Congressional Budget Office implementing new security controls following cyberattack

The Congressional Budget Office (CBO) disclosed a cybersecurity incident this week after an alleged nation-state breached its systems. 

The federal agency offers budget and economic information to Congress. The Washington Post reported on Thursday that an unnamed “foreign actor” hacked into the agency and may have gained access to messages and chats between Congressional offices and staffers. 

A spokesperson for the CBO confirmed the security incident and said the agency has taken immediate action to contain it while also implementing “additional monitoring and new security controls to further protect the agency’s systems going forward.”

“The incident is being investigated and work for the Congress continues,” the spokesperson said. “Like other government agencies and private sector entities, CBO occasionally faces threats to its network and continually monitors to address those threats.”

An anonymous source told The Washington Post that the breach was discovered in “recent days” and that the agency told Congress it detected the incident “early.”

The CBO declined to answer follow-up questions about the nature of the breach and how the hackers gained entry. The agency provides analysis of the financial impact of legislation to Congress. 

Nation-state hackers have repeatedly targeted federal government agencies involved in the country’s finances. Threat actors gained access to “highly sensitive information” in February after breaching the email system used by the U.S. Office of the Comptroller of the Currency (OCC).

Chinese hackers breached systems at the Treasury Department in December 2024 and accessed computers used by then Secretary Janet Yellen, Deputy Secretary Adewale Adeyemo and acting Undersecretary Brad Smith. Several Chinese citizens and companies were eventually sanctioned for their role in the cyberattacks. 

Last year, several U.S. agencies were also attacked by Russian government hacking groups through a vulnerability in software from Microsoft. 

Throughout 2025, federal cybersecurity agencies have warned of several vulnerabilities that would likely be used by hackers to target government systems. The Cybersecurity and Infrastructure Security Agency has released urgent emergency directives about bugs affecting popular federal government tools from Microsoft, Cisco and Oracle.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Samsung Mobile Flaw Exploited as Zero-Day to Deploy LANDFALL Android Spyware

Next Post

Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic

Related Posts

3 SOC Challenges You Need to Solve Before 2026

2026 will mark a pivotal shift in cybersecurity. Threat actors are moving from experimenting with AI to making it their primary weapon, using it to scale attacks, automate reconnaissance, and craft hyper-realistic social engineering campaigns. The Storm on the Horizon Global world instability, coupled with rapid technological advancement, will force security teams to adapt not just their
Read More

U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme

The U.S. Justice Department (DoJ) on Monday announced the seizure of a web domain and database that it said was used to further a criminal scheme designed to target and defraud Americans by means of bank account takeover fraud. The domain in question, web3adspanels[.]org, was used as a backend web panel to host and manipulate illegally harvested bank login credentials. Users to the website are
Read More

CTEM in Practice: Prioritization, Validation, and Outcomes That Matter

Cybersecurity teams increasingly want to move beyond looking at threats and vulnerabilities in isolation. It’s not only about what could go wrong (vulnerabilities) or who might attack (threats), but where they intersect in your actual environment to create real, exploitable exposure. Which exposures truly matter? Can attackers exploit them? Are our defenses effective? Continuous Threat Exposure
Read More