The Canadian Centre for Cyber Security (the Cyber Centre) and the Royal Canadian Mounted Police (RCMP) have issued a joint national alert warning of a rising tide of hacktivist attacks targeting Canada's critical infrastructure. The advisory, released on October 30, 2025, was prompted by multiple recent incidents where hacktivists successfully breached internet-accessible Industrial Control Systems (ICS) and Operational Technology (OT). These attacks have impacted the water, food, and manufacturing sectors, creating a direct risk to public safety. The government is urging organizations to take immediate defensive measures to identify and secure exposed ICS/OT assets.
The alert serves as an official warning to Chief Information Security Officers (CISOs) and other leaders within Canadian critical infrastructure organizations. It highlights a dangerous trend: hacktivist groups are evolving their tactics beyond website defacements and Distributed Denial-of-Service (DDoS) attacks. They are now actively targeting and successfully compromising operational technology, such as:
The Cyber Centre warns that the direct exposure of these systems to the internet poses a systemic risk, particularly in sectors that may lack mature cybersecurity programs or regulatory oversight, such as smaller municipalities and private manufacturing facilities.
The alert is directed at all Canadian critical infrastructure operators, with a specific focus on sectors where recent breaches have been observed:
The advisory stresses that small and medium-sized organizations, including municipalities, are at high risk due to potentially limited resources and cybersecurity expertise.
While not a legally binding regulation, the alert outlines urgent recommendations that are considered the standard of due care for operators of critical infrastructure:
The impact of these hacktivist attacks extends beyond data theft or financial loss. Intrusions into ICS/OT environments can have severe real-world consequences:
This is a national security alert, not a new law with defined penalties. However, failure to act on this guidance could expose organizations to significant liability in the event of an incident. Regulators in specific sectors (e.g., energy) may conduct audits based on this alert, and a failure to demonstrate due diligence could lead to future regulatory action or fines.
Organizations should take the following tactical steps:
M1032 - Multi-factor Authentication.M1030 - Network Segmentation.The primary recommendation is to remove ICS/OT systems from the public internet entirely.
Create a strong boundary between the IT and OT networks to prevent attackers from pivoting between them.
Enforce MFA on all remote access solutions (like VPNs) that provide a path to the OT network.
Specifically for ICS, segmenting the industrial network from the corporate network is a foundational security control.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats