4 septembre 2020 | Local, C4ISR, Sécurité

Royal Military College staff, students won't know until mid-September if personal info compromised in cyber attack

David Pugliese

Students and staff at the Royal Military College won't know until mid-September whether their personal information has been compromised, more than two months after a cyber attack forced the shutdown of the organization's computers.

An extensive review of information contained on the college's computer-based academic network is underway, according to the Department of National Defence.

That network is used for general administration, student communications and research.

“Initial indications are the extent of the compromise appears limited primarily to non-classified administrative information and correspondence,” DND spokeswoman Christina Kasper said in an email. “When the review is complete, a general statement based on findings will be shared with all network users regarding the extent of the compromise.”

The cyber attack took place July 3.

“If, during the course of the assessment, it is determined any personally identifiable information was compromised, individual network users who were found to be at risk will be immediately and directly contacted by the chain of command,” Kasper added.

She noted that the office of the Privacy Commissioner was notified about the incident at the college in Kingston, Ont.

RMC professors have been told not to access or retrieve their files on college computers, even with a USB stick. Staff and students have also been trying since July 3 to find out if their personal data has been compromised.

But an email summary of an Aug. 25 town hall that took place to discuss the computer attack acknowledged very little information is being provided by the college.

“Very few specific concerns were addressed in the town hall other than the presentation of the computer network issues that transpired and the way ahead for re-implementation of the RMC network,” the email to staff noted. “Personal data loss was mentioned as a possibility that had been brought up in the media. There is currently an ongoing investigation with the goal to determine define what may have transpired and to inform any that may be affected. No other details were provided.”

Global News reported Aug. 18 that what appears to be data from the Royal Military College was leaked on the dark web. Many of the files appear to include student progress reports, acceptance letters, as well as a myriad of financial documents like tax receipts and budgets for various departments, Global News noted.

DND has not confirmed whether the information on the dark web came from the college's computers.

The college's academic computer system is separate from the operational computers used by DND and the Canadian Forces and corporate networks were not affected by the attack.

“All early indications suggest this incident resulted from a mass phishing campaign,” said DND spokeswoman Jessica Lamirande. “This incident has not affected any classified systems or classified research at the Royal Military College.”

The RCMP's National Cyber Crimes unit is investigating.

Lamirande said the Royal Military College expects its fall academic term to begin as scheduled on Sept. 8.

https://ottawacitizen.com/news/national/defence-watch/royal-military-college-staff-students-wont-know-until-mid-september-if-personal-info-compromised-in-cyber-attack/wcm/78796df3-0eb7-42a2-a057-e148b63c65ec/

Sur le même sujet

  • Cybersécurité dans l'espace : investissement du gouvernement du Canada dans la technologie quantique

    17 juin 2019 | Local, Aérospatial, Sécurité, Autre défense

    Cybersécurité dans l'espace : investissement du gouvernement du Canada dans la technologie quantique

    Agence spatiale canadienne LONGUEUIL, QC, le 14 juin 2019 /CNW Telbec/ - Pour protéger l'économie numérique du Canada, il faut empêcher les pirates informatiques d'avoir accès aux données. La cybersécurité est une priorité du gouvernement du Canada. La mission satellitaire canadienne QEYSSat (pour Quantum Encryption and Science Satellite) aura recours à la technologie quantique pour protéger les télécommunications dans l'espace. L'Agence spatiale canadienne accorde un contrat de 30 millions de dollars à l'entreprise Honeywell pour la conception et toutes les étapes de la réalisation de la mission QEYSSat. Les méthodes de chiffrement actuelles devraient être dépassées d'ici une dizaine d'années à cause de la puissance de traitement exceptionnelle des ordinateurs quantiques. QEYSSat, dont le lancement est prévu pour 2022, fera la démonstration de la technologie de distribution quantique de clés (DQC) par satellite. Cette technologie de chiffrement en émergence offrira au Canadaune méthode encore plus efficace de sécuriser la transmission d'informations. Dans le cadre du contrat, l'entreprise Honeywell sera chargée des activités suivantes liées à QEYSSat : construction, tests, livraison, formation des opérateurs et mise en service. Le satellite servira de lien dans l'espace pour transmettre des clés de chiffrement entre les stations terrestres. Le travail de l'entreprise devrait se poursuivre jusqu'à la fin de 2022. La mission QEYSSat est le point culminant d'une série d'activités de recherche et de développement technologique réalisées par l'Institut d'informatique quantique avec le soutien du gouvernement du Canada. Gr'ce à QEYSSat, le Canada sera de plus en plus près de disposer d'un service de télécommunications quantique opérationnel dans l'espace et d'une technologie de pointe pour l'aider à respecter ses priorités en matière de cybersécurité. Les leçons tirées de la mission QEYSSat serviront au développement de futurs systèmes opérationnels pour le gouvernement qui assureront aux Canadiens un accès très sûr aux services. La sécurité renforcée autour des activités en ligne et des transactions financières de tous les jours, comme au guichet automatique bancaire, figure parmi les applications commerciales visées. En plus de respecter le principe de la sécurité de la Charte canadienne du numérique, cette mission s'inscrit dans le Plan pour l'innovation et les compétences et la nouvelle Stratégie spatiale pour le Canada du gouvernement du Canada puisqu'elle permettra de sécuriser les futures télécommunications et de renforcer la sécurité et la souveraineté nationales. Citation « La mission QEYSSat constitue une autre étape du plan de notre gouvernement de veiller à ce qu'au Canada, les citoyens soient sûrs que leurs données et leurs renseignements personnels sont protégés. Le développement de ces nouvelles technologies offrira aussi un grand potentiel de transformation des marchés et permettra d'établir une économie solide qui profitera à tous. » L'honorable Navdeep Bains, ministre de l'Innovation, des Sciences et du Développement économique En bref Les ordinateurs quantiques seront plusieurs millions de fois plus rapides que les ordinateurs actuels. Ils pourront donc déchiffrer rapidement les mots de passe, les numéros d'identification personnels et les autres mesures de protection actuelles, ce qui accroit la vulnérabilité des renseignements confidentiels et personnels. La technologie actuelle de distribution quantique de clés (DQC) nécessite des c'bles à fibres optiques au sol, où une clé ne peut être distribuée plus loin que 200 kilomètres. QEYSSat vise à démontrer la DQC entre un satellite et un réseau de stations terrestres, ce qui permettrait de surmonter cette limite de distance. En testant et en faisant la démonstration de la DQC dans l'espace, l'Agence spatiale canadienne veut fournir une plateforme spatiale gouvernementale aux intervenants fédéraux et au milieu scientifique canadien. Le budget de 2017 prévoit 80,9 millions de dollars pour l'Agence spatiale canadienne afin de soutenir la réalisation de nouveaux projets et l'utilisation d'innovations canadiennes dans l'espace, comme la mission QEYSSat de chiffrement et de science quantiques. La mission appuiera les capacités émergentes du Canada dans le domaine de la distribution quantique de clés, qui pourrait assurer la sécurité des télécommunications à l'aide de codes de chiffrement impossibles à pirater. La valeur du contrat (30 millions de dollars) ne comprend pas les taxes. https://www.newswire.ca/fr/news-releases/cybersecurite-dans-l-espace-investissement-du-gouvernement-du-canada-dans-la-technologie-quantique-884578930.html

