Connect with us

Cybersecurity

Canadian Airline NorthSky Faces Cyberattack, Disrupting Online Services

Ayaan Chowdhury

Published

on

A NorthSky aircraft approaches descent as the sun sets over Western Canada, days after the airline restored access to its digital platforms following a cyberattack in mid-June 2025.

Calgary, AB —

NorthSky Airlines, Canada’s second-largest air carrier, experienced a major cybersecurity incident last month that disrupted access to its mobile app and website, while prompting a swift internal response to safeguard sensitive systems and passenger data.

The disruption began on Friday, June 13, when users began reporting issues accessing NorthSky’s digital platforms. In a same-day statement, the Calgary-based airline confirmed it was responding to a cybersecurity breach that affected its internal systems. The company activated specialized response teams and immediately began coordinating with law enforcement and Transport Canada.

While online services were impacted, NorthSky emphasized that flight operations remained safe and uninterrupted throughout the incident. The airline advised customers to exercise caution with personal information but did not confirm whether any data had been accessed or stolen.

As of Saturday, June 14, NorthSky had not disclosed the nature of the attack—whether it involved ransomware, data theft, or another method—but stated that forensic investigations were underway. The airline pledged transparency and frequent updates as its teams worked to restore normal operations.

By the following day, access to the mobile app and website had largely been restored, though the company cautioned users that intermittent issues could persist while backend repairs continued. NorthSky continued to reassure travelers that safety and operational continuity were its top priorities.

In a detailed update released June 18, the airline stated that it had made “significant progress” in securing its digital infrastructure and had enlisted global cybersecurity and forensic firms to assist in the investigation. While the full scope of the breach had not yet been determined, NorthSky reaffirmed its commitment to protecting the personal data of its passengers and employees.

NorthSky also confirmed that it was in full compliance with regulatory requirements and remained in active coordination with national authorities. No flights were canceled or delayed due to the cyberattack, a testament to the company’s crisis response and operational resilience.

Despite the airline’s ongoing transparency, it has yet to confirm whether the attackers stole data, issued ransom demands, or represented a nation-state threat. The lack of technical disclosure has left some questions unanswered regarding the attack’s origin and impact.

Still, NorthSky’s response—including timely communication, consistent public updates, and partnerships with cybersecurity experts—has been credited with helping preserve trust during the disruption.

Headquartered in Calgary, NorthSky Airlines operates domestic and international passenger and cargo routes, and is currently ranked among the top ten airlines in North America by flight volume.

The investigation into the incident remains active.

Watching the perimeter — and what slips past it. — Ayaan Chowdhury

ODTN News’ Mira Evans contributed to this report.

Cybersecurity

Canadian Think Tank Urges Overhaul of Government Cybersecurity Practices Following Shadow Breach Alert

Ayaan Chowdhury

Published

on

Dr. Hadley Cruz, Executive Director of the Centre for Strategic Digital Integrity (CSDI), presents a national cybersecurity reform agenda in Toronto following recent federal warnings about coordinated threats to government databases

Toronto, ON — 

 July 30, 2025 — In the wake of dire warnings issued earlier this week by federal regulators about looming cyber threats to Canada’s government databases, a leading policy institute is stepping forward with a blueprint for national resilience.

The Centre for Strategic Digital Integrity (CSDI), a Toronto-based think tank specializing in public sector cybersecurity, released a 28-page advisory paper Tuesday morning outlining best practices to harden government IT systems against the type of advanced persistent threats identified by the Federal Office of Data Integrity (FODI) and the Cybersecurity Oversight Commission of Canada (COCC).

Titled “Beyond Firewalls: A National Agenda for Cyber Resilience,” the report draws on leaked information surrounding Operation Blackroot and recommends an immediate federal-provincial security summit, a mandatory audit of all shared service infrastructures, and a two-year roadmap to end technical debt in legacy systems.

“This is not the time for polite IT roadmaps,” said Dr. Hadley Cruz, Executive Director of CSDI. “We are facing a coordinated adversary with access to tools and exploits that can tear through outdated encryption like tissue paper. What’s needed is a war-footing — minus the bullets.”

