Canadian investment regulator confirms hackers hit 750,000 investors

The Canadian Investment Regulatory Organization (CIRO) confirmed on Friday that approximately 750,000 investors were impacted by a cyber incident last year.

The self-regulatory organization, which is independent of the Canadian government, oversees all investment and mutual fund dealers in the country, alongside trading activity on Canada’s debt and equity marketplaces.

It said it could confirm the scale of a data breach following “a sophisticated phishing attack” that was detected in August.

After what it described as “more than 9,000 hours” of forensic examination by a “leading third-party forensic IT investigator,” CIRO said it was reaching out to affected clients to confirm that the perpetrators may have compromised a wide range of personal information, although login credentials were not at risk.

“The following information may have been impacted: dates of birth, phone numbers, annual income, social insurance numbers, government issued ID numbers, investment account numbers and account statements,” stated CIRO.

The organization said it deeply regretted that the incident occurred and apologized “for any inconvenience or concern.”

“There is currently no evidence that the information has been misused. We continue to monitor for malicious activity and have not identified any threat activity or exposure on the dark web,” the agency stated.

Affected investors are being offered two years of credit monitoring and identity theft protection “with both of the major credit agencies.”

Chief executive Andrew Kriegler said: “We are intent on doing right by those who are personally affected. We take our public interest role very seriously. Matters of privacy and security are extremely important to us, as are our guiding organizational values of transparency and accountability.

“That’s why we remain committed to further strengthening our own cybersecurity defences and data security practices and supporting the ongoing efforts of the broader investment industry.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts

Next Post

Police raid homes of alleged Black Basta hackers, hunt suspected Russian ringleader

Related Posts

China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

A previously undocumented China-aligned threat cluster dubbed LongNosedGoblin has been attributed to a series of cyber attacks targeting governmental entities in Southeast Asia and Japan. The end goal of these attacks is cyber espionage, Slovak cybersecurity company ESET said in a report published today. The threat activity cluster has been assessed to be active since at least September 2023. "
Read More

Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

Google on Monday released security updates for its Chrome browser to address two security flaws, including one that has come under active exploitation in the wild. The vulnerability in question is CVE-2025-13223 (CVSS score: 8.8), a type confusion vulnerability in the V8 JavaScript and WebAssembly engine that could be exploited to achieve arbitrary code execution or program crashes. "Type
Read More

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations and individuals involved in documenting recent human rights abuses. The activity, observed by HarfangLab in January 2026, has been codenamed RedKitten. It's said to coincide with the nationwide unrest in Iran that began towards the end of 2025,
Read More