Three of Canada's largest telecommunications providers, Rogers Communications, Telus, and Freedom Mobile, have separately disclosed data breaches, exposing the personal information of an unconfirmed number of customers. The incidents underscore a systemic risk within the industry, particularly concerning the security of third-party and supply chain partners. While the companies have stated that highly sensitive financial data was not compromised in all cases, the breaches exposed names, contact information, and account details. The attack on Telus was claimed by the notorious hacking group ShinyHunters, highlighting the persistent threat from organized cybercrime groups targeting critical infrastructure.
The series of breaches reveals multiple points of failure across the Canadian telecom landscape:
Rogers Communications: The company, along with its subsidiary Fido, discovered that an unauthorized third party had gained access to customer information. The exposed data includes customer names, contact details, account numbers, and language preferences. Rogers asserts that more sensitive information like financial data, Social Insurance Numbers (SINs), and passwords were not accessed. The breach was identified through proactive monitoring.
Telus: The hacking group ShinyHunters claimed responsibility for a major breach at Telus, alleging the theft of nearly 1 petabyte of data, including customer records from Telus Digital. The group issued a ransom demand, threatening to leak the data. This incident aligns with recent warnings from Canada's Cyber Security Centre about state-sponsored threats targeting telecom infrastructure.
Freedom Mobile: This Quebecor subsidiary suffered its second breach in six months. The latest incident, occurring in January 2026, resulted from the exploitation of subcontractor credentials. The compromised data includes customer names, addresses, phone numbers, and account details.
These attacks demonstrate a clear pattern of threat actors targeting telecoms as high-value targets, both for the customer data they hold and their critical role in national infrastructure.
The reported breaches stem from different, yet common, attack vectors, primarily focusing on exploiting trusted relationships and weak access controls.
TTPs Observed:
T1199): The breach at Freedom Mobile is a classic example of a supply chain attack, where attackers compromised a third-party subcontractor to gain access to the primary target's network. This technique bypasses perimeter defenses by exploiting a trusted connection.T1078): The exploitation of subcontractor credentials falls under this technique. Attackers likely obtained these credentials through phishing, password spraying, or credential stuffing attacks against the less-secure third party.T1213): In all three cases, the attackers targeted and successfully exfiltrated data from customer information databases.T1041): ShinyHunters' claim of stealing nearly 1 petabyte of data from Telus implies a large-scale, sustained exfiltration effort, likely over a covert command-and-control channel.The recurring theme across these incidents is the failure to adequately secure and monitor third-party access. This highlights a critical gap in many organizations' security postures, as they often have less visibility and control over the security practices of their partners and suppliers.
The collective impact of these breaches on the Canadian public is significant. While the exposed data may not include financial details in all cases, the stolen personal information is highly valuable for follow-on attacks such as targeted phishing, identity theft, and SIM-swapping fraud. For the telecom companies, the breaches result in regulatory scrutiny, reputational damage, and the high cost of incident response, customer notification, and security enhancements. The targeting of critical telecom infrastructure also poses a national security risk, as it could be a precursor to more disruptive attacks.
Detection Strategies:
D3-RAPA - Resource Access Pattern Analysis.D3-NTA - Network Traffic Analysis.Response Actions:
Strategic Mitigations:
M1032 - Multi-factor Authentication.Tactical Mitigations:
Enforce MFA on all accounts, especially those used by third parties, to prevent unauthorized access via compromised credentials.
Mapped D3FEND Techniques:
Implement strict controls and monitoring over all privileged accounts, including those used by vendors and subcontractors.
Apply the principle of least privilege to network access for third parties, ensuring they can only reach the specific resources required for their job function.
Mapped D3FEND Techniques:
To mitigate the risk of breaches stemming from compromised third-party credentials, as seen with Freedom Mobile, mandating Multi-Factor Authentication (MFA) for all external access is paramount. This should apply to all employees, contractors, and third-party vendors connecting to the corporate network or cloud environments. Implementation should prioritize phishing-resistant MFA methods like FIDO2 security keys over less secure options like SMS or push notifications, which are susceptible to interception and fatigue attacks. By requiring a second factor of authentication, the organization drastically reduces the risk of an attacker gaining access with stolen credentials alone. This single control is one of the most effective defenses against a wide range of account takeover attacks and directly addresses the root cause of the Freedom Mobile incident.
Organizations must enforce strict network isolation for all third-party connections. Instead of granting broad network access, subcontractors and vendors should be placed in a segmented, isolated network zone (a DMZ or 'vendor enclave') with tightly controlled firewall rules that only permit access to specific, pre-approved internal resources required for their function. All other internal access should be denied by default. This 'least privilege' approach to network access contains the potential blast radius of a third-party compromise. Had this been in place, the compromise of a subcontractor's credentials at Freedom Mobile would not have granted the attacker access to sensitive customer data repositories. This technique is a core component of a Zero Trust architecture and is essential for managing supply chain risk.
Beyond simply granting access, organizations must continuously monitor what third parties do with that access. Implementing Resource Access Pattern Analysis involves establishing a baseline of normal activity for each vendor account—what systems they access, when they access them, and how much data they typically transfer. A SIEM or User and Entity Behavior Analytics (UEBA) platform can be used to ingest logs from firewalls, VPNs, and application servers to build these baselines. The system should then be configured to generate alerts for any significant deviation, such as a vendor account suddenly attempting to access a customer database it has never touched before, or exfiltrating gigabytes of data when it normally transfers only kilobytes. This provides an early warning of a compromised third-party account being abused, enabling a rapid incident response.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats