Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm

Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm

Posted on October 30, 2025October 30, 2025 By CWS

The Canadian Centre for Cyber Safety has warned CISOs and different decision-makers that hacktivists are more and more concentrating on internet-exposed industrial management methods (ICS).

The federal government cybersecurity company has supplied a number of examples of current assaults reported to authorities. In a single incident, hackers focused a water facility and tampered with water stress valves, which resulted in degraded service for the group served by the compromised facility.

In one other incident, hackers triggered false alarms at a Canadian oil and gasoline firm by tampering with an automatic tank gauge (ATG). ATGs are sometimes suffering from extreme vulnerabilities they usually have been focused by hackers for at the least a decade. 

The third instance shared by the Canadian Centre for Cyber Safety describes an assault on a farm, with attackers manipulating temperature and humidity parameters in a grain-drying silo. The company famous that the hackers’ actions might have resulted in unsafe situations had they not been caught on time. 

Learn: The Y2K38 Bug Is a Vulnerability, Not Only a Date Downside

The cybersecurity company mentioned hacktivists typically goal internet-accessible and poorly secured ICS units in an effort to achieve media consideration, discredit organizations, and to “undermine Canada’s repute”. These kinds of hackers typically launch opportunistic assaults fairly than concentrating on particular organizations. 

There are at the least 100,000 internet-exposed ICS units world wide and they’re in lots of circumstances straightforward to hack.

Whereas the Canadian Centre for Cyber Safety alert describes the menace actors as hacktivists — such hackers have typically focused ICS — it’s value noting that it’s not unusual for state-sponsored menace teams to launch assaults beneath the guise of hacktivism.Commercial. Scroll to proceed studying.

Based on the company, the sorts of ICS units focused by hackers can embody security methods, constructing administration methods, industrial IoT units, programmable logic controllers, human-machine interfaces, distant terminal models, and supervisory management and knowledge acquisition methods. 

The Canadian Centre for Cyber Safety’s alert provides some high-level suggestions for securing ICS, and offers hyperlinks to extra detailed assets. 

The company has additionally suggested victims of such assaults to report incidents to each the company and police.

Associated: Industrial Giants Schneider Electrical and Emerson Named as Victims of Oracle Hack

Associated: As much as 25% of Web-Uncovered ICS Are Honeypots

Associated: CISA Warns of Exploited DELMIA Manufacturing unit Software program Vulnerabilities

Security Week News Tags:Canada, Facility, Firm, Gas, Hackers, ICS, Oil, Tampered, Water

Post navigation

Previous Post: 136 NPM Packages Delivering Infostealers Downloaded 100,000 Times
Next Post: BAS Is the Power Behind Real Defense

Related Posts

Whole Foods Distributor United Natural Foods Hit by Cyberattack Whole Foods Distributor United Natural Foods Hit by Cyberattack Security Week News
Honoring Our Veteran Readers: Thank You for Your Service Honoring Our Veteran Readers: Thank You for Your Service Security Week News
Over 73,000 WatchGuard Firebox Devices Impacted by Recent Critical Flaw Over 73,000 WatchGuard Firebox Devices Impacted by Recent Critical Flaw Security Week News
Microsoft Bug Bounty Program Expanded to Third-Party Code Microsoft Bug Bounty Program Expanded to Third-Party Code Security Week News
5 Plead Guilty in US to Helping North Korean IT Workers 5 Plead Guilty in US to Helping North Korean IT Workers Security Week News
What Can Businesses Do About Ethical Dilemmas Posed by AI? What Can Businesses Do About Ethical Dilemmas Posed by AI? Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News