Overview
- Committee investigators said multiple recent emails from a nongovernment account posed as Rep. John Moolenaar to push malware and credential traps tied to US–China trade discussions.
- Targets included US government agencies, business groups, law firms, think tanks, and at least one foreign government, according to the panel.
- A technical review cited abuse of software and cloud services to mask activity, with separate reporting linking the tooling to the Chinese-associated threat actor APT41.
- The committee alerted the FBI and US Capitol Police, and the FBI confirmed it is working with partners to identify and pursue those responsible.
- Officials said they have not determined whether any intrusions succeeded, and China’s embassy denied the allegations while the panel shared indicators from related campaigns with federal partners.