Friday , May 9 2025

Canada cyber centre issues warning after group issues threat

The Canadian government’s cyber authority has issued a warning to IT administrators here to watch for attacks, after a group or individual claiming to be from India issued a retaliation threat over allegations India may have been behind the assassination of a Canadian man advocating for an independent Sikh state.

“CSE [the Canadian Security Establishment] and its Canadian Centre for Cyber Security (Cyber Centre) have observed that geopolitical events often result in an increase in disruptive cyber campaigns. We continue to monitor for any developing cyber threats and share threat information with our partners and stakeholders to help prevent incidents,” says the statement.

Qilin Ransomware topped April 2025 with 45+ data leak disclosures

The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
Qilin Ransomware topped April 2025 with 45+ data leak disclosures

SonicWall Patches 3 Flaws in SMA 100 Devices

SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
SonicWall Patches 3 Flaws in SMA 100 Devices

Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

Cisco has issued a security advisory for a critical vulnerability in its IOS XE Software for Wireless LAN Controllers (WLCs)....
Read More
Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

CVE-2025-29824
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an attempted attack against an organization...
Read More
CVE-2025-29824  Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Hacker exploited Samsung MagicINFO 9 Server RCE flaw

Hackers are exploiting an unauthenticated remote code execution vulnerability in the Samsung MagicINFO 9 Server to take control of devices...
Read More
Hacker exploited Samsung MagicINFO 9 Server RCE flaw

CISA adds Langflow flaw to its KEV catalog

CISA added the Langflow vulnerability, CVE-2025-3248 (CVSS score 9.8), to its Known Exploited Vulnerabilities catalog. Langflow is a popular tool...
Read More
CISA adds Langflow flaw to its KEV catalog

Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Google has released its monthly Android security updates, addressing 46 vulnerabilities, including one that has been actively exploited. CVE-2025-27363 (CVSS...
Read More
Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

UAP hosted “UAP Cyber Siege 2025”, A national level cybersecurity competition

The Cyber Security Club, representing the Department of Computer Science and Engineering at the University of Asia Pacific (UAP), has...
Read More
UAP hosted “UAP Cyber Siege 2025”, A national level cybersecurity competition

xAI Dev Leaks API Key for Private SpaceX, Tesla & Tweeter

A major security issue happened at Elon Musk’s AI company, xAI, when a developer accidentally posted a private API key...
Read More
xAI Dev Leaks API Key for Private SpaceX, Tesla & Tweeter

ALSO READ:

AI in traffic signal in BD, Auto case while crossing white spot

“However, the Cyber Centre’s primary focus is on defending Government of Canada networks from cyber threats. We focus on the type of threat, not where the threat originates. For that reason, we generally do not provide statistics, or information on reporting trends.

“We encourage Canadians and Canadian organizations to be aware of cyber threats and to remain vigilant.”

The statement came after IT World Canada asked the Cyber Centre if it had received reports or seen evidence of hacking groups based in India launching recent retaliatory attacks here.

According to Brett Callow, a B.C.-based threat analyst with Emsisoft, a group calling itself the Indian Cyber Force posted a threatening message last week on the X messaging platform. It says, “Get ready to feel the power of IndianCyberForce attacks will be launching on Canada cyber space in the coming 3 days. It’s for the mess your started.” [This is the actual wording of the posting]

A website with a .ca suffix that appears to belong to a Canadian dental clinic has been defaced with the message, “Hacked by Indian Cyber Force.” However, the real website, whose address begins with ‘www,’ isn’t affected. The defaced website has a similar name and could be a spoof. Or the dental clinic’s site was defaced and it quickly set up a new one. IT World Canada asked the site on Sunday for comment. None was received by our deadline.

“At this point it’s impossible to say whether this is an organized hacktivist operation or a lone high school kid,” Callow said of the threat. “Whatever the case, even the most unsophisticated cyberattacks have the potential to cause real-world problems, as the disruption caused by the recent DDoS attack on the Canadian Border Services Agency demonstrated.

“Given current geo-political tensions, all Canadian organizations should assume that they may be targeted and ensure their shields are fully up.”

As for why a dental website would be targeted, Callow suspects it was random: The site came up after a scan for vulnerable Canadian websites.

Website administrators must ensure their sites are fully patched and that admin access is restricted. That includes making sure management consoles aren’t available on the public internet unless shielded with VPN access and multifactor authentication for logins. Websites should also be prepared to deal with DDoS attacks.

Source: itworldcanada

Check Also

Hacker

Ransomware Attack On Biopharma : Hacker seeks $80k

Indian Pimpri Chinchwad police’s cyber cell is looking into a complaint where a hacker demanded …

Leave a Reply

Your email address will not be published. Required fields are marked *