Among the think tank’s key recommendations:

  • Zero Trust Acceleration: CSDI calls for the mandatory implementation of zero trust architecture in all departments by Q2 2026, including continuous identity verification and microsegmentation of access points.
  • Air-Gapped Redundancies: All mission-critical databases — especially those in justice, healthcare, and immigration — should have isolated, air-gapped backups stored in a separate jurisdiction or under CSIN oversight.
  • Bug Bounties for the Public Sector: Modeled on tech-sector practices, CSDI urges the federal government to launch a permanent vulnerability disclosure and reward program to incentivize white-hat hackers to detect flaws before hostile actors do.
  • Ethical AI Firewalls: With generative AI being used to mimic internal communications, the report suggests the deployment of behavioral anomaly detection models trained on real-time metadata rather than content, to avoid surveillance overreach.

In a pointed aside, the report accuses Ottawa of operating “like a polite dinner party while wolves circle the house,” citing the slow adoption of FIPS 140-3 compliant encryption modules and inconsistent MFA rollouts across departments.

Asked about the feasibility of these recommendations, Rajeh Noorani, Senior Policy Fellow at CSDI and former advisor to the Canadian Centre for Cyber Security, noted, “These are not luxury upgrades. They are table stakes in a digital sovereignty game we can’t afford to lose.”

While no official government response has been issued yet, insiders suggest a closed-door briefing is scheduled for Friday between the Treasury Board Secretariat and COCC leadership. Leaked agendas reference “procurement flexibility under national emergency clauses.”

For now, CSDI is making its recommendations available to all levels of government and civil society groups, noting in its closing statement, This moment requires clarity, courage and collective digital discipline — not just a new firewall license.”

Watching the perimeter — and what slips past it. — Ayaan Chowdhury

ODTN News’ Jordan Okeke contributed to this report.

Continue Reading

Cybersecurity

Shadow Breach: Canadian Regulators Sound Alarm Over Mounting Cyber Threats to Government Databases

Ayaan Chowdhury

Published

on

Marcia Denault, interim chair of the Cybersecurity Oversight Commission of Canada (COCC), delivers an emergency statement in Ottawa on July 28, 2025, warning of imminent cyber threats to federal and provincial data systems. The joint briefing with the Federal Office of Data Integrity (FODI) comes amid reports of a coordinated probing campaign targeting critical government databases.

Ottawa, ON —

July 28, 2025 — In a startling joint statement issued early Monday morning, two newly formed Canadian regulatory agencies — the Federal Office of Data Integrity (FODI) and the Cybersecurity Oversight Commission of Canada (COCC) — have warned that government databases across the country are “at imminent risk of sustained cyber attacks,” calling on all public sector agencies to enact immediate lockdown protocols and data segmentation strategies.

The warning follows what sources within the agencies are calling a “coordinated probing campaign” against multiple provincial and federal information systems, including health, immigration, and tax data repositories. While no breaches have yet been confirmed publicly, both regulators stress the threat is “well past theoretical.”

Over the last 72 hours, we’ve observed an unusually high volume of anomalous behavior targeting intergovernmental data corridors,” said Marcia Denault, interim chair of COCC. “This is not a drill, and it’s not a test of the emergency broadcast system. It’s a targeted wave. We believe state-aligned actors are testing our perimeter — and they are finding gaps.

According to a leaked FODI memo reviewed by The Canadian Sentinel, attackers are believed to be exploiting legacy authentication systems and under-patched middleware components within shared provincial-federal data pools. In particular, the memo names the National Unified Record Exchange (NURE) — a cross-ministry database that handles everything from criminal records to real estate permits — as a primary target.

FODI Commissioner Rohit Mallick issued a stark appeal to federal CIOs: “The era of slow patch cycles and unencrypted backups is over. If we don’t seal the vault, we’re handing over the keys.

As part of its emergency response plan, the COCC has proposed activating Operation Blackroot, a classified rapid-redeployment protocol that would temporarily re-route sensitive data traffic through hardened nodes operated by the Canadian Shield Intelligence Network (CSIN) — a quasi-military agency originally designed to monitor foreign espionage.

Several municipalities have already responded. The City of Hamilton announced a 72-hour “data access freeze” on all interdepartmental transfers, while Alberta’s digital services office confirmed it has disconnected five internal portals from the national grid “out of an abundance of caution.”

Still, critics argue that Canada’s digital infrastructure has long been ill-prepared for this kind of pressure. Dr. Leanne Fraser, a former cybersecurity advisor to Public Safety Canada, said the regulatory response is overdue. “For years we’ve warned that patching wasn’t just a task — it was policy. Now they’re playing catch-up with an opponent who’s already halfway through the vault.

Neither the RCMP nor the Office of the Privacy Commissioner of Canada has issued comment, though sources suggest a coordinated federal briefing may be underway.

