The Province

Foreign state said to be behind cyberattac­k on B.C. government

Provincial officials refuse to name country involved in sophistica­ted April hacking incident

- KATIE DeROSA kderosa@postmedia.com

The sophistica­ted cybersecur­ity attack against the B.C. government was carried out by a state or state-sponsored actor, the head of B.C.'s public service said Friday.

It also came to light that the government had known about the breach for almost a month before making it public.

Shannon Salter, speaking to media during a technical briefing Friday, would not say if the hack is linked to last month's security breach of Microsoft's systems, which was blamed on Russian state-backed hackers and led to the leak of email correspond­ence between U.S. government agencies.

Public Safety Minister Mike Farnworth reiterated there's no evidence sensitive personal informatio­n has been compromise­d in the B.C. attack. However, despite repeated questions, Farnworth did not specify what informatio­n the hackers were able to access or what indicators pointed to a state-sponsored attack.

The B.C. government first became aware of a potential cyberattac­k on April 10. Online security experts began to investigat­e and confirmed on April 11 that a cyber attack was carried out.

The hack was reported to the Canadian Centre for Cyber Security, a federal agency, which enlisted the help of Microsoft.

The centre determined that, because of the sophistica­tion of the hack, it must have been carried out by state or state-sponsored actors.

Premier David Eby was briefed about the cyberattac­k on April 17.

On April 29, online security experts found evidence of another hacking attempt by the same “threat actor,” Salter said.

That's the day provincial employees were advised to immediatel­y change their passwords and make them 14 characters long. B.C.'s Office of the Chief Informatio­n Officer at the time described that as part of the government­s' efforts to “routinely” update security measures.

The cyberattac­k was not made public until Wednesday at 6 p.m. — during a Canucks game — which led to accusation­s from B.C. United MLAs that the government was trying to conceal the attack.

Salter said the cybersecur­ity centre's advice was not to make the hack public to avoid tipping off other hackers to a vulnerabil­ity in government networks. Salter said there were three separate cybersecur­ity incidents, all of which included efforts by the hackers to cover their tracks.

Salter said after the B.C. NDP cabinet was briefed on May 8, the Canadian Centre for Cyber Security agreed that the public could be notified.

Eric Li, an associate professor at the University of British Columbia, Okanagan, who specialize­s in cybersecur­ity, questioned why it took more than two weeks for the government to ask public servants to change their passwords.

“I think there will be some learning from the B.C. government that they can do a better job in communicat­ing that informatio­n to the general public,” he said.

Li said the prevalence of public servants working from home since the pandemic means some might be connecting to lower-security home Wi-Fi systems. Government employees who work remotely are typically required to log onto higher-security VPN servers, Li said, but it can be hard to monitor whether that's actually happening.

Farnworth said the government's technical security systems are “designed to be able to deal with people who are working remotely.”

Salter said security experts had to analyze 40 terabytes of data to determine the extent of the attack. She would not say if any of that data was compromise­d, adding that's part of the investigat­ion.

The province holds the personal data of millions of British Columbians including social insurance numbers, addresses and phone numbers.

Government officials say it's still unclear what the motivation was behind the cyberattac­k. There was no ransom demand.

Last month, Microsoft notified several U.S. federal agencies that Russian-backed hackers may have stolen emails that the company sent to those agencies and that the informatio­n includes sensitive informatio­n such as usernames and passwords.

Neither Salter nor Farnworth would say if Russian-backed hackers are linked to the B.C. security breach.

Farnworth said the government employs 76 cybersecur­ity experts in the B.C. Office of the Chief Informatio­n Officer and spends $25 million a year on cybersecur­ity.

 ?? DARREN STONE/FILES ?? Shannon Salter, the head of B.C.'s public service, said the province was advised not to make the April 29 cyberattac­k public knowledge immediatel­y in order to avoid tipping off other potential hackers to a vulnerabil­ity in government networks.
DARREN STONE/FILES Shannon Salter, the head of B.C.'s public service, said the province was advised not to make the April 29 cyberattac­k public knowledge immediatel­y in order to avoid tipping off other potential hackers to a vulnerabil­ity in government networks.

Newspapers in English

Newspapers from Canada