site-logo
site-logo
site-logo

From click to crisis: How Nova Scotia Power got breached

From click to crisis: How Nova Scotia Power got breached

From click to crisis: How Nova Scotia Power got breached

Nova Scotia Power breach
Shieldworkz logo

Team Shieldworkz

A ransomware attack on a regulated electric utility, the anatomy of a 37-day infiltration, and the prescriptive remediation framework every energy operator should review.

900,000+

Customers Affected

37 Days

Undetected Dwell Time

5 Years

Credit Monitoring Offered

SIN + Bank

Data Categories Stolen

In April 2025, Nova Scotia Power the regulated electric utility serving 900,000 customers across Nova Scotia, Canada suffered a ransomware attack that compromised sensitive personal data including Social Insurance Numbers, bank account information, and driver's license numbers. The attack vector was a commodity malware family. The dwell time was 37 days. The attackers destroyed backups before detonating ransomware. None of this is unusual. All of it was preventable.

This analysis dissects the Nova Scotia Power breach through two complementary technical lenses: NERC CIP (the mandatory North American bulk electric system cybersecurity standard) and IEC 62443 (the international industrial control system security framework). The goal is not to catalogue what went wrong it is to prescribe what should have been in place, and what every regulated utility should be auditing right now.

⚠ Critical Insight

The attackers never needed a zero-day exploit. A single employee, a compromised website, and a pop-up click was all it took to foothold into a network that handled billing data for nearly a million people and that sat adjacent to operational technology managing electrical infrastructure.

The Anatomy of the Attack: A Five-Week Infiltration

The attack unfolded across three distinct phases, each one representing a failure of a specific control domain. Understanding the sequence is essential not just to assign blame, but to prescribe the right remediation.

March 19 2025

PHASE 1: INITIAL ACCESS

SocGholish Malware Delivered via Drive-By

An employee visited a compromised website. A malicious JavaScript pop-up SocGholish's trademark fake browser update prompt was clicked. The malware installer executed, establishing an encrypted command-and-control channel back to the attacker's infrastructure. The endpoint was now owned.

 

Apr 8–22 2025

PHASE 2: LATERAL MOVEMENT & RECONNAISSANCE

Domain Admin Credentials Harvested, Network Mapped

Over two weeks, attackers escalated privileges to domain administrator level, moved laterally across systems, conducted internal reconnaissance, and harvested credentials. This is the "dwell time" phase the period that separates a containable incident from a catastrophic one. No detection occurred during this entire window.

 

Apr 23–25 2025

PHASE 3: EXFILTRATION + DESTRUCTION

Data Stolen, Ransomware Deployed, Backups Destroyed

In the final 72-hour sprint, attackers exfiltrated data from both on-premises systems and cloud storage, deployed ransomware, destroyed backups, and took down multiple applications. The breach was only discovered when employees reported system outages meaning detection was entirely accidental, not systematic.



 

Apr 28 2025

PHASE 4: DISCLOSURE

Public Notification & Regulatory Reporting

Nova Scotia Power informed the public on April 28 and notified the Office of the Privacy Commissioner of Canada by May 1. Direct customer notifications followed weeks later, with additional affected individuals identified months after initial disclosure. The ransom was not paid, consistent with law enforcement guidance.

 FIG 1: Attack chain: SocGholish initial access → Encrypted C2 → Domain Admin escalation → Exfiltration → Ransomware detonation (Mar 19 – Apr 25, 2025)

What Was Compromised and Why It Matters

The 900,000+ affected individuals lost more than names and email addresses. The compromised dataset included Social Insurance Numbers (SINs), driver's license numbers, bank account and billing history, dates of birth, phone numbers, and mailing addresses. For an electric utility, this scope of data collection raises an uncomfortable question: why was all of this necessary?

The Office of the Privacy Commissioner of Canada raised specific concerns about the collection and retention of SINs, which are the crown jewels of Canadian identity theft. For a utility managing electricity delivery, the operational case for holding SINs in the same environment as billing systems is questionable and it points to a data minimisation failure that NERC CIP's access management controls are designed, in part, to address.

"I welcome this commitment by Nova Scotia Power to ensure stronger protections for the personal information of its customers. This privacy breach highlights the significant risks of cyberattacks to individuals and companies." Philippe Dufresne, Privacy Commissioner of Canada, March 2026


The NERC CIP Gap Analysis: What Should Have Caught This

NERC CIP (North American Electric Reliability Corporation Critical Infrastructure Protection) is the mandatory cybersecurity standard for bulk electric system operators in North America. Standards CIP-002 through CIP-014 cover asset identification, access management, systems security, incident reporting, and personnel training. The Nova Scotia Power breach reveals meaningful gaps across several of these standards.

