
Chinese hackers have managed to breach the U.S. National Guard’s network, posing serious questions about our national security readiness.
At a Glance
- Salt Typhoon, a Chinese cyberespionage group, breached the U.S. National Guard from March to December 2024.
- The breach involved theft of sensitive data, including network configurations and personal information of service members.
- Despite the breach, the National Guard continued its operations while investigating the full scope of the intrusion.
- The incident raises concerns over the security of state and federal networks and potential future attacks.
Salt Typhoon’s Infiltration
Salt Typhoon, also known as APT41, has left its mark once again, executing a sophisticated cyberespionage campaign against the U.S. National Guard. The breach, lasting from March to December 2024, targeted the network of a specific state’s Army National Guard, although the state remains undisclosed for security reasons. The attack is a stark reminder of the asymmetric warfare tactics employed by state-backed hackers who exploit vulnerabilities in decentralized U.S. systems. This time, the intrusion led to the theft of sensitive data, including network diagrams, geographic maps, and even personal information of service members.
Chinese hackers breached US National Guard for nearly a year — NBC
Elite group Salt Typhoon ‘extensively compromised’ a state Guard network Mar–Dec 2024, DHS memo says
Sensitive military data may be exposed
According to NBC, China’s embassy says US gave no proof pic.twitter.com/kazs8q44ZW
— RT (@RT_com) July 16, 2025
The Department of Homeland Security issued a memo detailing the potential consequences of this breach, warning that the stolen data could facilitate further attacks on other states’ National Guard units. This breach isn’t an isolated incident; it’s part of a broader trend of Chinese cyber operations targeting U.S. critical infrastructure. While the National Guard Bureau claims that the breach hasn’t prevented mission fulfillment, the full scope of the intrusion remains under investigation, raising questions about the security of our national defense infrastructure.
Watch a report: Salt Typhoon breached the U.S. National Guard
Impact and Implications
The implications of this breach are immense. In the short term, there’s an immediate risk to the affected state’s National Guard operations and potential exposure of sensitive military and law enforcement data. The breach has increased the vulnerability of other states’ National Guard units and their cybersecurity partners due to stolen credentials and network diagrams. Long-term, the stolen data could be used to launch follow-on attacks, especially during national crises or conflicts. This raises concerns about the erosion of trust in the security of state and federal networks, prompting urgent calls for enhanced cybersecurity measures and interagency cooperation.
The economic, social, and political impacts are also significant. There will be increased costs for cybersecurity upgrades and incident response. Politically, tensions between the U.S. and China are likely to escalate, with potential for retaliatory measures or sanctions. The public is understandably concerned about the security of government and critical infrastructure networks, especially given the National Guard’s role in emergency response. This breach underscores the urgent need for robust supply chain and third-party risk management across sectors, particularly in telecommunications and technology, which remain high-value targets for Salt Typhoon.
Response and Expert Perspectives
Security analysts across the board have emphasized Salt Typhoon’s ability to maintain long-term, stealthy access and pivot across interconnected networks. This makes them particularly dangerous, as demonstrated by their persistence in some breaches lasting years before discovery. Google’s Threat Intelligence Group has highlighted the group’s innovative use of legitimate cloud services for command-and-control, complicating detection efforts and underscoring the sophistication of their operations.
The Chinese Embassy in Washington has not denied the campaign but insists that the U.S. has not provided conclusive evidence linking Salt Typhoon to the Chinese government. This denial comes amid increasing global cyber threats, with China framing the issue as part of a broader, global cyber threat landscape. However, the attribution to Salt Typhoon/APT41 is consistent across multiple independent sources, including reports from Google, Cisco, and various cybersecurity firms. These findings highlight the critical need for the U.S. to bolster its cybersecurity defenses and enhance its resilience against future cyber threats.












