Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 19, 2025

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 19, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 19, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 19, 2025

      My latest hands-on could be the best value AI laptop of the summer, but I still have questions

      May 19, 2025

      DOOM: The Dark Ages had the lowest Steam launch numbers in series history — Is it suffering from the ‘Game Pass Effect’?

      May 19, 2025

      Microsoft won’t be left exposed if something “catastrophic” happens to OpenAI — but may still be 3 to 6 months behind ChatGPT

      May 19, 2025

      Microsoft Copilot gets OpenAI’s GPT-4o image generation support — but maybe a day late and a dollar short for the hype?

      May 19, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      ES6: Set Vs Array- What and When?

      May 19, 2025
      Recent

      ES6: Set Vs Array- What and When?

      May 19, 2025

      Transform JSON into Typed Collections with Laravel’s AsCollection::of()

      May 19, 2025

      Deployer

      May 19, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      My latest hands-on could be the best value AI laptop of the summer, but I still have questions

      May 19, 2025
      Recent

      My latest hands-on could be the best value AI laptop of the summer, but I still have questions

      May 19, 2025

      DOOM: The Dark Ages had the lowest Steam launch numbers in series history — Is it suffering from the ‘Game Pass Effect’?

      May 19, 2025

      Microsoft won’t be left exposed if something “catastrophic” happens to OpenAI — but may still be 3 to 6 months behind ChatGPT

      May 19, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»State-Sponsored Hackers Likely Accessed Employee Emails in British Columbia Government Network Cyberattack

    State-Sponsored Hackers Likely Accessed Employee Emails in British Columbia Government Network Cyberattack

    June 4, 2024

    A recent series of cyberattacks observed on the British Columbia government networks from state hackers may have compromised the personal information of its employees, authorities said.

    Shannon Salter, head of the B.C. Public Service, on Monday, provided an update on a recent cyber investigation. She disclosed that hackers, who attacked government networks in April “may have” accessed 22 email inboxes of provincial employees. Among these, a few inboxes contained sensitive personal information on 19 individuals, primarily consisting of employee personnel files.

    Salter confirmed that individuals potentially impacted by the breach have been notified. As a precaution, they will be offered credit monitoring and identity protection services. Despite the potential access, there has been no identified misuse of the information or evidence indicating that specific files were accessed by the threat actor.

    The investigation so far has not found hackers accessing any sensitive information collected by the government in the delivery of public services. Additionally, officials clarified that the cyberattack was not a ransomware attack and appears to have been carried out by a state or state-sponsored actor.

    Public Safety Minister Mike Farnworth reiterated Salter’s comments and told reporters in a press briefing:
    “At this time, we have no indication that the general public’s information was accessed.”

    Farnworth did not reveal which ministry employees’ emails were accessed by the hackers but said no cabinet members were affected as “these were [only] employee files.”

    British Columbia Cyberattacks Timeline

    Initial Detection and Investigation

    – April 10: The B.C. government detected potential cyberattack.
    – April 11: Government security experts confirmed the cyberattack after initiating an investigation.

    Federal Involvement and Expert Consultation

    – The incident was reported to the Canadian Centre for Cyber Security, which then engaged Microsoft’s Diagnostics and Recovery Toolset (DaRT) due to the attack’s sophistication.
    – April 17: Premier David Eby was briefed on the cyberattack.

    Continued Threat and Security Measures

    – April 29: Evidence of another hacking attempt by the same “threat actor” was discovered.
    – Same day, provincial employees were instructed to immediately change their passwords to 14 characters. The Office of the Chief Information Officer (OCIO) described this as part of routine security updates, though it was likely linked to the cyberattack.

    Third Attempt and Final Disclosure

    – May 6: Another cyberattack was identified, with the same threat actor responsible for all three incidents.

    – May 8: After briefing the B.C. NDP cabinet on May 8, the cybersecurity centre concurred that the public could be notified, leading to the eventual public announcement of the cyberattacks.

    The cyberattacks were not disclosed to the public until late evening on May 8, and was eventually announced during an ice hockey game, leading to accusations from B.C. United MLAs that the government was trying to conceal the attack.

    Opposition MLA Todd Stone questioned the delay in public disclosure, asking, “How much sensitive personal information was compromised, and why did the premier wait eight days to issue a discreet statement during a Canucks game to disclose this very serious breach to British Columbians?”

    Salter explained, at the time, that the cybersecurity centre advised against immediate public disclosure to prevent other hackers from exploiting vulnerabilities in government networks.

    Throughout these incidents, the government emphasized that the ongoing nature of the investigation required careful management of information to ensure system security and prevent further exploits.

    Is Beijing Involved?

    Although the sophistication of this hacking campaign made clear that it is likely a work of a state or state-sponsored hackers, authorities have remained tight-lipped and not attributed these cyberattacks to any particular country.

    The latest updates in the B.C. cyberattack, however, came on the same day that the Canadian Centre for Cyber Security warned of China’s increased targeting of Canadian citizens and its organizations through the scale and scope of its cyber operations.

    The Cyber Centre said China’s cyber operations surpass other nation-state cyber threats in terms of volume, sophistication, and breadth of targeting. China’s cyber threat actors have targeted a wide range of sectors in Canada, including all levels of government, critical infrastructure, and the Canadian research and development sector.

    The Cyber Centre said the government networks have been compromised multiple times by Chinese actors, who still frequently attempt reconnaissance against these networks. Government entities at all levels, including federal, provincial, territorial, municipal, and indigenous are the prime targets of Chinese actors, and thus, should be aware of the espionage risk.

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleTech in Asia Hit by Alleged Data Breach, Puts Identity of 230,000 Users at Risk
    Next Article DarkGate Malware Replaces AutoIt with AutoHotkey in Latest Cyber Attacks

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 19, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-48259 – Juan Carlos WP Mapa Politico España CSRF

    May 19, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Cloud Efficiency at Netflix

    Development

    Future-Proofing the Workforce: How Skilling is Cultivating Next-gen Tech Talent

    Development

    Open Secure-K OS – Debian-based live operating system

    Linux

    Your iPhone’s next iOS 18.2 update may come earlier than usual – with these AI features

    Development

    Highlights

    Artificial Intelligence

    AI model performance: Is it reasoning or simply reciting?

    July 14, 2024

    When ChatGPT gives you the right answer to your prompt, does it reason through the…

    Anthropic CEO envisions AI hitting an “I quit” button for unpleasant requests — Copilot says all requests have their charm

    March 24, 2025

    This AI Paper Introduces ‘Shortest Majority Vote’: An Improved Parallel Scaling Method for Enhancing Test-Time Performance in Large Language Models

    February 21, 2025

    MedGraphRAG: An AI Framework for Improving the Performance of LLMs in the Medical Field through Graph Retrieval Augmented Generation (RAG)

    August 12, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.