Government ❯International Relations ❯Cyber Espionage ❯China-U.S. Relations
The attack, attributed to a state-sponsored group, exploited a third-party software vulnerability to access workstations and unclassified documents.