Close Menu
The Watch
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    The Watch
    Subscribe
    • Home
    • Top Stories
      • USNORTHCOM
      • Homeland Defense
      • Chinese Communist Party (CCP)
      • Russia
    • USNORTHCOM AOR
      • Arctic
      • North America
      • Mexico
      • The Caribbean
    • eTalk/Panel
      • Arctic eTalks
      • Arctic Academic eTalks
      • RUSI NS Panels
      • Perry Center eTalks/Panels
      • Ted Stevens Center eTalks/Panels
    • ASFR
    • Journal
      • Enduring Partnerships – V6
        • Mutually Beneficial Trusted Partnerships
        • Regional Cooperation
        • U.S. Shares Military Capabilities
      • Special Reports
      • Archive
    • About Us
      • Contributors
    • Contact Us
    The Watch
    Subscribe
    Home » Canada’s Cyber Centre warns of hackers targeting water, energy and farm systems
    North America

    Canada’s Cyber Centre warns of hackers targeting water, energy and farm systems

    The WatchBy The WatchNovember 20, 2025No Comments3 Mins Read
    A close-up of a uniform featuring the Canadian flag and a cyber patch is captured during the 93rd Ottawa Conference on Security and Defence at the Fairmont Château Laurier in Ottawa, Canada, on March 5, 2025. REUTERS
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The Canadian agency responsible for protecting the nation’s critical infrastructure against cyberattacks has warned that hackers have tampered with online systems that control water, energy and farm facilities. “Hacktivists are increasingly exploiting internet-accessible ICS [industrial control system] devices to gain media attention, discredit organizations, and undermine Canada’s reputation,” an alert from the Canadian Centre for Cyber Security said.

    The alert, sent to information security officers on October 29, 2025, says the Cyber Centre and the Royal Canadian Mounted Police have received multiple reports in recent weeks of incidents involving internet-accessible ICS devices. At a water facility, pressure valves were tampered with, degrading service in that area. At an oil and gas company, hackers interfered with an automated tank gauge, triggering false alarms. At a farm’s grain drying silo, temperature and humidity levels were manipulated, creating conditions that could have been dangerous if not caught in time. The alert did not say who might be behind the cyberattacks.

    An ICS lets service providers, utilities or businesses remotely monitor processes and control devices. Operational technology systems connected to the internet or other computer networks are “attractive targets” to hackers focused on tampering with services, the center said in a July notice.

    Paul Shaver, an expert in operational technology security at Mandiant, part of Google Cloud, said pro-Russia hackers often target internet-connected systems, especially those tied to critical infrastructure for water, energy and manufacturing. “Their primary initial access method often involves opportunistically exploiting unpatched, publicly known vulnerabilities in internet-facing devices, weak security configurations, or the use of default credentials,” Shaver said in a media statement. “This focus on readily accessible flaws — effectively the lowest-hanging fruit — underscores a critical point: robust security hygiene measures are the most effective defense.”

    The Cyber Centre is a division of the Communications Security Establishment, Canada’s information technology security and signals intelligence agency. In its October 29 alert, the Cyber Centre said that while individual organizations or businesses in Canada may not be direct targets, they can become “victims of opportunity” for the hackers.

    The Cyber Centre offered suggestions on how to counter the attacks: “Unclear division of roles and responsibilities often creates gaps leaving critical systems unprotected. Effective communication and collaboration are essential to ensuring safety and security. Provincial and territorial governments are encouraged to coordinate with municipalities and organizations within their jurisdictions to ensure all services are properly inventoried, documented, and protected.”

    The alert said this was most important in sectors where government regulations do not cover cybersecurity, such as water, food and manufacturing. “Organizations are advised to conduct a comprehensive inventory of all internet-accessible ICS devices and assess their necessity,” the alert said. “Where possible, alternative solutions — such as Virtual Private Networks (VPNs) with two-factor authentication — should be implemented to avoid direct exposure to the internet.”

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Related Posts

    Amalgam Eagle marks first with Canadian participation

    November 10, 2025

    ‘Defending North America remains our top priority,’ Canadian defense minister tells Hegseth

    October 15, 2025

    19 drug busts at sea include one big, record offload

    September 15, 2025
    Leave A Reply Cancel Reply

    V6. ENDURING PARTNERSHIPS
    V6. INSERT

    Subscribe and download the latest issue

    The Watch is provided FREE to military and security professionals.

    The Watch
    Facebook X (Twitter) Instagram Pinterest
    © 2025 The Watch.

    Type above and press Enter to search. Press Esc to cancel.