Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      10 Ways Node.js Development Boosts AI & Real-Time Data (2025-2026 Edition)

      August 18, 2025

      Looking to Outsource React.js Development? Here’s What Top Agencies Are Doing Right

      August 18, 2025

      Beyond The Hype: What AI Can Really Do For Product Design

      August 18, 2025

      BrowserStack launches Chrome extension that bundles 10+ manual web testing tools

      August 18, 2025

      How much RAM does your Linux PC really need in 2025?

      August 19, 2025

      Have solar at home? Supercharge that investment with this other crucial component

      August 19, 2025

      I replaced my MacBook charger with this compact wall unit – and wish I’d done it sooner

      August 19, 2025

      5 reasons to switch to an immutable Linux distro today – and which to try first

      August 19, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Sentry Adds Logs Support for Laravel Apps

      August 19, 2025
      Recent

      Sentry Adds Logs Support for Laravel Apps

      August 19, 2025

      Efficient Context Management with Laravel’s Remember Functions

      August 19, 2025

      Laravel Devtoolbox: Your Swiss Army Knife Artisan CLI

      August 19, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      From plateau predictions to buggy rollouts — Bill Gates’ GPT-5 skepticism looks strangely accurate

      August 18, 2025
      Recent

      From plateau predictions to buggy rollouts — Bill Gates’ GPT-5 skepticism looks strangely accurate

      August 18, 2025

      We gave OpenAI’s open-source AI a kid’s test — here’s what happened

      August 18, 2025

      With GTA 6, next-gen exclusives, and a console comeback on the horizon, Xbox risks sitting on the sidelines — here’s why

      August 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Cyberattack Hits Nova Scotia Power: Customer Data Compromised

    Cyberattack Hits Nova Scotia Power: Customer Data Compromised

    May 15, 2025

    Nova Scotia Power Data Breach

    Nova Scotia’s largest electric utility, Nova Scotia Power, has confirmed that customer information was stolen in a recent cyberattack that compromised parts of its IT systems. The company, along with its Halifax-based parent firm Emera, discovered the Nova Scotia Power data breach on April 25, 2025, prompting immediate action to isolate and secure the affected servers.

    In an official update shared on Wednesday, Nova Scotia Power revealed that the cyber incident had resulted in unauthorized access to sensitive customer information. According to their investigation, the Nova Scotia Power cyberattack occurred on or around March 19, 2025, nearly five weeks before it was detected.

    Nova Scotia Power Data Breach: Investigation and Response Underway

    Nova Scotia Power stated it is working closely with external cybersecurity experts to assess the extent of the data breach and to restore and rebuild impacted systems.

    “We are continuing to investigate the cyber incident that has affected certain IT systems in our network,” the company said in its public communication. “Our priority is to safely and securely restore operations while protecting customer information.”

    Though the investigation is still ongoing, Nova Scotia Power has confirmed that an unauthorized third party accessed and stole certain customer data from the affected servers. Physical operations—such as power generation, distribution, and transmission—were not impacted, and customers are still receiving uninterrupted electric service.

    Types of Data Compromised

    The stolen information varies by individual and is based on what each customer had previously provided to the company. The affected data may include:

    • Full name

    • Phone number

    • Email address

    • Mailing and service addresses

    • Participation in Nova Scotia Power programs

    • Date of birth

    • Customer account history (including power consumption, service requests, payment and billing records, credit history, and past customer support communication)

    • Driver’s license number

    • Social Insurance Number (SIN)

    • Bank account numbers (for those enrolled in pre-authorized payments)

    While there is currently no evidence that the stolen information has been misused, the company is urging customers to remain alert for potential fraud or scams that may follow.

    Support for Affected Customers

    To support impacted individuals, Nova Scotia Power is offering a free two-year subscription to TransUnion’s myTrueIdentity® credit monitoring service. Affected customers will receive notification letters by mail with details about what information was exposed and how to activate the complimentary monitoring service.

    “If you receive a letter from us, it will contain a dedicated phone number you can call to ask questions and enroll in the credit monitoring service,” the company said in its announcement. This service is intended to help individuals detect any suspicious activity tied to their identity or financial information.

    Increase in Fraud Attempts

    Since the incident, Nova Scotia Power has noticed a surge in fraudulent messages and phishing attempts that appear to come from the utility company. These include fake emails, text messages, social media posts, and websites impersonating Nova Scotia Power.

    On its official website and social media, the company has issued a clear warning:

    “Due to the recent cyber incident, there has been an increase in fraudulent communications posing as Nova Scotia Power. Please remain cautious of any unsolicited messages asking for your personal information. Do not click on links or download attachments from unverified sources.”

    The company advises customers to confirm any suspicious communication by contacting their Customer Care Centre directly through verified contact details listed on their official website.

    Nova Scotia Power Data Breach
    Source: Nova Scotia Power Official Website

    Social Media Update

    Nova Scotia Power also used its official X (formerly Twitter) account to share updates. A thread posted on Wednesday reiterated the company’s apology and reassured customers that every effort is being made to protect their privacy.

    “We sincerely apologize that this has occurred. Protecting the privacy and security of the information we hold is of the utmost importance to every member of our team,” the company stated. “Starting today, notifications will be sent to impacted individuals via mail. While we have no evidence of misuse of personal information, we have arranged for a two-year subscription to TransUnion’s myTrueIdentity® credit monitoring service at no cost.”

    Nova Scotia Power Data Breach
    Source: X

    As part of its ongoing efforts, Nova Scotia Power’s IT team is working around the clock with external cybersecurity specialists to rebuild affected systems, improve security measures, and prevent future incidents.

    The utility emphasized that safeguarding customer data remains a top priority. It encourages customers to practice good cyber hygiene by:

    • Verifying the source of any unexpected communication

    • Not sharing personal information over phone, text, or email unless certain of the recipient’s identity

    • Monitoring financial accounts for unusual activity

    • Activating the provided credit monitoring service if notified

    What You Should Do

    If you are a Nova Scotia Power customer and suspect your information may be involved:

    • Watch for a mailed letter from the company with detailed instructions.

    • Enroll in the free two-year credit monitoring service offered through TransUnion.

    • Report any suspicious communications claiming to be from Nova Scotia Power.

    • Contact Nova Scotia Power’s Customer Care Centre if you are unsure about the authenticity of a message.

    While physical infrastructure was unaffected in Nova Scotia Power cyberattack, the exposure of personal customer data reveals how critical IT security has become in the utility sector.

    As investigations continue, this cyberattack on Nova Scotia Power highlights the urgent need for stronger data protection practices, real-time dark web monitoring, and faster breach detection.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleJapan to Double Cybersecurity Talent Pool by 2030 with Strategic Reforms
    Next Article Smashing Security podcast #417: Hello, Pervert! – Sextortion scams and Discord disasters

    Related Posts

    Development

    Sentry Adds Logs Support for Laravel Apps

    August 19, 2025
    Development

    Efficient Context Management with Laravel’s Remember Functions

    August 19, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-6216 – Allegra Password Recovery Authentication Bypass Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-8751 – Protected Total WebShield Extension Chrome Cross-Site Scripting Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    qt-fsarchiver – backup and restore partitions

    Linux

    CVE-2025-26211 – Gibbon CSRF Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    What to do when users just want the old version back

    July 15, 2025

    Post Content Source: Read More 

    Norma Kamali is transforming the future of fashion with AI

    April 22, 2025

    CVE-2025-1993 – IBM App Connect Enterprise Certified Container Cryptographic Weakness

    May 9, 2025

    CVE-2025-6447 – “Simple Online Hotel Reservation System SQL Injection Vulnerability”

    June 22, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.