{
	"id": "d13bac06-ffc3-4d53-a766-199e78d8d9bf",
	"created_at": "2026-04-06T00:10:12.030288Z",
	"updated_at": "2026-04-10T03:20:38.573181Z",
	"deleted_at": null,
	"sha1_hash": "583be807f24174d43daaffa5e9d9449a76d913b1",
	"title": "Amnesty International Canada breached by suspected Chinese hackers",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1017515,
	"plain_text": "Amnesty International Canada breached by suspected Chinese hackers\r\nBy Sergiu Gatlan\r\nPublished: 2022-12-06 · Archived: 2026-04-05 16:09:35 UTC\r\nAmnesty International's Canadian branch has disclosed a security breach detected in early October and linked to a threat\r\ngroup likely sponsored by China.\r\nThe international human rights non-governmental organization (NGO) says it first detected the breach on October 5, when it\r\nspotted suspicious activity on its IT infrastructure. \r\nAfter detecting the attack, the NGO hired the services of cybersecurity firm Secureworks to investigate the attack and secure\r\nits systems.\r\nhttps://www.bleepingcomputer.com/news/security/amnesty-international-canada-breached-by-suspected-chinese-hackers/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/amnesty-international-canada-breached-by-suspected-chinese-hackers/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\n\"The investigation's preliminary results indicate that a digital security breach was perpetrated using tools and techniques\r\nassociated with specific advanced persistent threat groups (APTs),\" Amnesty International Canada said.\r\n\"Forensic experts with leading international cyber-security firm Secureworks later established that 'a threat group sponsored\r\nor tasked by the Chinese state' was likely behind the attack.\"\r\nThe attack was linked to a suspected Chinese threat group based on the attackers' tactics, techniques, and procedures (TTPs)\r\nand the information they targeted, all consistent with Chinese state hackers' known behavior and tools.\r\nNo evidence of data exfiltration\r\nSecureworks' investigation is yet to unearth evidence showing whether the attackers exfiltrated donor or membership data.\r\nThe NGO reported the security breach to relevant law enforcement authorities and notified staff, donors, and other\r\nstakeholders about the incident.\r\n\"This case of cyberespionage speaks to the increasingly dangerous context which activists, journalists, and civil society alike\r\nmust navigate today,\" Secretary General of Amnesty International Canada Ketty Nivyabandi said.\r\n\"Our work to investigate and denounce these acts has never been more critical and relevant. We will continue to shine a light\r\non human rights violations wherever they occur and to denounce the use of digital surveillance by governments to stifle\r\nhuman rights.\"\r\nThe attack comes as no surprise, given Amnesty International's reports and commentary on the Chinese government's\r\nongoing abuse of human rights.\r\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nhttps://www.bleepingcomputer.com/news/security/amnesty-international-canada-breached-by-suspected-chinese-hackers/\r\nPage 3 of 4\n\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/amnesty-international-canada-breached-by-suspected-chinese-hackers/\r\nhttps://www.bleepingcomputer.com/news/security/amnesty-international-canada-breached-by-suspected-chinese-hackers/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/amnesty-international-canada-breached-by-suspected-chinese-hackers/"
	],
	"report_names": [
		"amnesty-international-canada-breached-by-suspected-chinese-hackers"
	],
	"threat_actors": [],
	"ts_created_at": 1775434212,
	"ts_updated_at": 1775791238,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/583be807f24174d43daaffa5e9d9449a76d913b1.pdf",
		"text": "https://archive.orkl.eu/583be807f24174d43daaffa5e9d9449a76d913b1.txt",
		"img": "https://archive.orkl.eu/583be807f24174d43daaffa5e9d9449a76d913b1.jpg"
	}
}