Malware

Ransomware attack impacted government services in the territory of Nunavut, Canada

A ransomware attack disrupted IT operations in the territory of Nunavut (Canada), all government services requiring access to electronic data were impacted.

A ransomware attack disrupted IT operations in the remote Canadian territory of Nunavut, all government services requiring access to electronic information were impacted. The territory is extended over more than 1.9 million square kilometers and has a population of around 36,000 people.

IT provincial government described the ransomware as a new threat and the infection as a sophisticated attack.

“On Saturday, November 2, 2019, a new and sophisticated type of ransomware affected the GN, across the territory. The ransomware encrypted individual files on various servers and workstations.” reads the alert published by the local government. “As a result, all government services requiring access to electronic information stored on the GN network are impacted, except Qulliq Energy Corporation.”

During the weekend employees were not able to access their government accounts.

“I want to assure Nunavummiut that we are working non-stop to resolve this issue,” said Premier Joe Savikataaq. “Essential services will not be impacted and the GN will continue to operate while we work through this issue. There will likely be some delays as we get back online, and I thank everyone for their patience and understanding.”

The CBC shared a copy of a ransom note that appears to be associated with the DoppelPaymer ransomware, a fork of BitPaymer Ransomware, that appeared in the threat landscape in July 2016.

“Your network has been penetrated,” reads the ransom note shared by CBC. “All files have been encrypted with a strong algorithm.”

“We exclusively have decryption software for your situation.”

The ransom note request victims to download an encrypted browser and visit a specified URL within 21 days, experts noticed that the note is written in broken English.

“After that period if you not get in contact link and the key for your data would be erased completely,”

Ransomware attacks continue to threaten organizations worldwide, just yesterday Everis firm and Spanish media company Cadena SER announced to have suffered a ransomware attack.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – Xhelper, malware)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

20 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

21 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.