NERC CIP Standard

Requirement

Observed Gap

Status

CIP-003 Security Management Controls

Policies for low-impact BES Cyber Systems

No evidence of endpoint web-browsing controls or DNS filtering that would have blocked SocGholish delivery domains

GAP

CIP-004 Personnel & Training

Security awareness training, including phishing/malware recognition

Employee interacted with a known drive-by download technique that trained personnel should recognize; browser security hygiene appears insufficient

GAP

CIP-005 Electronic Security Perimeters

Define and manage ESP boundaries; control interactive remote access

Lateral movement across systems using domain admin credentials went undetected for 14+ days, suggesting insufficient east-west segmentation

GAP

CIP-007 Systems Security Management

Ports & services control, security patch management, malware prevention

Malware installed without triggering endpoint detection; backup systems were accessible and destroyed indicating backup access was not restricted

GAP

CIP-008 Incident Reporting & Response

Incident response plan activation, reporting timelines

Detection was accidental (employee reports of outages), not systematic. The 37-day dwell time indicates no automated incident detection was triggered

GAP

CIP-009 Recovery Plans

Tested backup and recovery procedures for BES Cyber Systems

Attackers successfully destroyed backups a direct contradiction of tested, hardened backup procedures required under this standard

GAP

CIP-010 Configuration Change Management

Baseline configurations, transient cyber assets, vulnerability management

Domain admin credential escalation occurred without configuration alerts; no indication of privileged access workstation (PAW) architecture

GAP

CIP-011 Information Protection

Methods to identify, classify, and protect BES Cyber System Information

Data classification failures: SINs co-located with billing data in an inadequately segmented environment; cloud storage accessed without apparent DLP controls

GAP

 

What is striking here is the breadth of the gaps. This was not a single control failure it was a systemic one. The attacker moved freely because the defence-in-depth layers that NERC CIP mandates were either absent, misconfigured, or not monitored effectively. A key principle for utilities is that compliance and security are not the same thing: meeting the letter of CIP standards requires active monitoring, not just policy documentation.

The IEC 62443 Lens: A Deeper Technical Assessment

IEC 62443 is the international family of standards for Industrial Automation and Control Systems (IACS) security. Unlike NERC CIP, which is compliance-oriented and North America-specific, IEC 62443 provides engineering-grade security requirements expressed through Security Levels (SL 1–4) and seven Foundational Requirements (FRs). For a utility like Nova Scotia Power which operates SCADA systems, substations, and grid management infrastructure the 62443 framework offers the most precise diagnostic language available.

IEC 62443-3-3 Foundational Requirements: Breach Impact Mapping

FR 1: ACCESS CONTROL

Domain admin abuse; no MFA on privileged accounts

FR 2: USE CONTROL

Overprivileged domain account enabled free movement

FR 3: SYSTEM INTEGRITY

Cloud & on-prem stores lacked integrity monitoring

FR 4: DATA CONFIDENTIALITY

SINs, SIN data exfiltrated; no DLP in cloud paths

FR 5: RESTRICTED DATA FLOW

No east-west segmentation; flat network topology

FR 6: TIMELY RESPONSE

Recovery initiated after discovery; ransom refused

FR 7: RESOURCE AVAILABILITY

Backups destroyed; multiple apps taken offline by ransom

Legend:

Red = Control Failure

Green = Partial/Reactive

Amber = Monitoring Gap

Security Level Assessment: Where Did Nova Scotia Power Stand?

IEC 62443 defines Security Levels from SL 1 (protecting against casual or unintentional violation) through SL 4 (protecting against sophisticated, nation-state-level attacks). For a regulated electric utility, the target is typically SL 2 protection against deliberate violation by an entity with moderate resources and motivation, such as organised cybercriminal groups.

Based on the attack chain evidence a commodity malware delivery mechanism, successful domain admin escalation, 37-day undetected dwell time, and accessible backup destruction the effective security level at the time of breach was not SL 2. The SocGholish gang is not a nation-state actor. They are a well-resourced but commercially-motivated criminal enterprise that deploys scalable, off-the-shelf initial access tools. An SL 2-compliant environment should have contained or detected this intrusion. It did not.

The IT/OT Convergence Risk That Nobody Talks About

What makes this incident particularly instructive for the broader energy sector is the convergence angle. Nova Scotia Power's breach was initially an IT event corporate billing and customer data systems, not operational technology. But the adjacency matters enormously. The same domain admin credentials that gave attackers run of the corporate network could, in an inadequately segmented environment, be a stepping stone toward SCADA systems, energy management platforms, and substation control networks.

