Cybersecurity
Canadian Airline NorthSky Faces Cyberattack, Disrupting Online Services

Calgary, AB —
NorthSky Airlines, Canada’s second-largest air carrier, experienced a major cybersecurity incident last month that disrupted access to its mobile app and website, while prompting a swift internal response to safeguard sensitive systems and passenger data.
The disruption began on Friday, June 13, when users began reporting issues accessing NorthSky’s digital platforms. In a same-day statement, the Calgary-based airline confirmed it was responding to a cybersecurity breach that affected its internal systems. The company activated specialized response teams and immediately began coordinating with law enforcement and Transport Canada.
While online services were impacted, NorthSky emphasized that flight operations remained safe and uninterrupted throughout the incident. The airline advised customers to exercise caution with personal information but did not confirm whether any data had been accessed or stolen.
As of Saturday, June 14, NorthSky had not disclosed the nature of the attack—whether it involved ransomware, data theft, or another method—but stated that forensic investigations were underway. The airline pledged transparency and frequent updates as its teams worked to restore normal operations.
By the following day, access to the mobile app and website had largely been restored, though the company cautioned users that intermittent issues could persist while backend repairs continued. NorthSky continued to reassure travelers that safety and operational continuity were its top priorities.
In a detailed update released June 18, the airline stated that it had made “significant progress” in securing its digital infrastructure and had enlisted global cybersecurity and forensic firms to assist in the investigation. While the full scope of the breach had not yet been determined, NorthSky reaffirmed its commitment to protecting the personal data of its passengers and employees.
NorthSky also confirmed that it was in full compliance with regulatory requirements and remained in active coordination with national authorities. No flights were canceled or delayed due to the cyberattack, a testament to the company’s crisis response and operational resilience.
Despite the airline’s ongoing transparency, it has yet to confirm whether the attackers stole data, issued ransom demands, or represented a nation-state threat. The lack of technical disclosure has left some questions unanswered regarding the attack’s origin and impact.
Still, NorthSky’s response—including timely communication, consistent public updates, and partnerships with cybersecurity experts—has been credited with helping preserve trust during the disruption.
Headquartered in Calgary, NorthSky Airlines operates domestic and international passenger and cargo routes, and is currently ranked among the top ten airlines in North America by flight volume.
The investigation into the incident remains active.
Watching the perimeter — and what slips past it. — Ayaan Chowdhury
ODTN News’ Mira Evans contributed to this report.
Cybersecurity
Group Arrested for Sophisticated AI Cyberattack: Government Remains Tight-lipped

Washington, DC —
In a sweeping operation, federal authorities arrested a group of individuals on charges related to a highly sophisticated AI-driven cyberattack that crippled several key infrastructure systems across the United States. The attack, which unfolded over the course of several months, has been described by experts as one of the most advanced forms of cyber warfare ever seen.
The suspects, identified only by their aliases—“Shadow42,” “RedWolf,” “BlackKnight,” and “Pixel” in the official report—were apprehended in a coordinated raid carried out by the Federal Cybersecurity Task Force, a joint initiative between several government agencies. They are believed to have masterminded the attack using cutting-edge artificial intelligence algorithms capable of bypassing traditional security systems.
The Attack Unfolds
The cyberattack was first detected by the Department of Cybersecurity and Infrastructure Security (DCIS) in late August, when unusual data patterns were spotted across major government networks. The hackers used AI-powered tools that could autonomously adapt to defense mechanisms, shifting tactics in real-time and avoiding detection by conventional security measures. Experts have noted that the sophistication of the tools used was on par with those typically seen in state-sponsored cyber operations.
The attack primarily targeted critical systems in healthcare, transportation, and financial sectors, leading to disruptions that left many citizens facing delays in accessing essential services. The attackers appeared to use AI to automate data exfiltration and disrupt systems without triggering any major alarms. In some instances, the AI algorithms reportedly altered data in transit, making it difficult to trace the attack’s origins.
Government Keeps Details Under Wraps
Despite the arrests, the federal government has been remarkably quiet on the details of the attack. In a statement, the Department of Justice confirmed the arrests but has refrained from commenting on the specifics of the cyberattack or the identities of the organizations that may have been involved.
