Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm

Posted on October 30, 2025October 30, 2025 By CWS

The Canadian Centre for Cyber Safety has warned CISOs and different decision-makers that hacktivists are more and more concentrating on internet-exposed industrial management methods (ICS).

The federal government cybersecurity company has supplied a number of examples of current assaults reported to authorities. In a single incident, hackers focused a water facility and tampered with water stress valves, which resulted in degraded service for the group served by the compromised facility.

In one other incident, hackers triggered false alarms at a Canadian oil and gasoline firm by tampering with an automatic tank gauge (ATG). ATGs are sometimes suffering from extreme vulnerabilities they usually have been focused by hackers for at the least a decade. 

The third instance shared by the Canadian Centre for Cyber Safety describes an assault on a farm, with attackers manipulating temperature and humidity parameters in a grain-drying silo. The company famous that the hackers’ actions might have resulted in unsafe situations had they not been caught on time. 

Learn: The Y2K38 Bug Is a Vulnerability, Not Only a Date Downside

The cybersecurity company mentioned hacktivists typically goal internet-accessible and poorly secured ICS units in an effort to achieve media consideration, discredit organizations, and to “undermine Canada’s repute”. These kinds of hackers typically launch opportunistic assaults fairly than concentrating on particular organizations. 

There are at the least 100,000 internet-exposed ICS units world wide and they’re in lots of circumstances straightforward to hack.

Whereas the Canadian Centre for Cyber Safety alert describes the menace actors as hacktivists — such hackers have typically focused ICS — it’s value noting that it’s not unusual for state-sponsored menace teams to launch assaults beneath the guise of hacktivism.Commercial. Scroll to proceed studying.

Based on the company, the sorts of ICS units focused by hackers can embody security methods, constructing administration methods, industrial IoT units, programmable logic controllers, human-machine interfaces, distant terminal models, and supervisory management and knowledge acquisition methods. 

The Canadian Centre for Cyber Safety’s alert provides some high-level suggestions for securing ICS, and offers hyperlinks to extra detailed assets. 

The company has additionally suggested victims of such assaults to report incidents to each the company and police.

Associated: Industrial Giants Schneider Electrical and Emerson Named as Victims of Oracle Hack

Associated: As much as 25% of Web-Uncovered ICS Are Honeypots

Associated: CISA Warns of Exploited DELMIA Manufacturing unit Software program Vulnerabilities

Security Week News Tags:Canada, Facility, Firm, Gas, Hackers, ICS, Oil, Tampered, Water

Post navigation

Previous Post: 136 NPM Packages Delivering Infostealers Downloaded 100,000 Times
Next Post: BAS Is the Power Behind Real Defense

Related Posts

CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine Security Week News
Massive China-Linked Smishing Campaign Leveraged 194,000 Domains Security Week News
Automotive Titan Stellantis Discloses Data Breach Security Week News
Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks Security Week News
Hackers Steal Sensitive Data From Auction House Sotheby’s Security Week News
Recent SAP S/4HANA Vulnerability Exploited in Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Spektrum Labs Emerges From Stealth to Help Companies Prove Resilience
  • Multiple Jenkins Vulnerability SAML Authentication Bypass And MCP Server Plugin Permissions
  • Reflectiz Raises $22 Million for Website Security Solution
  • Aembit Introduces Identity and Access Management for Agentic AI
  • Millions Impacted by Conduent Data Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Spektrum Labs Emerges From Stealth to Help Companies Prove Resilience
  • Multiple Jenkins Vulnerability SAML Authentication Bypass And MCP Server Plugin Permissions
  • Reflectiz Raises $22 Million for Website Security Solution
  • Aembit Introduces Identity and Access Management for Agentic AI
  • Millions Impacted by Conduent Data Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News