advertisement

state or state-sponsored actor was behind b.c. government cyber attack

the head of b.c.'s public service would not say if the hack is linked to the security breach of microsoft's systems which was carried out by russian state-backed hackers

the sophisticated cybersecurity attack against the b.c. government was carried out by a state or state-sponsored actor, the head of b.c.’s public service said friday.
it also came to light that the government had known about the breach for almost a month before making it public.
shannon salter, speaking to media during a technical briefing friday, would not say if the hack is linked to last month’s security breach of microsoft’s systems, which was blamed on russian state-backed hackers and led to the leak of email correspondence between u.s. government agencies.
public safety minister mike farnworth reiterated there’s no evidence sensitive personal information has been compromised in the b.c. attack. however, despite repeated questions, farnworth did not specify what information the hackers were able to access or what indicators pointed to a state-sponsored attack.

the b.c. government first became aware of a potential cyber attack on april 10 . online security experts began to investigate and confirmed on april 11 that a cyber attack was carried out.

the hack was reported to the canadian centre for cyber security, a federal agency. the province also enlisted the help of microsoft.

advertisement

advertisement

the centre determined that, because of the sophistication of the hack, it must have been carried out by state or state-sponsored actors.
premier david eby was briefed about the cyber attack on april 17.
on april 29, online security experts found evidence of another hacking attempt by the same “threat actor,” salter said.
that’s the day provincial employees were advised to immediately change their passwords and make them 14 characters long. b.c.’s office of the chief information officer at the time described that as part of the governments’ efforts to “routinely” update security measures.
the cyber attack was not made public until wednesday an hour before puck drop for the canucks playoff game — which led to accusations from b.c. united mlas that the government was trying to conceal the attack.
salter said the cybersecurity centre’s advice was not to make the hack public to avoid tipping off other hackers to a vulnerability in government networks. salter said there were three separate cybersecurity incidents, all of which included efforts by the hackers to cover their tracks.
salter said after the b.c. ndp cabinet was briefed on may 8 it was determined the public could be notified.

advertisement

advertisement

eric li, an associate professor at the university of british columbia, okanagan, who specializes in cybersecurity, questioned why it took more than two weeks for the government to ask public servants to change their passwords.
“i think there will be some learning from the b.c. government that they can do a better job in communicating that information to the general public,” he said.
li said the prevalence of public servants working from home since the pandemic means some might be connecting to lower-security home wi-fi systems. government employees who work remotely are typically required to log onto higher-security vpn servers, li said, but it can be hard to monitor whether that’s actually happening.
farnworth said the government’s technical security systems are “designed to be able to deal with people who are working remotely.”
salter said security experts had to analyze 40 terabytes of data to determine the extent of the attack. she would not say if any of that data was compromised, adding that’s part of the ongoing investigation.
it’s also unclear if the hackers targeted a certain area of government records such as health data, auto insurance or social services.
the province holds the personal data of millions of british columbians including social insurance numbers, addresses and phone numbers.

government officials say it’s still unclear what the motivation was behind the cyber attack . there was no ransom demand.

advertisement

advertisement

last month, microsoft notified several u.s. federal agencies that russian-backed hackers may have stolen emails that the company sent to those agencies and that the information includes sensitive information such as usernames and passwords.
neither salter nor farnworth would not say if russian-backed hackers are linked to the b.c. security breach.
farnworth said the government employs 76 cybersecurity experts in the b.c. office of the chief information officer and spends $25 million a year on cybersecurity.

bookmark our website and support our journalism: don’t miss the news you need to know — add vancouversun.com and theprovince.com to your bookmarks and sign up for our newsletters here.

you can also support our journalism by becoming a digital subscriber: for just $14 a month, you can get unlimited access to the vancouver sun, the province, national post and 13 other canadian news sites. support us by subscribing today: the vancouver sun | the province.

comments

postmedia is committed to maintaining a lively but civil forum for discussion and encourage all readers to share their views on our articles. comments may take up to an hour for moderation before appearing on the site. we ask you to keep your comments relevant and respectful. we have enabled email notifications—you will now receive an email if you receive a reply to your comment, there is an update to a comment thread you follow or if a user you follow comments. visit our community guidelines for more information and details on how to adjust your email settings.