Comer, Mace, & Grothman Open Probe into Data Breach of Email Systems at U.S. Federal Agencies
Request briefings from State and Commerce over breach by Chinese hackers
WASHINGTON— House Committee on Oversight and Accountability Chairman James Comer (R-Ky.), Subcommittee on Cybersecurity, Information Technology, and Government Innovation Chairwoman Nancy Mace (R-S.C.), and Subcommittee on National Security, the Border, and Foreign Affairs Chairman Glenn Grothman (R-Wis.) are investigating recent cyber espionage campaigns which breached the Department of State and the Department of Commerce. In a letter to Secretary of State Antony Blinken and Secretary of Commerce Gina Raimondo, the Republican lawmakers request a briefing to understand the extent and ramifications of the breach by Chinese hackers.
“According to recent reports, as part of a ‘suspected cyber-espionage campaign to access data in sensitive computer networks’ by China, the breaches reportedly occurred at over two dozen organizations, including some U.S. government agencies. We request a briefing on the discovery of, impact of, and response to the intrusion,” wrote the lawmakers.
The breaches appear to have occurred due to a “flaw in a Microsoft cloud-computing environment” that allowed hackers to gain access to email accounts. Commerce Secretary Raimondo’s email was among those accessed by the hackers.
“We are also concerned that these attacks on federal agencies, which include at least the Department of Commerce and the Department of State, reflect a new level of skill and sophistication from China’s hackers,” continued the lawmakers. “To help the Subcommittees understand the discovery of the intrusion, impact of the intrusion at the Department, how the Department responded, and what the Department is doing to ensure the continued security of its email and overall information systems, we request a staff briefing as soon as possible but no later than August 9, 2023.”
Read the full letter to Secretary Blinken here.
Read the full letter to Secretary Raimondo here.