Summary: Reports surfaced today that Chinese state-sponsored hackers successfully targeted the email systems of US Congressional staff. The operation was designed to exfiltrate sensitive legislative data and communications, continuing a trend of high-level government espionage.
Business Impact: This highlights the persistence of “Living off the Land” (LotL) techniques that bypass traditional antivirus. It suggests that even the most highly-monitored government networks are susceptible to advanced credential-based attacks.
Why It Happened: Attackers likely utilized valid but stolen credentials or session tokens, allowing them to appear as legitimate users within the Microsoft 365 environment.
Recommended Executive Action: Enforce strict “FIDO2 Only” MFA for all administrative and high-value accounts. Move toward certificate-based authentication to eliminate the risk of session hijacking.
Hashtags: #Espionage #China #CyberAttack #GovSec #Microsoft365 #Infosec
