A Canadian national is facing cybercrime-related charges in the United States and Canada, with authorities saying that he was involved in ransomware attacks.
Matthew Philbert, 31, of Ottawa, Ontario, was arrested on November 30 by Ontario Provincial Police and he remains in custody. Laptops, tablets, storage units, and blank cards were seized from the suspect.
In a joint press briefing on Tuesday, representatives of the FBI and Canadian police said Philbert conspired with others to attack businesses, government agencies and private individuals in the U.S. and Canada.
The attacks typically started with a malicious email that delivered malware designed to give the attacker complete access to the victim’s computer, investigators said.
The U.S. Justice Department said Philbert has been charged with one count of conspiracy to commit fraud and related activity in connection with computers, and one count of fraud and related activity in connection with computers.
The man has been charged in Alaska, where he allegedly targeted and damaged systems belonging to the state in April 2018. The indictment says the attack could have “caused the modification, impairment, and potential modification and impairment of the medical examination, diagnosis, treatment and care of 1 or more individuals.”
This suggests that the target was Alaska’s Department of Health and Social Services. The government organization was also targeted this year, but that attack has been linked to state-sponsored hackers.
Related: Canadian Teen Arrested Over Theft of $36 Million in Cryptocurrency
Related: Canadian Pleads Guilty to Hacking Yahoo
Related: Canadian Hacker Arrested for Spying Through Webcams

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- CISA, NSA Issue Guidance for IAM Administrators
- Analysis: SEC Cybersecurity Proposals and Biden’s National Cybersecurity Strategy
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Cisco Patches High-Severity Vulnerabilities in IOS Software
- ‘Nexus’ Android Trojan Targets 450 Financial Applications
- Tackling the Challenge of Actionable Intelligence Through Context
- Dole Says Employee Information Compromised in Ransomware Attack
- Backslash Snags $8M Seed Financing for AppSec Tech
