Badge
11,371 badges added since 01 January 2025

Canadian Institute for Cybersecurity Breach Incident Score: Analysis & Impact (CARCANWHI1768827977)

The Rankiteo video explains how the company Canadian Institute for Cybersecurity has been impacted by a Vulnerability on the date April 01, 2023.

newsone

Incident Summary

Rankiteo Incident Impact
-4
Company Score Before Incident
750 / 1000
Company Score After Incident
746 / 1000
Company Link
Incident ID
CARCANWHI1768827977
Type of Cyber Incident
Vulnerability
Primary Vector
Malicious browser extensions, Phishing, Brute-force attack, Third-party vendor compromise
Data Exposed
PII, Financial data, Browsing activity, Photos and names, Affiliate links
First Detected by Rankiteo
April 01, 2023
Last Updated Score
January 19, 2026

If the player does not load, you can open the video directly.

newsone

Key Highlights From This Incident Analysis

  • Timeline of Canadian Institute for Cybersecurity's Vulnerability and lateral movement inside company's environment.
  • Overview of affected data sets, including SSNs and PHI, and why they materially increase incident severity.
  • How Rankiteoโ€™s incident engine converts technical details into a normalized incident score.
  • How this cyber incident impacts Canadian Institute for Cybersecurity Rankiteo cyber scoring and cyber rating.
  • Rankiteoโ€™s MITRE ATT&CK correlation analysis for this incident, with associated confidence level.
newsone

Full Incident Analysis Transcript

In this Rankiteo incident briefing, we review the Canadian Institute for Cybersecurity breach identified under incident ID CARCANWHI1768827977.

The analysis begins with a detailed overview of Canadian Institute for Cybersecurity's information like the linkedin page: https://www.linkedin.com/company/canadian_institute_cybersecurity, the number of followers: 12494, the industry type: Research Services and the number of employees: 61 employees

After the initial compromise, the video explains how Rankiteo's incident engine converts technical details into a normalized incident score. The incident score before the incident was 750 and after the incident was 746 with a difference of -4 which is could be a good indicator of the severity and impact of the incident.

In the next step of the video, we will analyze in more details the incident and the impact it had on Canadian Institute for Cybersecurity and their customers.

Anchorage Police Department recently reported "Cybersecurity Roundup: Leadership Shifts, Third-Party Risks, and Emerging Threats", a noteworthy cybersecurity incident.

Recent developments in cybersecurity highlight evolving threats, regulatory breaches, and structural changes in U.S.

The disruption is felt across the environment, affecting Third-party applications, Browser extensions and Visitor wristband systems, and exposing PII, Financial data and Browsing activity, with nearly ['750,000 (CIRO)', 'Hundreds (Carlsberg)'] records at risk.

Formal response steps have not been shared publicly yet.

Overall, the incident is a reminder of why proactive monitoring and strong governance matter.

Finally, we try to match the incident with the MITRE ATT&CK framework to see if there is any correlation between the incident and the MITRE ATT&CK framework.

The MITRE ATT&CK framework is a knowledge base of techniques and sub-techniques that are used to describe the tactics and procedures of cyber adversaries. It is a powerful tool for understanding the threat landscape and for developing effective defense strategies.

Rankiteo's analysis has identified several MITRE ATT&CK tactics and techniques associated with this incident, each with varying levels of confidence based on available evidence. Under the Initial Access tactic, the analysis identified Supply Chain Compromise (T1195) with high confidence (90%), with evidence including 64% of third-party applications access sensitive data without legitimate need, and ghostPoster campaign infected 840,000 users via malicious browser extensions, Exploit Public-Facing Application (T1190) with moderate to high confidence (80%), supported by evidence indicating vulnerability in Carlsberg Brewerys visitor wristband systems allowed unauthorized access, and Phishing (T1566) with high confidence (90%), supported by evidence indicating sophisticated phishing attack exposed 750,000 investors PII at CIRO. Under the Execution tactic, the analysis identified User Execution: Malicious File (T1204.002) with moderate to high confidence (80%), supported by evidence indicating ghostPoster extensions embed malicious JavaScript in logo images to execute ad fraud. Under the Persistence tactic, the analysis identified Browser Extensions (T1176) with high confidence (90%), supported by evidence indicating 17 malicious browser extensions tied to GhostPoster campaign with 840,000 installations. Under the Credential Access tactic, the analysis identified Brute Force (T1110) with moderate to high confidence (80%), supported by evidence indicating brute-force attacks on Carlsberg Brewerys visitor wristband systems and Credentials from Password Stores (T1555) with moderate to high confidence (70%), supported by evidence indicating black Basta operatives cracked passwords from stolen data. Under the Collection tactic, the analysis identified Automated Collection (T1119) with moderate to high confidence (80%), supported by evidence indicating ghostPoster extensions monitor browsing activity and hijack affiliate links and Data from Local System (T1005) with high confidence (90%), supported by evidence indicating 750,000 investors PII and financial data exposed at CIRO. Under the Exfiltration tactic, the analysis identified Exfiltration Over C2 Channel (T1041) with moderate to high confidence (80%), supported by evidence indicating ghostPoster campaign likely exfiltrated browsing activity and affiliate link data and Transfer Data to Cloud Account (T1537) with moderate confidence (60%), supported by evidence indicating third-party apps access sensitive data without legitimate business need. Under the Impact tactic, the analysis identified Data Encrypted for Impact (T1486) with moderate confidence (50%), supported by evidence indicating black Basta ransomware group implicated in password cracking and Defacement (T1491) with lower confidence (40%), supported by evidence indicating grubhub breach may be linked to cryptocurrency scam using its subdomain. Under the Defense Evasion tactic, the analysis identified Masquerading (T1036) with moderate to high confidence (80%), supported by evidence indicating ghostPoster extensions embedded malicious JavaScript in logo images and Code Signing (T1553.002) with moderate confidence (60%), supported by evidence indicating malicious extensions removed from official stores but persisted. These correlations help security teams understand the attack chain and develop appropriate defensive measures based on the observed tactics and techniques.

newsone

Sources