Unknown number of guest checkout customers
Canada Computers Inc., a prominent Canadian technology retailer, has publicly disclosed a data breach that occurred on its e-commerce platform. The breach, discovered on January 22, 2026, affected customers who made purchases using the 'guest' checkout option over a nearly four-week period from December 29, 2025, to January 22, 2026. An unauthorized third party gained access to a system supporting the retail website, potentially compromising customers' personal details and credit card information. The company, which operates 39 retail locations, has notified law enforcement and is investigating the incident. Customers with registered member accounts are reportedly not impacted.
While the company has not specified the technical cause of the breach, this type of incident often points to a compromise of the web server or e-commerce application. This could be due to a vulnerability in the platform (e.g., Magento, Shopify), a compromised plugin, or a web-skimming attack (Magecart-style) where malicious code is injected into the checkout page to steal payment information in real-time.
Based on the description of credit card information being compromised on a website, a web-skimming attack is a highly probable scenario.
Web Skimming (Magecart) Attack Chain:
T1190 - Exploit Public-Facing Application: A likely initial access vector if a vulnerability was exploited.T1506 - Web-based Data Manipulation: The core of a web-skimming attack, where the content of the checkout page is modified to include the malicious script.T1040 - Network Sniffing: In this context, the malicious script 'sniffs' data from the browser's DOM before it's encrypted for submission.T1048 - Exfiltration Over Alternative Protocol: The skimmed data is exfiltrated to the attacker's server.Affected customers are now at risk of credit card fraud and identity theft. They must monitor their financial statements for unauthorized charges and consider placing fraud alerts on their credit files. For Canada Computers, the impact includes significant costs for forensic investigation, customer notification, credit monitoring services, and potential regulatory fines under Canadian privacy laws like PIPEDA. The breach also causes substantial reputational damage, which could lead to a loss of customer trust and sales.
Content Security Policy (CSP) violation reportsD3-ACH - Application Configuration Hardening.Regularly patch e-commerce platforms and plugins to prevent exploitation of known vulnerabilities.
Mapped D3FEND Techniques:
Implement a strong Content Security Policy (CSP) to restrict script execution and data exfiltration.
Mapped D3FEND Techniques:
To prevent web-skimming attacks like the one that likely affected Canada Computers, implementing a strong Content Security Policy (CSP) is a critical hardening measure. A CSP is an HTTP header that tells the browser which domains are trusted sources of content. For the checkout page, the CSP should be configured to only allow scripts to be loaded from the company's own domain and the domains of its trusted payment processor. Furthermore, the connect-src directive should be used to restrict where data can be sent, preventing the malicious script from exfiltrating skimmed credit card data to an attacker's server. By setting up a CSP in reporting-only mode first, administrators can identify all legitimate scripts and domains, then build a strict enforcement policy that blocks any unauthorized activity.
Deploy a File Integrity Monitoring (FIM) solution on the web servers hosting the Canada Computers e-commerce site. This tool should be configured to continuously monitor all critical application files, especially JavaScript (.js) files, for any unauthorized changes, additions, or deletions. Attackers perpetrating a skimming attack must modify existing scripts or add new ones to the checkout page. A FIM system would immediately detect this modification by comparing the file's current hash to a known-good baseline hash. This would trigger an alert for security teams to investigate, allowing them to detect and remove the malicious code potentially before any customer data is stolen, or at least limit the duration of the breach.
The period of exposure for the data breach begins.
The data breach is discovered by Canada Computers, and the exposure window ends.
Canada Computers publicly announces the data breach.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.