Skip to main content
Mallory

Hackers Tamper with Canadian Critical Infrastructure Control Systems

critical-infrastructure-threatindustrial-control-system-vulnerabilityoperational-disruptioninitial-access-method
Updated March 21, 2026 at 03:33 PM2 sources
Share:
Hackers Tamper with Canadian Critical Infrastructure Control Systems

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Hackers have remotely tampered with operational settings in multiple Canadian critical infrastructure organizations, including a provincial water utility, an oil and gas company, and a grain drying silo. The Canadian Centre for Cyber Security issued an alert warning that attackers manipulated pressure valves at a water utility, degrading services, and triggered false alerts at an oil and gas company by altering automated tank gauges. In another incident, temperature and humidity controls were changed at a grain silo, creating potential safety risks. These attacks highlight the vulnerability of small, budget-constrained utilities to cyber threats targeting industrial control systems.

The incidents underscore a growing trend of cyberattacks against critical infrastructure, with attackers exploiting remote access to manipulate physical processes and disrupt essential services. The advisory emphasizes the need for improved cybersecurity measures in the sector, as many organizations lack the resources and preparedness to defend against sophisticated threats. No specific attribution has been made public, but the attacks have raised concerns about the safety and reliability of essential services in Canada.

Timeline

  1. Oct 30, 2025

    F5 confirms China-linked nation-state breach

    F5 disclosed that a China-linked nation-state actor breached its environment and stole source code and research data. The company said some customers were affected, and the incident contributed to a revenue decline.

  2. Oct 30, 2025

    Svenska kraftnät investigates breach after ransomware claim

    Svenska kraftnät said it was investigating a data breach following the Everest group's extortion claim, while noting that Sweden's power supply was not affected. The response confirmed an official investigation into the incident at the grid operator.

  3. Oct 30, 2025

    Everest claims theft of 280GB from Svenska kraftnät

    The Everest ransomware group claimed it stole 280GB of internal data from Sweden's state-owned power grid operator, Svenska kraftnät. The claim prompted scrutiny of a potential breach involving sensitive utility data.

  4. Oct 30, 2025

    Canadian authorities report cyber tampering across critical infrastructure

    Canadian authorities reported opportunistic cyberattacks affecting critical infrastructure sectors including water utilities, oil and gas, and grain silos. The incidents caused service disruptions and raised safety concerns, though reports indicated they were not catastrophic.

  5. Oct 30, 2025

    Google debunks reports of a new massive Gmail breach

    Google clarified that widely circulated claims of a large new Gmail breach were false, stating the exposed data instead came from infostealer malware. The statement reframed the incident as credential theft aggregation rather than a fresh compromise of Gmail itself.

  6. Oct 30, 2025

    Merkle confirms breach exposing employee and client data

    Dentsu confirmed a data breach at its U.S. subsidiary Merkle that exposed sensitive employee and client information. The disclosure identified Merkle as an affected victim and confirmed the impact on internal and customer-related data.

  7. Oct 30, 2025

    PhantomRaven campaign uses malicious npm packages to steal credentials

    Researchers reported the PhantomRaven campaign targeting developers through malicious npm packages designed to steal credentials and secrets. The campaign highlighted software supply chain risks affecting developer environments.

  8. Oct 30, 2025

    APT36 deploys DeskRAT in phishing against Indian government targets

    Pakistan-linked APT36 was reported using a new malware called DeskRAT in spear-phishing attacks targeting Indian government entities. The activity reflected an escalation in ongoing cyber operations tied to South Asian geopolitical tensions.

  9. Oct 30, 2025

    Australian pleads guilty to selling U.S. defense cyber exploits to Russian broker

    An Australian national pleaded guilty to selling cyber exploits tied to U.S. defense systems to a Russian broker, reportedly possibly linked to Operation Zero. The plea marked a law-enforcement development in a case involving illicit exploit sales.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

