{
	"id": "ab22dbd7-4bf0-4874-a3ce-86e387464c1e",
	"created_at": "2026-04-06T00:08:45.775908Z",
	"updated_at": "2026-04-10T03:21:40.753956Z",
	"deleted_at": null,
	"sha1_hash": "7c7d7cbec7408726c839f7d798c203cc4e9c5a89",
	"title": "Statement on People's Republic of China reconnaissance of Canadian systems - Canadian Centre for Cyber Security",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 36642,
	"plain_text": "Statement on People's Republic of China reconnaissance of\r\nCanadian systems - Canadian Centre for Cyber Security\r\nArchived: 2026-04-05 15:30:45 UTC\r\nThe Canadian Centre for Cyber Security The protection of digital information, as well as the integrity of the\r\ninfrastructure housing and transmitting digital information. More specifically, cyber security includes the body of\r\ntechnologies, processes, practices and response and mitigation measures designed to protect networks, computers,\r\nprograms and data from attack, damage or unauthorized access so as to ensure confidentiality, integrity and\r\navailability. (Cyber Centre), a part of the Communications Security Establishment Canada (CSE), is urging\r\nCanadian organizations to remain vigilant and bolster their defences against reconnaissance Activity conducted by\r\na threat actor to obtain information and identify vulnerabilities to facilitate future compromise(s). scanning, a low-level but constant cyber threat A threat actor, using the internet, who takes advantage of a known vulnerability in a\r\nproduct for the purposes of exploiting a network and the information the network carries. facing the country.\r\nThe Cyber Centre is aware that a sophisticated state-sponsored threat actor from the People’s Republic of China\r\nhas performed broad based reconnaissance scanning over several months against numerous domains in Canada.\r\nWhile we observe reconnaissance scanning on a near-constant basis, this widespread activity from a sophisticated\r\nthreat actor against multiple organizations across multiple sectors is an opportunity to increase awareness of the\r\npotential threats facing Canadian organizations and share simple steps everyone can take to protect against them.\r\nThese reconnaissance scans have occurred throughout 2024. The majority of affected organizations targeted were\r\nGovernment of Canada departments and agencies, and includes federal political parties, the House of Commons\r\nand Senate. They also targeted dozens of organizations, including democratic institutions, critical infrastructure\r\nProcesses, systems, facilities, technologies, networks, assets, and services essential to the health, safety, security,\r\nor economic well-being of Canadians and the effective functioning of government. Critical infrastructure can be\r\nstand-alone or interconnected and interdependent within and across provinces, territories, and national borders.\r\nDisruptions of critical infrastructure could result in catastrophic loss of life, adverse economic effects, and\r\nsignificant harm to public confidence. , the defence sector, media organizations, think tanks and NGOs.\r\nIt’s important to understand what exactly these scans are.\r\nReconnaissance scanning is not an indication of compromise The intentional or unintentional disclosure of\r\ninformation, which adversely impacts its confidentiality, integrity, or availability. . It is used to gather information,\r\nlook for possible vulnerabilities, and may be a precursor to further malicious actions. It is the equivalent of\r\nsomeone walking around a building to see if there is an alarm or security camera, or trying the windows and doors\r\nto see which ones are unlocked. It is about gathering information in case they want to return to carry out a crime\r\nand figuring out the best way to do it.\r\nWe strongly recommend you defend against reconnaissance scans by following cyber security best practices, such\r\nas the Cyber Centre’s Top 10 IT Security Actions. Threat actors often take advantage of unpatched systems.\r\nhttps://www.cyber.gc.ca/en/news-events/statement-peoples-republic-china-reconnaissance-canadian-systems\r\nPage 1 of 2\n\nOrganizations can protect themselves by ensuring they have updated their operating systems and applications to\r\nprotect against all known vulnerabilities.\r\nOther important measures you can take:\r\nImplement multi-factor authentication\r\nIncrease logging to check for suspicious activity\r\nEducate your employees about phishing and how to spot fraudulent emails and text messages\r\nFor more information on the scale and scope of this threat, please see our PRC cyber threat bulletin.\r\nTo learn about the cyber threats to civil society organizations and how to protect yourself, please see our joint\r\ncyber security advisory on mitigating cyber threats with limited resources.\r\nThe Cyber Centre offers a range of advice and guidance, including on how to protect your personal accounts.\r\nFor more on vulnerabilities, you can visit the Cyber Centre’s Alerts and advisories page.\r\nFor more on best practices, please visit the Cyber Centre’s Guidance page.\r\nSource: https://www.cyber.gc.ca/en/news-events/statement-peoples-republic-china-reconnaissance-canadian-systems\r\nhttps://www.cyber.gc.ca/en/news-events/statement-peoples-republic-china-reconnaissance-canadian-systems\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.cyber.gc.ca/en/news-events/statement-peoples-republic-china-reconnaissance-canadian-systems"
	],
	"report_names": [
		"statement-peoples-republic-china-reconnaissance-canadian-systems"
	],
	"threat_actors": [],
	"ts_created_at": 1775434125,
	"ts_updated_at": 1775791300,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/7c7d7cbec7408726c839f7d798c203cc4e9c5a89.pdf",
		"text": "https://archive.orkl.eu/7c7d7cbec7408726c839f7d798c203cc4e9c5a89.txt",
		"img": "https://archive.orkl.eu/7c7d7cbec7408726c839f7d798c203cc4e9c5a89.jpg"
	}
}