India’s leadership almost certainly aspires to build a modernised cyber programme with domestic cyber capabilities.India very likely uses its cyber programme to advance its national security imperatives, including espionage, counter-terrorism, and the country’s efforts to promote its global status and counter-narratives against India and the Indian government, the assessment report said.It further added that India’s cyber programme likely leverages commercial cyber vendors to enhance its operations. And aslo that Indian state-sponsored cyber threat actors likely conduct cyber threat activity against Government of Canada networks for the purpose of espionage.It claimed that official bilateral relations between Canada and India will very likely drive Indian state-sponsored cyber threat activity against Canada. CSE and its partners in Canada and across the Five Eyes are attuned to the cyber threats to Canada from state and nonstate cyber threat actors and are tracking them as they evolve, the report said.NCTA 2025-2026 provides the Canadian public with CSE’s current insights on the state and non-state cyber threat actors conducting malicious cyber threat activity against Canada and how we assess the cyber threat landscape will evolve in the next two years, it added.Canada is confronting an expanding and more complex state cyber ecosystem, the report said, and talked about strategic adversaries, emerging cyber programmes and a wider cyber ecosystem.In the ‘Emerging cyber programmes,’ it said: At the same time, countries that aspire to become new centres of power within the global system, such as India, are building cyber programmes that present varying levels of threat to Canada.While emerging states focus their cyber efforts on domestic threats and regional rivals, they also use their cyber capabilities to track and surveil activists and dissidents living abroad, it added.The NCTA 2025-2026 also mentioned geopolitical conflicts and tensions are inspiring disruptive cyber threat activity from non-state groups, commonly referred to as hacktivists and gave example of how geopolitically motivated hacktivists typically conduct attacks to gain attention, such as distributed denial-of-service (DDoS) attacks, website defacements, and data leaks from Russia and India.
Source link