Hackers attempted decryption of classified data.
Decryption of sensitive files requires a secure key.