Canada’s cybersecurity agency is warning regional and local governments about cyber espionage by the Chinese regime, citing repeated and ongoing attempts to infiltrate all levels of government to access sensitive information on decision-making, regional affairs, and Canadians’ personal data.
“We have observed repeated targeting of all levels of government, as well as multiple compromises of government networks,” said the Cyber Centre, noting that federal agencies and departments have been compromised by PRC cyber threat actors “more than 20 times over the past few years.”
“PRC actors are well resourced, persistent, and capable of sustaining multiple concurrent operations in Canada,” the agency added, reinforcing earlier warnings that PRC cyber threat activity surpasses that of other nation-states in volume, sophistication, and targeting breadth.
Objectives and Methods of PRC Cyber Espionage
The PRC’s cyber activity targets often reflect national policy objectives. With its infiltration of Canadian networks, the Chinese communist regime seeks to gain economic or diplomatic advantage in its bilateral relationship with Canada, the Cyber Centre said.Gathering information related to technologies “prioritized in the PRC’s central planning” is another cyber espionage objective, along with the collection of large datasets of personal information, “likely for the purposes of bulk data analysis and further targeting.”
Defending Against Cyber Threats
While threats to federal networks is the Cyber Centre’s “most significant” concern, the threat to regional and local governments remains unclear due to the lack of information from potential victims, the agency said.“Information sharing is necessary to enable effective detection and remediation, particularly when dealing with sophisticated cyber threat actors like those sponsored by the PRC,” it said, calling for greater information sharing across all levels of government to strengthen cooperation.
“Information sharing allows the Cyber Centre to better assess threats, collectively mitigate and respond, and inform potential victims and targets as soon as possible.”
The measures include using phishing-resistant multi-factor authentication, maintaining comprehensive and historical logging information, reducing the response time for critical breaches, and establishing a cyber incident response and recovery plan.