Nova Scotia Power Data Breach Compromises Data of Over 900,000 Users
好的,我现在需要帮用户总结一下这篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是Nova Scotia Power的数据泄露事件。超过90万的客户数据被泄露,包括个人信息、银行细节和社会保险号。攻击者用了恶意软件,花了几个星期时间入侵系统,最后还部署了勒索软件。公司没有支付赎金,但数据是否公开还不清楚。 用户的要求是用中文总结,不需要特定的开头,直接描述内容。我需要确保信息准确且简洁。重点包括:事件影响人数、泄露的数据类型、攻击手段、后果以及公司的应对措施。 可能的结构是:公司名称 + 数据泄露 + 影响人数 + 泄露数据 + 攻击过程 + 后果 + 公司措施。这样在100字以内应该能涵盖所有要点。 现在开始组织语言:“Nova Scotia Power遭遇大规模数据泄露,超90万客户信息被窃取。” 接着说明泄露的数据类型:“涉及姓名、地址、银行详情及社保号。” 然后描述攻击过程:“因员工点击恶意链接致网络感染勒索软件。” 最后提到公司的应对措施和风险:“公司未支付赎金,但数据外泄风险仍存。” 这样组合起来应该符合要求。 </think> Nova Scotia Power遭遇大规模数据泄露,超90万客户信息被窃取,涉及姓名、地址、银行详情及社保号。因员工点击恶意链接致网络感染勒索软件,公司未支付赎金,但数据外泄风险仍存。 2026-3-26 11:34:55 Author: thecyberexpress.com(查看原文) 阅读量:3 收藏

The Nova Scotia Power data breach has forced the utility provider to commit to stronger cybersecurity and privacy safeguards after a cyberattack exposed sensitive data of more than 900,000 current and former customers. The scale of the Nova Scotia Power data breach and the nature of the compromised information have raised serious questions about how organizations manage and protect customer data.

The breach, discovered on April 25, 2025, was not the result of a single failure. Instead, it unfolded over weeks—highlighting how attackers can quietly move through systems before being detected.

Nova Scotia Power Data Breach Linked to Malware Infection

According to details shared in a compliance letter, the Nova Scotia Power data breach began on or around March 19, 2025. An employee accessed a compromised website infected with “SocGholish” malware and clicked on a malicious pop-up link. This allowed the malware to install and create a foothold within the network.

From there, attackers escalated their access. Between April 8 and April 22, they moved laterally across systems using domain administrator privileges, conducted internal reconnaissance, and harvested credentials. This phase is critical, and often underestimated in cyber incidents.

By the time the Nova Scotia Power data breach was detected, the attackers had already spent days exploring the network.

Data Exfiltration and Ransomware Deployment

The final stage of the Nova Scotia Power data breach occurred between April 23 and April 25, when the threat actor exfiltrated data from both on-premises systems and cloud storage. Shortly after, ransomware was deployed, backups were destroyed, and multiple applications stopped functioning.

report-ad-banner

The attack was only discovered when employees reported system disruptions—an indication that the breach had already reached its most damaging phase.

The attackers later contacted the company via a Tor-based dark web page, providing proof that sensitive customer data had been accessed. However, there is no confirmed evidence so far that the data has been publicly released or sold.

Nova Scotia Power chose not to pay the ransom, aligning with law enforcement guidance.

Scope of the Nova Scotia Power Data Breach

The Nova Scotia Power data breach impacted approximately 375,000 current customers and 540,000 former customers. The compromised data includes:

  • Names, phone numbers, and email addresses
  • Mailing addresses and dates of birth
  • Account and billing history, including bank details
  • Driver’s license numbers and Social Insurance Numbers (SINs)

This level of exposure significantly increases the risk of identity theft and financial fraud, making the Nova Scotia Power data breach particularly serious.

Delayed Notifications and Customer Concerns

The handling of the Nova Scotia Power data breach has also drawn scrutiny. The Office of the Privacy Commissioner of Canada received multiple complaints, particularly around delayed notifications and the use of mailed letters, which slowed communication with affected individuals.

Some concerns were also raised about the collection and storage of SINs, which were part of the compromised dataset.

While Nova Scotia Power informed the public on April 28 and notified regulators by May 1, direct notifications to customers began weeks later, with additional affected individuals identified months after the initial disclosure.

This staggered communication reflects the complexity of breach investigations—but also highlights the importance of timely transparency.

Response and Security Commitments

Following the Nova Scotia Power data breach, the company took steps to contain the incident. This included isolating affected systems, resetting compromised credentials, and working with third-party cybersecurity experts to investigate and remediate the breach.

Customers were offered credit monitoring and identity protection services, initially for 24 months and later extended to five years for all customers.

More importantly, Nova Scotia Power has now committed to strengthening its security measures under a compliance agreement. The Office of the Privacy Commissioner will continue to monitor progress until all commitments are fulfilled.

Privacy Commissioner Philippe Dufresne stated, “I welcome this commitment by Nova Scotia Power to ensure stronger protections for the personal information of its customers. This privacy breach highlights the significant risks of cyberattacks to individuals and companies. Strong, proactive data protection, including robust safeguards, must be prioritized by all organizations in this evolving landscape.”


文章来源: https://thecyberexpress.com/nova-scotia-power-data-breach-2/
如有侵权请联系:admin#unsafe.sh