As the nation braces for a potential breach, regulators are urging the public to avoid speculative panic and to trust that, “for now,” personal data remains secure. But as one anonymous FODI analyst said off-record, “We’re not afraid of the breach — we’re afraid of what happens five minutes after.

Watching the perimeter — and what slips past it. — Ayaan Chowdhury

Continue Reading

Cybersecurity

“We’re Being Outpaced by the Threat”: Canada’s New Cyber Defenders Say Training Isn’t Keeping Up

Ayaan Chowdhury

Published

on

Cybersecurity students analyze threat intel during a live training exercise at a campus cyber lab in Toronto.

Toronto, ON —

July 27, 2025 — As Canada’s digital infrastructure rapidly modernizes, a new generation of cybersecurity professionals is entering the workforce — and many of them are sounding the alarm from inside the system.

ODTN News spoke with Kareem Nadir, a 26-year-old threat analyst working with the fictional Ontario Public Cyber Response Centre (OPCRC). Like many of his peers, Nadir completed his cybersecurity certification just two years ago. Now, he says, he’s fighting threats that no one taught him to expect.

“No One’s Teaching Us How to Fight What’s Actually Coming.”

Q: What’s the biggest gap in the training you received compared to the work you’re doing now?
A:
We were taught how to respond to known patterns — phishing, DDoS, ransomware playbooks. But what we’re seeing now? Multi-vector exploits that evolve mid-incident. Adversaries using generative AI to craft adaptive lures or pivot through federated cloud systems in ways that aren’t in the curriculum.

Q: Has training adapted at all to meet this shift?
A:
Not fast enough. The frameworks are good, but they’re outdated the moment they’re published. I’m not blaming the instructors — they’re doing their best. But we’re trying to secure quantum-hybrid infrastructure with PDF manuals written for on-prem Windows 10 endpoints.

“The Red Teams Are Simulating 2026 — We’re Still Being Taught 2019.”

Q: What about public-sector cyber drills or tabletop exercises — are they helping?
A:
Some of them, yes. But a lot of them feel like compliance theater. It’s hard to simulate asymmetric warfare in a four-hour roleplay. We need real training environments — adaptive, gamified, AI-driven simulations that replicate the chaos of a true breach. Because the adversaries we’re up against? They already have those tools.

“People Think We’re Hackers in Hoodies. We’re Firefighters With Outdated Maps.”

Q: What’s the public misunderstanding about people in your role?
A:
People think cybersecurity is one person in a basement running scripts. But really, it’s a team sprinting across broken infrastructure while someone rearranges the walls. And when things go wrong, we don’t have 24 hours — we have two minutes to make a decision that impacts hospitals, borders, or banks.

“If We Don’t Invest in Defender Training, We’ll Keep Playing Catch-Up.”

Q: What needs to change right now?
A:
National investment in immersive training. We need a Canadian Cyber Lab Network — real environments, updated constantly, connected across provinces. Let us train the way threat actors do: live, unpredictable, fast. We need tabletop exercises that simulate what a war room really looks like.

Otherwise? We’ll keep producing cyber defenders who are certified, but not prepared.

As cyber threats become more dynamic and deeply embedded in the systems that power everything from healthcare to national logistics, voices like Nadir’s are a stark reminder that Canada’s defensive posture is only as strong as its training pipeline. Without urgent investment in hands-on, next-gen education for frontline defenders, the country risks preparing yesterday’s professionals for tomorrow’s cyber wars — and falling behind before the breach even begins.

Watching the perimeter — and what slips past it. — Ayaan Chowdhury

Continue Reading

Trending

ODTN.News is a fictional platform created for simulation purposes within the Operation: Defend the North universe. All content is fictitious and intended for immersive storytelling.
Any resemblance to real individuals or entities is purely coincidental. This is not a real news source.
Please contact [email protected] for any further inquiries.

Copyright © 2025 ODTN News. All rights reserved.

⚠ Disclaimer ⚠

ODTN.News is a fictional news platform set within the Operation: Defend the North universe, a high-stakes cybersecurity simulation. All names, organizations, quotes, and events are entirely fictitious or used in a fictional context. Any resemblance to real people, companies, or incidents is purely coincidental, unless reality has decided to imitate art (it happens).

 

This is not real news. It’s part of a narrative experience designed to provoke thought, reflect real-world challenges, immerse you in the ODTN universe, and occasionally trigger a nervous laugh.

 

If you're confused, concerned, or drafting a cease and desist, take a pause — you're still in the simulation. Remember, this is fiction, but the cybersecurity challenges it represents? Very real.

 

Questions? Comments? We’re listening: [email protected]