A spokesperson for the government, who spoke on the condition of anonymity, hinted that the attackers had connections to a network of highly skilled individuals but declined to provide further information. “This was a highly sophisticated operation that required immense resources and expertise,” the spokesperson said. “At this stage, we are still investigating the full extent of the operation.“
Several government officials have also raised concerns about the use of AI in cyberattacks, calling it a game-changer in the world of cybersecurity. “This incident highlights the growing threat of AI-powered attacks, which can outsmart our defences at every level,” said an anonymous senior cybersecurity official.
The Role of AI in the Attack
The AI algorithms used in the attack were allegedly designed to mimic human behavior, making it extremely difficult to distinguish between legitimate and malicious activities. It was reported that the AI systems were able to “learn” from their interactions with security protocols, continuously improving and finding new ways to exploit vulnerabilities.
Some experts believe that the technology used by the attackers could revolutionize the field of cybercrime, with AI becoming a key tool in the arsenal of future cyber criminals. The rapid adaptability and precision of AI-driven attacks have raised concerns about the future of cybersecurity and the potential for AI to be weaponized in ways never seen before.
What’s Next for the Alleged Attackers?
As the investigation continues, law enforcement agencies are reportedly working to uncover the full scope of the operation. Sources suggest that the group may have had international connections, but the full extent of their network remains unclear.
The arrested individuals are expected to face a range of charges, including cyberterrorism, identity theft, and espionage. If convicted, they could face significant prison sentences. Legal experts have noted that the case may set a precedent for how AI-related cybercrimes are prosecuted in the future.
In the meantime, the public remains largely in the dark about the full scale of the attack, with the government keeping many details under wraps. While some have questioned the transparency of the investigation, others are urging caution, acknowledging the sensitive nature of the incident.
As the investigation progresses, experts warn that AI-driven cyberattacks may become an increasingly prevalent threat, potentially changing the landscape of cybersecurity forever.
Watching the perimeter — and what slips past it. — Ayaan Chowdhury
Cybersecurity
Highlighting Scattered Spider’s Marks & Spencer Attack: A Retail Nightmare and Warning for National Defence

August 1, 2025 — The cyberattack on Marks & Spencer has become more than a headline, it’s fast becoming a case study in how sophisticated threat actors map, infiltrate, and destabilize retail infrastructure. The assault, attributed to the notorious Scattered Spider collective, is a stark signal: no organization is immune from evolving supply-chain and identity attacks.
Scattered Spider, also known as UNC3944, Muddled Libra, and Octo Tempest, is a sophisticated hacker group known for social engineering and identity theft rather than traditional exploits. They often impersonate IT staff to trick employees into resetting passwords or granting access, and use SIM swapping or MFA fatigue attacks to bypass security controls. Instead of hacking systems directly, they infiltrate trusted vendors and managed service providers, gaining access through legitimate channels. Once inside, they use real IT tools to move quietly and steal data, later extorting victims by threatening to leak information. Scattered Spider doesn’t break in…they’re invited in by mistake.
Marks & Spencer (M&S) suffered a major cyberattack that caused weeks of disruption and significant financial losses. Online services were shut down for nearly six weeks, hitting clothing, home, and food sales and costing the company an estimated £300 million. The breach disrupted supply chains and order systems, forcing staff to rely on manual workarounds. Some customer data such as names and emails were accessed, though payment details remained secure. In response, M&S has moved to strengthen its systems and tighten vendor security, as the incident exposed a major vulnerability in modern retail: the risks hidden within third-party service providers that keep operations running.
The Marks & Spencer breach shows a growing pattern of attacks reaching far beyond retail, hitting sectors like energy, telecom, and finance. It’s a reminder that people, not just systems, are the new targets. Weak identity controls or simple human error can open the door to an entire network. The incident also exposed how third-party vendors and service providers have become prime attack routes, turning supply chains into gateways for hackers. Even strong, well-funded companies are vulnerable when trust is misplaced. And often, the real damage isn’t stolen data but the disruption; outages, delays, and lost confidence. As cyberattacks evolve into hybrid threats that blend hacking, misinformation, and legal pressure, organizations must focus on fast communication, strong partnerships, and resilience at every level.
The Marks & Spencer breach is more than a wake-up call, it is a warning shot to every enterprise, especially those reliant on vendor networks: be prepared, not reactive.
