Connect with us

Hi, what are you looking for?



Gangs, States and ‘Geeks’ Behind Canada Cyberattacks: Minister

Cyberattacks on Canadian government computers by what a minister described Tuesday as gangsters, rogue states and “geeks in basements” are on the rise, but are also failing more, according to a report.

Cyberattacks on Canadian government computers by what a minister described Tuesday as gangsters, rogue states and “geeks in basements” are on the rise, but are also failing more, according to a report.

The nation’s ultra-secretive eavesdropping agency or Communications Security Establishment (CSE) however concluded that Canada is not doing enough to fend off intruders.

“Some of it is just nuisance,” Public Safety Minister Ralph Goodale told reporters. “Some of it is criminal in intent.”

“It comes from organized crime. It comes from rogue states. It comes from foreign militaries. It comes from geeks in the basement,” he said.

In the report, the CSE found that the government blocks more than 600 million attempts each day to identify or exploit system vulnerabilities.

Between 2013 and 2015, this included more than 2,500 state-sponsored cyber attacks. The culprits were not identified, but Ottawa previously said that China was responsible for a major cyberattack on its National Research Council in 2014.

“Although more than six percent of these attempts breached the government of Canada’s systems in 2013, this number had fallen to less than two percent in 2015,” it noted.

Still, Ottawa’s investment in security systems remains “inadequate,” the CSE said.

Advertisement. Scroll to continue reading.

The government’s outreach to the private sector has also largely failed because, according to the agency, “private sector companies seem to lack trust in the public sector’s ability to safeguard their information.”

According to a senate committee studying cybersecurity and cyberfraud, eight million Canadians fell victim to a cybercrime last year.

Goodale said cyber crimes cost businesses around the world an estimated Can$400 billion each year, and that figure is predicted to rise to Can$2 trillion annually by 2020.

Given allegations of Russian meddling in last year’s US presidential vote, Ottawa is also taking measures to safeguard its elections.

The CSE warned in a separate report earlier this year that “almost certainly multiple hacktivist groups will deploy cyber capabilities in an attempt to influence the democratic process in 2019,” when the next federal elections are scheduled.

Written By

AFP 2023

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.


Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.