  • Online 'phishing' attacks expected to target housebound staffers as COVID-19 spreads

    17 mars 2020 | Local, C4ISR, Sécurité

    Online 'phishing' attacks expected to target housebound staffers as COVID-19 spreads

    It's a 'huge opportunity' for online crime, one expert warns The number of "phishing" attacks meant to steal the online credentials of public servants and corporate sector employees now housebound due to the COVID-19 pandemic is on the rise, one cyber security expert warns. Many attempts are being made against employees who are working from home on virtual private works (VPNs). Cyber experts are still gathering data to establish a direct correlation between the pandemic crisis and the increase in malicious activity. But Rafal Rohozinski, chief executive officer of the SecDev Group of Companies, said this pandemic moment — when large numbers of employees are at home and receiving instructions from their workplaces on how to connect to internal networks — offers online thieves a "huge opportunity." Federal government and corporate sector systems were never designed to support a sudden, mass migration of employees from offices to their homes, he said. "The opening that creates for those who want to wreak havoc through ransomware and malware is really, really significant," said Rohozinski. "And I don't think we're anywhere near prepared for that. "What we're seeing is an increase in phishing being used as a means to get people's credentials." U.S. Health Department attacked The U.S. Health and Human Services Department's website was hit by a cyber attack over several hours on Sunday, an incident which involved overloading its servers with millions of hits. Officials said the system was not penetrated, although media reports in Washington described it as an attempt to undermine the U.S. government's response to the coronavirus pandemic — and may have been the work of a foreign actor. Rohozinski said that while the facts are not all in yet, his "professional guess" is that there's a link between the attack and the COVID-19 crisis. Last week, Canada's top military commander warned that he'd seen recent indications the country's adversaries intend to exploit the uncertainty, confusion and fear generated by the pandemic. Send in the trolls: Canada braces for an online disinformation assault on COVID-19 Gen. Jonathan Vance, chief of the defence staff, was not specific about the potential threats — but experts say they could range from hacking to online disinformation campaigns aimed at discrediting the federal government's response. Rohozinski said he's concerned about the federal government's technical capacity to support thousands of employees on private networks. "Everybody's moving on to VPNs. Everybody," he said. "This is an enormous pinpoint and an enormous vulnerability." Federal Digital Government Minister Joyce Murray's office was asked for a response Monday, but was unable to provide an immediate comment. Many of the country's leading information technology companies are part of the Canadian Cyber Threat Exchange (CCTE), a nonprofit centre where companies can swap information and insights. A CCTE spokeswoman said the corporate sector is better prepared to face the challenges posed by the mass movement of employees to home networks. Canada to bar entry to travellers who are not citizens, permanent residents or Americans Canadian military bans international travel in response to COVID-19 Still, there is reason for concern. "Given we are moving people to work from home now, companies need to ensure that the work from home environment is as safe as the corporate environment and that people are trained to notice these phishing campaigns, just like they were in the corporate environment," said Mary Jane Couldridge, director of business development at the CCTE. "It's a matter of keeping our community aware of what is impacting Canada daily so we know how to react to it and prevent it from spreading — and not chase rainbows." Most corporations have plans they'll activate now to cover the wholesale movement of employees to networks outside of the office, she added. https://www.cbc.ca/news/politics/online-hacking-phishing-covid-19-coronavirus-1.5499725

  • Canada Army Run racers are preparing to run through the streets of Ottawa

    14 septembre 2023 | Local, Terrestre

    Canada Army Run racers are preparing to run through the streets of Ottawa

    Following the success of Canada Army Run 2022, which saw the return of the in-person challenges, racers are once again gearing up to conquer the streets of Ottawa in support of the Canadian Armed Forces (CAF) during the highly-anticipated 2023 edition of Canada Army Run, presented by BMO, which is scheduled for this Sunday, September 17th.

Toutes les nouvelles