The utility sector is still working through the implications of connecting historically air-gapped OT networks to corporate IT infrastructure for operational efficiency. Every connection that improves monitoring or remote management also creates a potential lateral movement path. IEC 62443's Zone and Conduit model enforcing SR 5.1 and SR 5.2 (zone boundary protection) exists precisely to contain this risk. A deny-by-default conduit policy between IT and OT zones would not have prevented the initial infection, but it would have prevented any eastward movement toward grid infrastructure.


The 37-Day Dwell Time Problem: Detection Is the Broken Control

The single most damaging number in this incident report is 37 days. From the initial SocGholish infection on March 19 to the ransomware detonation on April 25, attackers were inside the network for over five weeks with no automated detection. This is the classic "dwell time" problem that separates preventable breaches from catastrophic ones.

Detection capability in an OT-adjacent environment requires more than perimeter firewalls. It requires network detection and response (NDR) tools capable of reading industrial protocols, passive asset discovery that doesn't disrupt PLCs with active scan traffic, and behavioural baselines that flag anomalous lateral movement patterns. AI-driven anomaly detection is the critical differentiator attackers using legitimate admin credentials look identical to legitimate admins unless behaviour is continuously baselined.

⚠ Detection Gap Analysis

Industry benchmark for acceptable dwell time under NERC CIP incident reporting requirements is measured in hours to days, not weeks. A 37-day undetected presence in a regulated bulk electric system environment represents a failure of both technical detection and procedural monitoring cadence. CIP-008 requires incident response plans, but detecting the incident to trigger that plan depends on CIP-007 security event monitoring being both configured and actively reviewed.


What Good Looks Like: Prescriptive Remediation

The purpose of a post-incident analysis is not autopsy it is prevention. The following recommendations are grounded in specific NERC CIP and IEC 62443 controls that would have materially altered the outcome of this breach.

NERC CIP-004 / IEC 62443 FR-1

Mandatory Browser Security & Web Filtering

DNS-layer filtering to block known SocGholish delivery domains. Browser isolation for non-essential internet access from corporate workstations. Simulated drive-by download training scenarios beyond phishing email simulations as required by CIP-004 personnel training.

IEC 62443-3-3 SR 1.1–1.5 / CIP-005

Zero Trust for Privileged Access

Privileged Access Workstations (PAWs) for all domain admin operations. MFA enforced at the engineering workstation level. Just-in-time access provisioning so domain admin rights are not persistently assigned. Session recording for all privileged sessions as an audit trail.

NERC CIP-007 / IEC 62443-3-3 SR 5.1–5.2

East-West Network Segmentation

Implement IEC 62443 Zone and Conduit architecture with deny-by-default conduit policies between IT and OT zones. Microsegmentation within IT zones to prevent lateral movement between billing, HR, and cloud systems. Validate with automated segmentation verification tools quarterly.

NERC CIP-007 / IEC 62443-3-3 FR-7

Immutable, Air-Gapped Backups

3-2-1-1 backup strategy: three copies, two media types, one offsite, one air-gapped or immutable. Backup access should require multi-party authorisation. Regular restoration testing under CIP-009 should include adversarial scenarios (backup deletion attempts) not just operational failures.

IEC 62443-3-3 FR-6 / CIP-008

Continuous OT-Aware Detection

Deploy passive NDR (Network Detection and Response) with OT protocol awareness Modbus, DNP3, IEC 61850 and behavioural baselining. Set detection targets for mean time to detect (MTTD) of under 24 hours for privilege escalation events. Integrate ICS logs into a cloud-based SIEM with real-time alerting.

IEC 62443-2-3 / CIP-010

Vulnerability Triage & Patch Governance

Implement IEC 62443-2-3's Defensible Deferral framework for OT patches: risk-score each vulnerability against zone exposure, compensating controls, and operational impact of patching. Use digital twins to test patches before applying to live control loops. Mandate SBOMs from all industrial vendors as a procurement requirement.

NERC CIP-011 / IEC 62443 FR-4

Data Minimisation & Classification

Conduct a data retention audit: identify all PII fields, including SINs, held in customer-facing systems and assess operational necessity. Implement data loss prevention (DLP) on cloud storage egress paths. Classify and label all data stores per CIP-011 information protection requirements.

IEC 62443-3-2 / CIP-002

Annual IEC 62443 Gap Assessment

Commission an independent IEC 62443-based risk assessment annually, mapping every asset and network flow against Security Level targets. Benchmark against SL 2 for IT/OT boundary systems and SL 3 for SCADA and substation control networks. A structured methodology provides quantified impact scoring that translates technical gaps into business risk language for board-level reporting.

