Cyber Security News

Canadian Cyber Centre Warns Of Chinese Hackers Scanning IT Systems

The Canadian Centre for Cyber Security has warned that a sophisticated Chinese state-sponsored cyber threat actor has been actively scanning Canadian cyber defenses throughout 2024, targeting critical institutions and infrastructure.

The reconnaissance scanning has targeted multiple sectors, including government departments, federal political parties, the House of Commons and Senate, critical infrastructure, defense organizations, media outlets, and think tanks.

While these scans do not necessarily indicate a breach, they often precede malicious cyber activities.

The Cyber Centre describes these scans as equivalent to someone examining a building’s security measures, checking for vulnerabilities in its defenses.

This activity is part of a broader pattern of Chinese cyber operations that surpass other nation-state threats in volume, sophistication, and targeting scope.

Strategies to Defend Websites & APIs from Malware Attack -> Free Webinar

The warning comes amid heightened concerns about Chinese interference in Canadian affairs. The country has been conducting a high-profile public inquiry into foreign interference in recent elections.

Chinese cyber threat actors frequently operate under the directives of PRC intelligence services, seeking information that aligns with Beijing’s national policy objectives.

The Cyber Centre has noted that while the direct threat to Canadian infrastructure may be lower than to U.S. targets, Canada would likely be affected by any disruption to U.S. systems due to the interconnected nature of their infrastructure.

Defensive Measures

The Cyber Centre advises organizations to:

  • Be prepared to isolate critical infrastructure components from the internet
  • Implement enhanced network monitoring.
  • Deploy multi-factor authentication
  • Create and test offline backups
  • Maintain updated incident response plans

These defensive measures are particularly crucial for provincial, territorial, and municipal governments and critical infrastructure operators who may be vulnerable to these sophisticated cyber threats.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

GOLD SALEM Compromise Networks and Bypass Security Solutions to Deploy Warlock Ransomware

The cyberthreat landscape has witnessed the emergence of another sophisticated ransomware operation as GOLD SALEM,…

14 minutes ago

Russian Fake-News Network CopyCop Added 200+ New Websites to Targets US, Canada and France

The Russian covert influence network CopyCop has significantly expanded its disinformation campaign, establishing over 200…

56 minutes ago

How to Radically Cut Response Time for Each Security Incident

When an incident happens, there’s no time to waste.  SOC teams must react fast to…

2 hours ago

Cloudflare API Outage Linked to React useEffect Bug Causes Service Overload and Recovery Failure

Cloudflare has published a detailed post-mortem explaining the significant outage on September 12, 2025, that…

4 hours ago

0-Click ChatGPT Agent Vulnerability Allows Sensitive Data Exfiltration from Gmail

A zero-click vulnerability discovered in ChatGPT's Deep Research agent allowed attackers to exfiltrate sensitive data…

6 hours ago

Top 10 Best Model Context Protocol (MCP) Servers in 2025

In 2025, the Model Context Protocol (MCP) revolutionizes AI agent integration, making it seamless for…

7 hours ago