#OpC51 Anonymous hit systems at Canadian Government

Anonymous claimed responsibility for running DDoS attacks on Canadian government systems against the approval of anti-terror law C-51.

An ongoing cyber attack is targeting systems of the Canadian Government, including Government websites and email systems. The cyber attack started a few days after members of the Canadian parliament were warned of an impending attack.

The member of the parliament Tony Clement confirmed via Twitter that Government systems had been “cyberattacked.”


Clement confirmed that a denial-of-service attack hit the gc.ca domain server, which host many Canadian government websites, the attack also caused the paralysis of the e-mail accounts used by the government personnel.

“Industry, Employment, Natural Resources, Fisheries and Oceans, Justice, Labour, Foreign Affairs, Environment Canada and Transport Canada were inaccessible. “There’s only sporadic e-mails that are making their way through,” Mr. Clement said. However, within several hours, the attacks had subsided and government website and e-mails were functioning normally once again.” states The Globe and Mail

Canadian public safety minister Steven Blaney confirmed that no personal information was compromised by the cyber attack.

At the time I’m writing, members of the hacking collective Anonymous reportedly took credit for the cyberattack against the Canadian Government. The hacktivists published a video explaining that the attack is the response of the collective to the country’s recent passing of new anti-terror legislation (C51).

“The Anonymous online collective claimed responsibility for the attack — which shut down several federal sites and played havoc with email — as a protest against the recent passage of the federal anti-terrorism bill.” reported the website www.cp24.com.

It’s not the first time that government websites were targeted by hackers, last year a sophisticated APT group hackers into government networks and Chinese hackers were primary suspects.

An analogue situation occurred in 2010 when alleged Chinese hackers crippled computer systems at the Finance Department and Treasury Board to gather data on the potential takeover of a Canadian potash company.

Stay Tuned …

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 84

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

16 minutes ago

Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

48 minutes ago

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

21 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

22 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

This website uses cookies.