‘ID Jam’ attacks ‘wreak havoc on accounts in Canada

The Canadian government announced Saturday that it is running to combat a cyberattack that targeted the accounts used by citizens for a wide variety of government services.

According to a statement through the Country’s Office of the Chief Information Officer, the attack affected more than 9,000 GCKey accounts, which Canadians use for things like IS, as well as some 5,500 Accounts from the Canadian Revenue Agency (CRA).The government said the scammer was able to access third-party facilities from GCKey accounts that had been fraudulently received and are now under additional scrutiny for suspicious activity.

Specifically, incident attackers used an approach known as “identification data jam,” which involves taking usernames and passwords collected from past knowledge gaps to compromise accounts where users have exploited the same credentials.

“Attacks that interrupt credentials are desirable because there is minimal effort in an opponent’s component.An attacker only wants to easily access public breach data, which is probably the case here, and use that data to determine other accounts.the ease of getting this data and the scale at which it can be performed, show why this attachment vector is so desirable,” explains Eric Groce, Incident Response Manager at Red Canary.”To prevent this type of attack, end users and organizations deserve not to reuse old passwords and use multi-factor authentication when needed.Better yet, you can use a password manager to track all passwords.»

Chris Hauk, customer privacy champion at Pixel Privacy, says the attack demonstrates the desire for users to vary their toArray passwords

“Credential-filling attacks like this underscore the need for unique passwords for each site,” Hauk said.”Only 11,000 accounts were accessed because the account holder used the same password on the Canadian government site and some other on the previous compromised site.”

Casey Kraus, president of Senserva, instructs users to mitigate attacks.

“With cloud migration, security starts with the user,” Kraus adds.”There has been a build-up of attacks, and there will probably be continuous attacks that are carried out through bad actors targeting users’ accounts.Putting policies such as multi-factor authentication, privileged identity control, and automatic password settings into effect can help user accounts.Focusing on what a user has access to and how they access their account is the first step in preventing a gap in the current technological age.»

Paul Bischoff, a privacy advocate at Comparitech, said the incident also highlighted the need for two-factor authentication.

“The CRA’s online portal allows Canadian taxpayers to access a giant amount of very sensitive information, so it’s unexpected that the company doesn’t require the use of two-factor authentication,” Bischoff said.”Two-factor authentication, which requires users to log in only once when they log in with their username and password, is the most productive defense against credential interference.This will block any user without code if you check out to attach from a new or unknown device.I wouldn’t be surprised if the CRA adds 2FA to its linking procedure in reaction to this incident.»

By submitting this form and its non-public form, you perceive and agree that the form provided herein will be processed, stored and used to provide you with the requested in accordance with Endeavor Business Media’s terms of use and privacy policy.

From our services, you agree to obtain magazines, electronic newsletters and other communications about Endeavour Business Media’s related offers, its brands, affiliates and/or third parties in accordance with Endeavour’s privacy policy..com or by mail to Endeavour Business Media, LLC, 331 54th Avenue N., Nashville, TN 37209.

You may opt out of receiving our communications at any time by sending an email to [email protected].

Leave a Comment

Your email address will not be published. Required fields are marked *