LockBit Hacked Montreal's Electricity Supplier

LockBit the criminal ransomware group, which is one of the most active gangs in the cyber threat landscape, has recently hacked the Quebec organisation Commission des services electriques de Montréal (CSEM), located in the city of Montreal. The Canadian company has confirmed that it has refused to pay the $2million ransom beig demanded.

CSEM the electric provider, which is responsible for the network of 770 kilometers of pipes through which the electrical, telephone and cable wires pass. CSEM confirmed the security breach, and confirmed the attack took place on August 3rd, 2023.

The Lockbit ransomware gang continues to dominate headlines and cause concern among cyber security experts with a wavee of high profile attacks on critical organisations, governments and businesses, including British Royal Mail and the Japanese Port of Nagoya

The CSEM’s mission is to provide a safe, reliable, and sustainable underground electrical network for the city of Montreal. The main activities carried out by the organisation are planning and coordinating the undergrounding of electrical wires, managing and maintaining the underground electrical network, and providing information and education about underground electrical networks.

The organisation immediately launched an investigation into the security breach with the help of law enforcement in Quebec. At the time of this writing, CSEM has recovered impacted systems. CSEM has downplayed the the security breach’s effects saying that CSEM projects are the subject of public documents.

“It should be noted that all CSEM projects are the subject of public documents. Therefore, all these plans, engineering, construction and management, are already publicly available through the official process offices in Quebec.”  the company said in a statement.

LockBit's typicall modus operandi is to demand a $multimillion, payable in cryptocurrencies such as BTC or Monero and its malware has undergone continued adaptation of its malware with the current version LockBit 3.0 emerging in 2022.

CSEM:     Security Affairs:     The Record:     Facebook:     TEISS:     Cybersecurity Insiders:     IT Nerd:   

ICS Strive:     Cyber Security Ventures                                           Image: Kelly Leonard

You Might Also Read:

LockBit Hacked British Military Data:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Poland’s Train Network Disrupted
Iranian Spyware Exposed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ISACA

ISACA

ISACA is a global professional association and learning organization for members who work in information security, governance, assurance, rissk and privacy.

IPCopper

IPCopper

IPCopper specializes in network packet capture appliances for cybersecurity, cybersurveillance and network monitoring, and encrypted data storage.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

Port53 Technologies

Port53 Technologies

Port53 Technologies is focused on delivering enterprise-grade, cloud-delivered security solutions that are easy to deploy, simple to manage and extremely effective.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

Tetra Tech

Tetra Tech

Tetra Tech is a cybersecurity leader with extensive experience in supporting enterprise-wide programs and systems across multiple business lines from industrial control systems to health IT.

Aurora Systems Consulting

Aurora Systems Consulting

Aurora is a Cybersecurity solutions provider with a portfolio consisting of security consulting, products and services that proactively prevent, secure and manage advanced threats and malware.

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

Lattice Semiconductor

Lattice Semiconductor

Lattice Semiconductor solves customer problems across the network, from the Edge to the Cloud, in the growing communications, computing, industrial, automotive and consumer markets.

BlackFog

BlackFog

BlackFog is a leader in device data privacy, data security and ransomware prevention. Our behavioral analysis and anti data exfiltration technology stops hackers before they even get started.

Protelion

Protelion

The Protelion Security Platform is uniquely architected to deliver security solutions that combine greater protection, flexibility, and performance.

SNC-Lavalin

SNC-Lavalin

SNC-Lavalin is a fully integrated professional services and project management company with offices around the world.

Togggle

Togggle

Togggle offers seamless identity verification solutions and distributed infrastructure, enabling organizations to combat fraud and ensure compliance with data protection regulations.

Hiya

Hiya

Hiya's mission is to secure voice with trust, identity and intelligence. We're protecting people from spam and fraud calls, and helping carriers secure their networks for all.