ODTN News will continue monitoring developments and publishing deeper analyses of the evolving threat landscape.
On the ground, where infrastructure meets everyday life. — Marcus Tran
ODTN News’ Ayaan Chowdhury contributed to this report.
Cybersecurity
Canadian Think Tank Urges Overhaul of Government Cybersecurity Practices Following Shadow Breach Alert

Toronto, ON —
July 30, 2025 — In the wake of dire warnings issued earlier this week by federal regulators about looming cyber threats to Canada’s government databases, a leading policy institute is stepping forward with a blueprint for national resilience.
The Centre for Strategic Digital Integrity (CSDI), a Toronto-based think tank specializing in public sector cybersecurity, released a 28-page advisory paper Tuesday morning outlining best practices to harden government IT systems against the type of advanced persistent threats identified by the Federal Office of Data Integrity (FODI) and the Cybersecurity Oversight Commission of Canada (COCC).
Titled “Beyond Firewalls: A National Agenda for Cyber Resilience,” the report draws on leaked information surrounding Operation Blackroot and recommends an immediate federal-provincial security summit, a mandatory audit of all shared service infrastructures, and a two-year roadmap to end technical debt in legacy systems.
“This is not the time for polite IT roadmaps,” said Dr. Hadley Cruz, Executive Director of CSDI. “We are facing a coordinated adversary with access to tools and exploits that can tear through outdated encryption like tissue paper. What’s needed is a war-footing — minus the bullets.”
Among the think tank’s key recommendations:
- Zero Trust Acceleration: CSDI calls for the mandatory implementation of zero trust architecture in all departments by Q2 2026, including continuous identity verification and microsegmentation of access points.
- Air-Gapped Redundancies: All mission-critical databases — especially those in justice, healthcare, and immigration — should have isolated, air-gapped backups stored in a separate jurisdiction or under CSIN oversight.
- Bug Bounties for the Public Sector: Modeled on tech-sector practices, CSDI urges the federal government to launch a permanent vulnerability disclosure and reward program to incentivize white-hat hackers to detect flaws before hostile actors do.
- Ethical AI Firewalls: With generative AI being used to mimic internal communications, the report suggests the deployment of behavioral anomaly detection models trained on real-time metadata rather than content, to avoid surveillance overreach.
In a pointed aside, the report accuses Ottawa of operating “like a polite dinner party while wolves circle the house,” citing the slow adoption of FIPS 140-3 compliant encryption modules and inconsistent MFA rollouts across departments.
Asked about the feasibility of these recommendations, Rajeh Noorani, Senior Policy Fellow at CSDI and former advisor to the Canadian Centre for Cyber Security, noted, “These are not luxury upgrades. They are table stakes in a digital sovereignty game we can’t afford to lose.”
While no official government response has been issued yet, insiders suggest a closed-door briefing is scheduled for Friday between the Treasury Board Secretariat and COCC leadership. Leaked agendas reference “procurement flexibility under national emergency clauses.”
For now, CSDI is making its recommendations available to all levels of government and civil society groups, noting in its closing statement, “This moment requires clarity, courage and collective digital discipline — not just a new firewall license.”
Watching the perimeter — and what slips past it. — Ayaan Chowdhury
ODTN News’ Jordan Okeke contributed to this report.
-
Retail Watch2 months ago
Calgary Small Business Hit by Sudden Payment Outage, Sparks Cybersecurity Concerns
-
Business6 months ago
Canadian Software Vendor Breach Exposes Cloud Environments Across Energy Sector
-
Retail Watch3 months ago
Understaffed and overwhelmed, IT teams face rising pressure as retail digitization accelerates
-
Politics4 months ago
Canada, ESB Sign Digital Security Pact to Counter Global Telecom Threats
-
Business3 months ago
Are Canadian Companies Learning from Global Cyber Attacks? Insider Insights into the Secret Downfall of Canadian Businesses
-
Cybersecurity9 months ago
The Black Signal — How a Cyberattack Shut Down Ebonia’s Power Grid in Minutes
-
Business2 months ago
Insurance Without a Safety Net? Canadian Firms Face Premium Hikes Amid Cyber Liability Crisis
-
Politics2 months ago
“Digital Sovereignty or Digital Standoff?” Ottawa Faces Rift Over Cybersecurity Authority Between Provinces and Federal Government