October 30, 2025 at 12:00 AM
October 30, 2025 at 12:00 AM

Related Stories

Hacktivist Intrusions into Canadian Industrial Control Systems

Hacktivist Intrusions into Canadian Industrial Control Systems

Hacktivists have breached multiple internet-accessible industrial control systems (ICS) across Canada, targeting critical infrastructure sectors including water treatment, oil and gas, and agriculture. In one incident, attackers tampered with water pressure values at a water facility, leading to degraded service for the local community. Another attack involved manipulating an Automated Tank Gauge (ATG) at an oil and gas company, which triggered false alarms, while a third incident saw the manipulation of temperature and humidity controls at a grain drying silo, creating potentially unsafe conditions. Authorities report that these attacks were opportunistic rather than highly sophisticated, with the primary aim of causing disruption, generating media attention, and undermining public trust in Canadian infrastructure. The Canadian Centre for Cyber Security and the Royal Canadian Mounted Police have issued alerts to raise awareness about the increased threat to internet-exposed ICS and to urge organizations to strengthen their security measures. While the incidents did not result in catastrophic consequences, they highlight the risks posed by insufficiently secured ICS and the growing interest of hacktivist groups in targeting such systems. The authorities emphasize the need for improved detection and mitigation strategies to prevent similar attacks in the future and to protect critical infrastructure from both opportunistic and more advanced threat actors.

1 months ago
Hacktivist and Cyberattacks Targeting Water Utilities and Critical Infrastructure

Hacktivist and Cyberattacks Targeting Water Utilities and Critical Infrastructure

Canada’s Centre for Cyber Security has issued a warning about the increasing threat posed by hacktivists and other malicious actors targeting industrial control systems (ICS) in critical sectors such as water, oil and gas, and agriculture. The agency highlighted recent real-world incidents where attackers gained access to control systems, including a case where hackers tampered with water pressure at a Canadian water utility, impacting customer service. The alert also referenced similar attacks in the United States, such as the Cyber Av3ngers’ intrusion into a Pennsylvania water authority’s ICS and the Oldsmar, Florida incident where a hacker attempted to alter chemical levels in the water supply. These events underscore the risks associated with internet-exposed ICS devices and the potential for operational disruption. In the United Kingdom, reports obtained from the Drinking Water Inspectorate (DWI) reveal that five cyberattacks have targeted Britain’s drinking water suppliers since early 2024. While none of these incidents directly compromised the safety of the water supply, they did affect the organizations responsible for its delivery. The DWI noted that current regulations only require formal reporting of cyber incidents that disrupt essential services, potentially leaving other significant threats unreported. British officials are considering changes to the legal framework to lower the threshold for mandatory disclosure of cyber incidents affecting critical infrastructure. Both Canadian and British authorities emphasize the growing cyber risk to water utilities and the need for improved resilience and reporting standards.

1 months ago
Chinese State-Linked Cyber Intrusions Targeting US Water Utilities

Chinese State-Linked Cyber Intrusions Targeting US Water Utilities

Hackers associated with China have gained unauthorized access to the IT networks of hundreds of small and medium-sized water utilities and other critical infrastructure providers across the United States. These intrusions are believed to be part of a broader strategy to position Chinese actors to sabotage American water and power supplies in the event of a geopolitical conflict, particularly if tensions escalate over Taiwan. U.S. officials have been aware of this threat for over two years, and recent reporting has brought renewed attention to the scale and persistence of these cyber operations. The targeted utilities are often located in rural areas and small towns, which typically lack the cybersecurity resources and expertise of larger metropolitan systems. The operational technology (OT) systems that control water treatment and distribution are especially vulnerable due to their increasing automation and remote accessibility. The risk is compounded by a significant resource gap, as many of these utilities struggle to defend against sophisticated nation-state threats. Efforts to bolster defenses have included the launch of two non-profit initiatives aimed at supporting critical infrastructure operators, but these programs face their own limitations. One of the non-profits has paused its activities to recalibrate its approach, while the other is only able to provide assistance in a limited number of states due to resource constraints. The threat underscores the broader challenge of protecting critical infrastructure in the United States, where many essential services are managed by small organizations with limited budgets. The potential for cyber sabotage of water and power systems raises concerns about the resilience of civilian infrastructure in the face of international conflict. U.S. government agencies have issued warnings and guidance to utilities, but implementation of robust security measures remains inconsistent. The situation highlights the need for increased investment in cybersecurity for critical infrastructure, particularly in rural and underserved areas. The ongoing threat from Chinese-linked hackers demonstrates the strategic importance of water and power utilities as potential targets in modern cyber warfare. The exposure of these vulnerabilities has prompted calls for greater public-private collaboration and federal support. The risk is not limited to water utilities, as other sectors of critical infrastructure may face similar threats from state-sponsored actors. The revelations serve as a wake-up call for the urgent need to address cybersecurity gaps in essential services. The possibility of coordinated attacks on infrastructure during a geopolitical crisis could have far-reaching consequences for national security and public safety. The current state of preparedness among small utilities is insufficient to counter the scale and sophistication of the threat. The situation remains dynamic, with ongoing efforts to assess and mitigate the risks posed by foreign cyber actors.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.