, has sparked fresh worries among government cybersecurity specialists and defense authorities regarding the weaknesses within networks linked to the military. Although authorities have not revealed the complete scope of the data breach, the document suggests that the intruders managed to view and possibly obtain sensitive, confidential data.

Salt Typhoon, which has historically been linked to cyber operations supported by Beijing, is recognized for its covert methods and enduring presence in targets it considers of strategic significance. The group generally employs advanced phishing tactics, compromised user credentials, and exploited software holes to penetrate networks and subsequently functions discreetly to evade identification.






Document

The document from DHS highlights that although the perpetrators did not seem to interfere with operations or technology, the aim of the infiltration was probably exploration and prolonged information collection. By having sustained access, the team could have obtained understanding of military coordination, emergency management plans, personnel logistics, or planning systems linked to national and overseas missions.


The National Guard is essential in managing disaster relief efforts, providing civil support, and conducting defense initiatives at a state level. Operating as part of both the state and federal governments, it acts as an important link between local security measures and national defense strategies. Any compromise in its communication or administrative systems could hinder crisis coordination or give adversaries a strategic edge in future operations.

Cybersecurity analysts are now working to trace the attackers’ entry point, assess the depth of the breach, and evaluate whether any lateral movement occurred into other interconnected defense systems. While initial reports suggest the attack was isolated to specific Guard-related networks, concerns persist over potential spillover effects into broader Department of Defense (DoD) systems.

Officials familiar with the investigation emphasized that no classified systems were compromised and that the breach did not affect operational readiness. However, the length of time during which the attackers remained undetected has intensified calls for improved cybersecurity monitoring, greater investment in threat detection tools, and tighter coordination between state-level agencies and federal cyber defense units.

The potential connection of Salt Typhoon links the situation to wider issues regarding cyber actions allegedly backed by the Chinese government. U.S. intelligence representatives have consistently cautioned that such activities are growing in reach and aspiration. These efforts frequently focus on areas essential to national security, such as defense contractors, public infrastructure, health services, and energy sectors.

Cybersecurity companies monitoring Salt Typhoon describe the group as especially skilled at keeping a low profile. Their methods frequently involve avoiding setting off typical security alerts, utilizing valid administrative credentials, and performing activities during local after-hours to reduce the chance of being detected. Additionally, they have been noted for altering system logs and deactivating monitoring features to hide their presence even more.

Following the breach, both federal and state cybersecurity units performed forensic examinations and have executed measures to contain the situation. Protocols for managing patches have been revised, access credentials have been refreshed, and additional monitoring has been introduced for the impacted systems. The DHS has provided guidance to other units of the National Guard and related defense agencies to assess their own systems for signs of intrusion.

The event underscores the difficulties the U.S. encounters when protecting against sophisticated persistent threats (APTs) from financially supported foreign opponents. As these entities keep enhancing their methods, safeguarding systems that span across both federal and state jurisdictions becomes more complicated. The National Guard’s distinctive dual authority framework makes unified cybersecurity actions crucial—but also demanding.

Lawmakers have taken note of the breach, with some calling for congressional hearings to better understand how the intrusion occurred and what systemic vulnerabilities need to be addressed. Several members of Congress have also urged an expansion of cyber readiness budgets and support for public-private information sharing initiatives.

The U.S. government has taken various steps in recent years to strengthen its cybersecurity posture, including the creation of the Cybersecurity and Infrastructure Security Agency (CISA), enhancements to the National Cybersecurity Strategy, and joint exercises with private sector partners. However, incidents like this serve as reminders that even heavily defended systems remain vulnerable without constant vigilance and proactive defense measures.

This latest breach follows a string of high-profile cyber intrusions attributed to Chinese hacking groups, including those targeting federal agencies, research institutions, and supply chain partners. The Biden administration has previously sanctioned several Chinese individuals and entities connected to malicious cyber activity and has pressed for international cooperation in identifying and deterring state-sponsored cyber aggression.

The long-term implications of the Salt Typhoon intrusion are still being assessed. If intelligence was exfiltrated over the extended period of access, the stolen data could potentially be used to inform adversarial decision-making, influence disinformation campaigns, or support future cyber operations.

As the DHS and the National Guard continue to investigate the breach, cybersecurity experts warn that similar campaigns may still be active in other areas of government. Increased coordination, real-time data sharing, and faster response times will be crucial in countering future intrusions.

Ultimately, the Salt Typhoon incident reflects the evolving nature of modern espionage. Rather than relying solely on physical surveillance or human intelligence, state-sponsored groups are now leveraging digital infiltration as a primary means of gathering sensitive information. Addressing this threat will require not only technical solutions but also strategic policy reforms and sustained investment in cyber defense infrastructure.

By Liam Walker

You May Also Like