Cyberattaques renforcées par l'IA contre les infrastructures essentielles du Canada
L'agence de renseignement électronique du Canada évalue que l'IA « rehausse presque certainement » les cyberattaques contre des cibles canadiennes. Les infrastructures essentielles canadiennes ont déjà été compromises par des hacktivistes atteignant des systèmes de contrôle industriel critiques.
Canada's signals intelligence agency assesses that AI is "almost certainly enhancing the quality, scale, and precision of malicious cyber threat activity" against Canadian targets. This assessment, from CSE's National Cyber Threat Assessment 2025-2026, identifies AI as one of five structural trends shaping Canada's cyber threat environment.
The threat is already materializing at the capability level. State-associated attackers from Russia, China, Iran, and North Korea are actively using AI in their operations — for reconnaissance, vulnerability research, social engineering content generation, malware development, and exfiltration processing. Microsoft's threat intelligence reports that threat actors use AI to "automate 80-90% of certain intrusion workflows." In the DARPA AI Cyber Challenge finals (August 2025), an AI agent autonomously identified 77% of vulnerabilities in real software, placing in the top 5% of 400+ mostly human teams. The NCSC UK assesses that AI will "almost certainly continue to make elements of cyber intrusion operations more effective and efficient" and that the time between vulnerability disclosure and exploitation — already shrinking — will decrease further.
Canadian critical infrastructure is actively under attack. In 2024-2025, CSE responded to 2,561 cyber incidents: 1,155 against federal institutions and 1,406 against critical infrastructure partners. In October 2025, pro-Russian hacktivists breached Canadian critical infrastructure facilities — tampering with pressure valves at a water treatment facility, manipulating an automated tank gauge at an oil and gas company, and exploiting controls at a grain drying silo. CSE's Ransomware Threat Outlook 2025-2027 identifies ransomware as the top cybercrime threat to Canadian critical infrastructure and states that AI makes ransomware operations "cheaper and faster to conduct and harder to detect." In 2024, CCCS issued 336 pre-ransomware notifications to over 300 Canadian organizations.
The structural condition is an asymmetry between offence and defence. AI lowers the skill floor for attackers — tools that previously required nation-state capabilities are becoming accessible to criminal groups and hacktivists. Meanwhile, defensive adaptation requires institutional change, procurement, and training that moves at bureaucratic speed. Canada's critical infrastructure includes legacy operational technology (OT) systems in water treatment, power generation, transportation, and healthcare that were designed before cybersecurity was a primary concern. The October 2025 ICS attacks succeeded through basic methods — default credentials and exposed devices — demonstrating that even Canada's safety-critical systems have not addressed known vulnerabilities.
Defensive applications of AI are also advancing. CSE and CCCS are developing AI-augmented cyber defence tools, and major cybersecurity vendors offer AI-powered threat detection. The same AI capabilities that enhance offensive operations can strengthen defensive monitoring, anomaly detection, and incident response. The net effect on the offence-defence balance remains contested among cybersecurity researchers.
Préjudices
Le CST évalue que l'IA « améliore presque certainement la qualité, l'échelle et la précision des cyberactivités malveillantes » contre des cibles canadiennes. Des attaquants étatiques de Russie, Chine, Iran et Corée du Nord utilisent activement l'IA pour la reconnaissance, la recherche de vulnérabilités et la génération de contenu d'ingénierie sociale.
L'IA réduit les coûts et les compétences requises pour les cyberattaques, rendant des outils d'attaque auparavant réservés aux États accessibles aux groupes criminels. Les défenses des infrastructures essentielles canadiennes s'adaptent lentement par rapport aux capacités d'attaque accélérées par l'IA.
Preuves
8 rapports
- National Cyber Threat Assessment 2025-2026 Source principale
AI almost certainly enhancing cyber threat activity against Canada
-
Hacktivists breached Canadian water, oil/gas, and agriculture ICS facilities
- Ransomware Threat Outlook 2025-2027 Source principale
AI makes ransomware cheaper, faster, and harder to detect; ransomware is top cybercrime threat to Canadian CI
-
AI will almost certainly continue to make cyber intrusion operations more effective
-
2,561 cyber incidents responded to in 2024-2025
-
AI agent autonomously identified 77% of vulnerabilities in real software
-
AI can help enable cyberattacks by identifying vulnerabilities and writing exploit code; criminal and state actors actively using AI
-
Threat actors use AI to automate 80-90% of certain intrusion workflows
Détails de la fiche
Recommandations de politiqueévalué
Strengthen OT security standards for critical infrastructure with mandatory compliance and regular auditing
Canadian Centre for Cyber Security (30 oct. 2025)Invest in AI-augmented defensive cyber tools available to Canadian CI operators
International AI Safety Report 2026Rendre obligatoire le signalement des cyberincidents et le partage des vulnérabilités liées à l'IA pour les opérateurs d'infrastructures essentielles, avec des délais de signalement réduits pour les attaques améliorées par l'IA
Communications Security Establishment, National Cyber Threat Assessment 2025-2026 (30 oct. 2024)Évaluation éditoriale évalué
L'IA modifie l'équilibre attaque-défense en cybersécurité. Le Canada a répondu à 2 561 incidents cybernétiques en 2024-2025, et des hacktivistes ont compromis des systèmes ICS critiques dans des installations canadiennes d'eau et d'énergie en octobre 2025. Alors que l'IA abaisse le seuil de compétences des attaquants, les infrastructures essentielles héritées du Canada font face à une vulnérabilité croissante.
Entités impliquées
Fiches connexes
Taxonomieévalué
Historique des modifications
| Version | Date | Modification |
|---|---|---|
| v1 | 10 mars 2026 | Initial publication |