The Notification Failure: A Secondary Crisis

Beyond the technical dimensions of this breach, the handling of customer notification created a secondary reputational and regulatory crisis. While Nova Scotia Power informed the public on April 28 three days after discovery direct notifications to affected individuals arrived weeks later. Some customers were not notified until months after the initial disclosure, as additional victims were identified in subsequent forensic analysis.

For a breach involving SINs and bank account details, every day of notification delay is a day in which affected individuals cannot take protective action placing fraud alerts, freezing credit, monitoring accounts. The Office of the Privacy Commissioner received multiple complaints specifically about this delay.

From an IEC 62443 and CIP-008 perspective, the notification failure reflects an incident response plan that was not scaled for the complexity of a dual-vector attack (data exfiltration plus ransomware). The plan needed sub-playbooks for: customer notification tiering, regulatory escalation, media communication, and ongoing victim identification as forensic analysis expands scope. Nova Scotia Power's commitment to provide five years of credit monitoring for all customers extended from an initial 24 months was an appropriate remediation, but it cannot substitute for timely initial communication.

The Broader Picture: Energy Sector Under Sustained Threat

Nova Scotia Power is not an isolated case. Across North America and Europe, the energy sector is experiencing sustained targeting by both criminal ransomware operators and state-aligned threat actors. The INC Ransom group which operates a franchise model analogous to ransomware-as-a-service has explicitly targeted Western critical infrastructure. The SocGholish operators who likely conducted this intrusion are known to sell initial access to downstream ransomware affiliates, meaning the entity that dropped the ransomware and the entity that installed the initial backdoor may have been two separate organisations operating in a criminal marketplace.

This industrialisation of the attack chain has profound implications for defenders. AI is being used by attackers to craft smarter phishing, automate malware, and exploit weaknesses faster than ever. The asymmetry between attacker automation and defender manual review processes is widening. The answer is not more compliance checklists it is deploying AI-driven detection that can identify the subtle behavioural anomalies of a domain admin account that starts querying systems it has never queried before.

Frameworks like NERC CIP, IEC 62443, and NIST 800-82 are evolving to tackle new threats. Stricter data protection laws are requiring real-time monitoring and incident reporting. Falling short can mean fines and a hit to your reputation.

Shieldworkz, ICS Cybersecurity: What's Next for the Next 5 Years

The Nova Scotia Power breach is a masterclass in the distance between regulatory compliance and operational resilience. NERC CIP, properly implemented, provides a meaningful baseline but the baseline requires active enforcement, continuous monitoring, and a security culture that treats detection as a first-order priority rather than an afterthought.

IEC 62443 provides the engineering vocabulary to move beyond that baseline. The Zone and Conduit model, the Security Level framework, the specific System Requirements of 62443-3-3 these are not abstract standards for auditors. They are the architectural decisions that would have kept an attacker confined to a single endpoint rather than free-ranging across a corporate network for five weeks.

For any electric utility conducting its post-incident retrospective of this breach, the most important question to ask is not "were we compliant?" It is: "if an attacker had domain admin credentials and 37 days in our network, what would they find?" If the honest answer resembles what happened in Nova Scotia, the time to act is now before the next SocGholish pop-up finds its target.


REFERENCES & FURTHER READING

•       Office of the Privacy Commissioner of Canada: Nova Scotia Power Compliance Letter (March 2026)- priv.gc.ca

•       The Cyber Express- Nova Scotia Power Data Breach Compromises Data of Over 900,000 Users (March 2026)- thecyberexpress.com

•       Industrial Cybersecurity: A Complete Guide for Critical Infrastructure Protection- shieldworkz.com

•       A Deep Dive into IEC 62443-3-3 Controls for OT Operators - shieldworkz.com

•       A Plant Head's Strategic Guide to IEC 62443 Vulnerability Management · shieldworkz.com

•       Top OT Cybersecurity Trends You Can't Ignore in 2025 · shieldworkz.com

•       ICS Cybersecurity: What's Next for the Next 5 Years · shieldworkz.com

•       Fundamentals of OT Security Training for OT Operators · shieldworkz.com

•       Building an OT Cybersecurity Program with IEC 62443 and NIST SP 800-82 · shieldworkz.com

•       CIP Standards CIP-002 through CIP-014 · nerc.com

•       IEC 62443-3-3: System Security Requirements and Security Levels · iec.ch

•       Guide to OT/ICS Security (September 2023) · nist.gov

 


Get Weekly

Resources & News

You may also like

BG image

Get Started Now

Scale your CPS security posture

Get in touch with our CPS security experts for a free consultation.

BG image

Get Started Now

Scale your CPS security posture

Get in touch with our CPS security experts for a free consultation.

BG image

Get Started Now

Scale your CPS security posture

Get in touch with our CPS security experts for a free consultation.