{
	"id": "6da2afc5-6cf4-4abf-afef-90df0378555e",
	"created_at": "2026-04-06T00:21:32.859709Z",
	"updated_at": "2026-04-10T03:21:35.50423Z",
	"deleted_at": null,
	"sha1_hash": "dd21d592f88219455b53f84c810d19d477a2acf2",
	"title": "Canadian government discloses data breach after contractor hacks",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 3967289,
	"plain_text": "Canadian government discloses data breach after contractor hacks\r\nBy Sergiu Gatlan\r\nPublished: 2023-11-20 · Archived: 2026-04-05 16:19:14 UTC\r\nThe Canadian government says two of its contractors have been hacked, exposing sensitive information belonging to an\r\nundisclosed number of government employees. \r\nThese breaches occurred last month and impacted Brookfield Global Relocation Services (BGRS) and SIRVA Worldwide\r\nRelocation \u0026 Moving Services, both providers of relocation services to Canadian government employees. \r\nGovernment-related information stored on compromised BGRS and SIRVA Canada systems dates back to 1999, and it\r\nbelongs to a broad spectrum of affected individuals, including members of the Royal Canadian Mounted Police (RCMP),\r\nCanadian Armed Forces personnel, and Government of Canada employees.\r\nhttps://www.bleepingcomputer.com/news/security/canadian-government-discloses-data-breach-after-contractor-hacks/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/canadian-government-discloses-data-breach-after-contractor-hacks/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nWhile the Canadian government has yet to attribute the incident, the LockBit ransomware gang has already claimed\r\nresponsibility for breaching SIRVA's systems and leaked what they claim to be archives containing 1.5TB of stolen\r\ndocuments.\r\nLockBit has also made public the contents of failed negotiations with alleged SIRVA representatives.\r\n\"Sirva.com says that all their information worth only $1m. We have over 1.5TB of documents leaked + 3 full backups of\r\nCRM for branches (eu, na and au),\" the ransomware group says in an entry on its dark web data leak site.\r\nSirva on LockBit's leak site (BleepingComputer)\r\nAfter being notified of the contractors' security breaches on October 19th, the government promptly reported the breach to\r\nrelevant authorities, including the Canadian Centre for Cyber Security and the Office of the Privacy Commissioner.\r\nWhile the analysis of the vast volume of compromised data continues, specific details regarding the impacted individuals,\r\nincluding the number of affected employees, remain undetermined. However, preliminary assessments suggest that those\r\nwho used relocation services since 1999 may have had their personal and financial information exposed.\r\n\"The Government of Canada is not waiting for the outcomes of this analysis and is taking a proactive, precautionary\r\napproach to support those potentially affected,\" a statement published on Friday reads.\r\n\"Services such as credit monitoring or reissuing valid passports that may have been compromised will be provided to current\r\nand former members of the public service, RCMP, and the Canadian Armed Forces who have relocated with BGRS or\r\nSIRVA Canada during the last 24 years. \r\n\"Additional details about the services that will be offered, and how to access them will be provided as soon as possible.\"\r\nIndividuals potentially affected by this data breach are urged to take precautionary measures, including updating login\r\ncredentials, enabling multi-factor authentication, and monitoring online financial and personal accounts for unusual activity.\r\nThose suspecting unauthorized access to their accounts must also contact their financial institution, local law enforcement,\r\nand the Canadian Anti-Fraud Centre (CAFC) immediately.\r\nhttps://www.bleepingcomputer.com/news/security/canadian-government-discloses-data-breach-after-contractor-hacks/\r\nPage 3 of 4\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/canadian-government-discloses-data-breach-after-contractor-hacks/\r\nhttps://www.bleepingcomputer.com/news/security/canadian-government-discloses-data-breach-after-contractor-hacks/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/canadian-government-discloses-data-breach-after-contractor-hacks/"
	],
	"report_names": [
		"canadian-government-discloses-data-breach-after-contractor-hacks"
	],
	"threat_actors": [],
	"ts_created_at": 1775434892,
	"ts_updated_at": 1775791295,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/dd21d592f88219455b53f84c810d19d477a2acf2.pdf",
		"text": "https://archive.orkl.eu/dd21d592f88219455b53f84c810d19d477a2acf2.txt",
		"img": "https://archive.orkl.eu/dd21d592f88219455b53f84c810d19d477a2acf2.jpg"
	}
}