The U.S. Congressional Budget Office (CBO), a critical nonpartisan agency providing economic and budgetary analysis to the U.S. Congress, has confirmed it was the target of a cyberattack. The incident, acknowledged on November 7, 2025, involved unauthorized access to its network and has caused operational disruptions. While official attribution is pending, U.S. officials have indicated that Chinese state-backed hackers are the primary suspects. The breach has potentially exposed sensitive internal data, including email communications and chat logs with Senate offices. The Senate Sergeant at Arms issued an alert to congressional staff about the 'ongoing' incident, highlighting the immediate and continuing risk. This attack underscores the persistent threat of nation-state espionage targeting U.S. government agencies for political and economic intelligence.
The breach was significant enough to prompt an official alert from the Senate Sergeant at Arms, who warned congressional staff to avoid clicking on links from CBO accounts, suggesting a risk of compromised accounts being used for further malicious activity, such as phishing. This led some congressional offices to temporarily halt email communications with the CBO, disrupting legislative and budgetary processes.
The attackers gained unauthorized access to the CBO's network, and the primary concern is the potential exfiltration of sensitive, non-public information. This could include draft reports, economic forecasts, analysis of pending legislation, and private communications between the CBO and members of Congress. Such information would be of immense value to a foreign adversary for predicting U.S. policy and gaining economic advantage.
CBO officials have stated they detected the intrusion early and took immediate action to contain it, subsequently implementing additional security controls. However, the full scope and duration of the compromise are still under investigation.
Specific technical details of the breach have not been publicly disclosed. However, based on the profile of the suspected threat actor (Chinese state-backed group) and the target, we can infer likely TTPs:
T1566 - Phishing) targeting CBO employees or the exploitation of a public-facing application (T1190 - Exploit Public-Facing Application) on the CBO's perimeter.T1021.001 - Remote Desktop Protocol) or SMB to access targeted systems.T1041 - Exfiltration Over C2 Channel) to blend in with normal traffic.The warning from the Senate Sergeant at Arms suggests that the attackers may have gained control of CBO email accounts (T1078 - Valid Accounts) and were attempting to use them to expand their foothold into other congressional networks.
A breach of the CBO by a foreign adversary has significant national security implications. The stolen data could provide insights into U.S. economic policy, legislative priorities, and budgetary planning, giving the attacking nation a strategic advantage in negotiations and economic competition. The disruption to CBO's operations and the subsequent breakdown in communication with congressional offices can slow down the legislative process. Furthermore, the incident erodes trust in the security of government institutions and can have a chilling effect on internal communications. The use of compromised CBO accounts to target other congressional entities represents a serious supply chain risk within the U.S. government's digital ecosystem.
D3-NTA: Network Traffic Analysis.D3-UBA: User Behavior Analysis.M1032 - Multi-factor Authentication): Enforce MFA on all accounts, especially for remote access, email, and access to sensitive data repositories. This is a critical defense against the use of stolen credentials. This is a core part of D3FEND's D3-MFA: Multi-factor Authentication.M1030 - Network Segmentation): Segment the network to prevent attackers from moving laterally with ease. Critical systems like email servers and databases should be in tightly controlled network zones.M1017 - User Training): Continuously train employees to recognize and report phishing attempts, which remain a primary initial access vector for nation-state actors.M1047 - Audit): Implement comprehensive logging and monitoring across all critical systems and send logs to a centralized SIEM for correlation and analysis. This enables faster detection of anomalous activity.Enforcing MFA across all external and internal services is the single most effective control to prevent attackers from using stolen credentials for access and lateral movement.
Mapped D3FEND Techniques:
Regular security awareness training helps users identify and report spear-phishing attempts, which are a common initial access vector for nation-state actors.
Implementing network segmentation contains breaches by making it harder for attackers to move laterally from a compromised system to critical data stores.
Given that the suspected threat actor is a sophisticated nation-state group likely adept at harvesting credentials, implementing phishing-resistant Multi-Factor Authentication (MFA) is the most critical mitigation for the CBO. This should be enforced universally for all users, including employees and contractors. Priority should be given to securing remote access (VPN), email access (e.g., Microsoft 365), and access to all administrative interfaces. The CBO should deploy FIDO2/WebAuthn hardware security keys for all privileged users and employees with access to sensitive data, as this method is resistant to phishing and credential theft attacks. For general users, a combination of authenticator apps and biometrics should be mandated. This single control would significantly raise the difficulty for the attackers to gain initial access and move laterally, even if they successfully steal a user's password.
To detect and respond to intrusions like the one targeting the CBO, continuous network traffic analysis is essential. Security teams must monitor all egress traffic for signs of data exfiltration. This includes looking for large, unexpected data flows to external IP addresses, connections to countries irrelevant to CBO's mission (like China), and the use of non-standard ports or protocols for communication. Implementing a Network Detection and Response (NDR) solution can help automate this process by baselining normal activity and alerting on deviations. Specifically for this incident, teams should hunt for traffic patterns indicative of C2 channels, which may be hidden within encrypted TLS traffic. Analyzing metadata such as session duration, data volume, and JA3/JA3S fingerprints can help uncover these covert channels even without full decryption.
Since the attackers may have compromised legitimate accounts, User Behavior Analysis (UBA) is key to detecting their activity. The CBO's security operations center should deploy tools that baseline normal user behavior and alert on anomalies. Key indicators to monitor include: a user account logging in from multiple geographic locations in a short time ('impossible travel'), access to sensitive data repositories that the user has never accessed before, and unusual command-line activity on a user's workstation. The alert from the Senate Sergeant at Arms about malicious links from CBO accounts suggests compromised email. UBA tools can detect this by flagging when an account sends an abnormally high volume of emails or when multiple recipients report emails from that account as phishing. These alerts allow for rapid account disablement to contain the threat.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats