Cyber Security Today, Week in Review for Friday Dec. 9, 2022

Welcome to Cyber Security Today. This is the Week in Review edition for the week ending Friday, December 9th, 2022. From Toronto, I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com.



In a few minutes Terry Cutler of Cyology Labs will join me to discuss some recent news. But first a roundup of some of what happened in the last seven days:

A suspected Chinese-based threat actor was in the IT system of Amnesty International Canada for 17 months before being detected. Terry and I will discuss how hard it is for agencies that rely on donations to have proper cybersecurity.

We’ll also look at the ransomware attack on U.S. hosting provider Rackspace Technologies, and a report from Accenture on the increasing use of malware to get around multifactor authentication.

Google admitted that digital certificates used by some makers of Android handsets were stolen — in some cases years ago — and are being used to validate malicious Android apps. As soon as this was learned Google and the manufacturers took protective action. Google Play Protect can detect the malware if and when users log into the Play store. However, the stolen certificates won’t expire for years. How these digital keys were stolen hasn’t yet been explained.

The free Fosshost service for hosting open-source projects is closing. In an online statement founder Thomas Markey said the volunteer-run service expanded too far and too fast. He admitted to failing to lead the project through some difficult times. The company is helping move customers to new providers.

More data-wiping malware is increasingly being used by threat actors. Researchers at Kaspersky earlier this month said they found one pretending to be ransomware they call CryWiper. Separately, researchers at ESET said they found a new wiper they call Fantasy. Fantasy is an evolution of a previous wiper. Both are believed to have been created by an Iranian-aligned group called Agrius. Organizations victimized so far have been in Israel, South Africa and Hong Kong.

When cyber crooks aren’t busy stealing from consumers, companies and governments they’re stealing from each other. That’s according to researchers at Sophos. They told the Black Hat Europe conference this week that some people on criminal forums fail to deliver promised and paid-for malware, or provide malware with a backdoor the developer can use. And once in a while they blackmail each other. Among the lessons: Arbitration threads on criminal forums can be a valuable source of intelligence to security teams.

December means cybersecurity companies start issuing look-backs at significant events from the past year. One of them is NordPass, which issued its list of worst passwords for 2022. Worst because they’re the most commonly used and therefore most easily guessed by hackers. Once again the leader is the word ‘password.’ Others in the top 10 are 123456, guest, qwerty and 1111111. These would be among the first tried by hackers. If they try to break them, these would only take one second to crumble before today’s computers. Please make your passwords are complex, use a password manager and enable multifactor authentication on any site that offers it.

(The following transcript has been edited for clarity)

Howard: Back with us again from Montreal is Terry Cutler. Good afternoon. We’ll start with the admission by the Canadian branch of Amnesty International that it was hacked by a suspected Chinese-backed group.

Amnesty International, which has 80 offices around the world, is a large human rights nonprofit headquarter in England. It’s Canadian branch is smaller. While the agency wouldn’t tell me how big the Canadian IT department is, we can assume it isn’t large. And like any organization that depends on donations it wouldn’t have a lot of money for cybersecurity. Human rights groups around the world are targets of certain governments who don’t like their advocacy. And among the countries that Amnesty Canada speaks out about is China. So it isn’t uprising that the company that did the forensic audit of the attack concluded it’s likely the threat actor came from China.

What struck me is that the attacker was in Amnesty Canada’s environment for 17 months before being detected.

Terry Cutler: A lot of people don’t realize that the average time that an attacker in your IT system is 286, so 17 months is a problem. Obviously Amnesty Canada didn’t have enough insider threat detection or a response plan to get the hacker out. But the fact that the attacker was in there for 17 months means that he probably made a mistake and set off an alarm. Clearly they [Amnesty Canada] need to look at more of a holistic approach where they’ll have a good look at their IT network, their endpoints and their cloud together. NGOs often work with outsourced IT groups, and the IT guys often say, ‘We’ve got you covered.’ But the IT guys are like your family doctor: You’re not going to ask them to perform laser eye surgery on you. That’s where a cybersecurity group is going to complement them. But as you know, cyber security experts are very expensive. So a lot of times firms don’t have the budget for them. Also, the management and in these organizations feel they don’t have a lot of sensitive information — even though they do — so one’s going to want to hack us. So they protect their IT networks like they protect their home with antivirus and a firewall. They just don’t have enough detection in place. Cybercriminals know this. That’s why they hack into a not-for-profit group and use them as a jump point to attack another company.

You know, had they [Amnesty Canada] done a simple audit they would have seen things like user accounts that still might be active in the IT system that haven’t signed in months or years, or poor patch management, or terrible passwords. They might even see weird logins coming in from unexpected locations or times of the day.

Howard: Amnesty Canada told me the reason they detected this attack was this past summer they started overhauling their IT system and installing some new things. That’s when ah they were able to discover evidence of this attack.

Terry: And that’s the problem: They just have to do the best with what they had at the time. Usually when you install a patch or set up some new security is when the attacker is going to be blocked.

Howard: I was told that there were no data exfiltration tools found in the Amnesty Canada IT system. Can we logically conclude for sure that no data was copied?

Terry: I don’t believe so, because if they just were starting to overhaul their systems there’s a good chance that they didn’t have enough event logs, so they probably would not have known that the attackers were exfiltrating data. Not only that, if the IT guys were receiving a ton of alerts a lot of times they may get alert fatigue. So a lot of times these logs or or event information is not monitored.

Howard: One thing that occurred to me is that the attack was aimed at the Canadian branch as a way to learn what Amnesty’s headquarters is doing. So just by monitoring email or documents the attacker could learn a lot. In other words, it’s like a supply chain attack, only in this case there’s no evidence the IT system of Amnesty’s headquarters was penetrated.

Terry: When we work with not-for-profits they usually have one I guy assigned to the company — and, again he’s an IT guy, not a cyber expert. They often think they just need an antivirus and a firewall and they’re done. Here’s where you should start looking at awareness training for employees because there are so many ways to get into a company: Through leaked passwords on the dark web, the lack of multifactor authentication. Employees need to learn how to spot a phishing email, what not to click on and the dangers of mishandling their information.

Howard: Amnesty Canada said that one of the reasons it went public about this attack is to warn other nonprofits about the importance of cybersecurity. Have you dealt with nonprofits and if so what is their level of security maturity?

Terry: Actually, we have them as clients. Before we brought them into a more holistic monitoring system they were dealing with a ton of problems like tight budgets, shortage of staff, IT guys saying, ‘We got you covered,’ and they deploy EDR (endpoint detection and response). But the thing is, EDR is not going to cover you holistically. There were attacks coming in from the cloud, there was password stuffing of their user accounts on Office 365 — EDR is not going to see that. There were some IoT devices that were infected and beaconing out through their network. Again, EDR is not going to find that. So you need to look at a more holistic solution — on a budget. There are a lot of problems [in nonprofits] but experts are needed to weed out the most common threats.

Howard: The second item we’re going to look at is the ransomware attack on American cloud hosting provider Rackspace. Rackspace cells a number of services including hosted Microsoft Exchange for organizations. Last week that service was knocked offline. We don’t know how the Exchange service was compromised, nor did Rackspace know at the time that we recorded this podcast whether any customer emails or data was copied. Rackspace is helping customers move to the cloud-based Microsoft 365 so their email can continue. But this wasn’t the only recent ransomware attack: A hospital outside of Paris had to shut its IT and phone systems after a ransomware attack over the weekend. Six patients had to be transferred to other hospitals. Terry, we talk a lot about ransomware. What more can you say after another successful ransomware attack?

Terry: We can clearly see that ransomware is not going away. We need better preparation for it, more holistic monitoring [of IT networks]. I keep hammering on this, but it’s true. There’s so many attack vectors that to worry about. And because most companies are short-staffed they need to start looking at partnering with a cybersecurity firm or hire more IT staff. That’s going to put a lot of defenses in place. But, again, will your IT guy be watching your system at 2 a.m. on a Saturday morning? You have to start looking at outsourcing partners. Now, a lot of times they’ll say you need to deploy EDR everywhere. But let me tell you what happened at a company that we dealt with that had EDR everywhere. They got hit with a ransomware attack and it stayed in their system. When you get with ransomware several steps have to happen: You have to disconnect from the internet and rebuild your entire network from scratch. We did that and migrated data from the old network to the new one. And they got ransomed again. So we rebuilt the network again and activated the bridge between the two networks, and got ransomed again. We found out on the third try that the machine that was doing the data migration didn’t have EDR on it. So it still had the ransomware. The other machines with ERD didn’t stop the ransomware attack because it didn’t execute from the box had EDR protection. So you need to make sure that EDR is deployed properly everywhere — and network monitoring as well.

Howard: Just for those who don’t know, EDR is a step up from antivirus EDR is short for endpoint detection and response. Can you give us a little synopsis of EDR technology?

Terry: Traditional antivirus is signature-based. meaning when a virus comes through it recognizes the virus signature and blocks it. But it also has to update its database every couple of hours to state current. EDR detects what’s abnormal [network behavior] and cut off the process.

Howard: One of the things that that one might take away from the Rackspace incident is IT departments shouldn’t recommend hosted third-party applications if the organization goes to the cloud. They should only subscribe to cloud applications that are offered by the original application maker. Is that a good conclusion?

Terry: I used to work for a software vendor called Novell. A third party wanted to host Novel services, versus our engineers were monitoring IT and updating the platform. So my biased approach is, yes, you should be working directly with the application maker. I’ll tell you a real story that happened last year, also, coincidentally, with a not-for-profit. They were using a hosted Office 365 with another hosting provider. It got hacked. The attacker was able to access all of their emails. The attacker also found a bank change form. They found out who the nonprofit’s funding provider, was and they [the attackers] started communicating with the funding agency, creating fake emails to look make it look like a conversation. They said, ‘We’ve been having problems with our Canadian account. Can you please use this form, change the bank information and wire the money to Hong Kong?’ And the financing company accepted it. That’s how the organization lost half a million dollars.

Howard: Ransomware is a problem, and I think not merely ransomware but any malware, if you don’t have end-to-end encryption of all your data. Then a determined hacker will get at it and you’re going to lose at least some of your data. So the best you can do is to limit the amount of data that an attacker can access — or am I wrong on that?

Terry: You’re absolutely right. But the problem is it could be very, very expensive to secure your environment and there’s still no guarantee [you won’t be hacked]. So the goal is to make it as hard as possible for an attacker to get in. Which is why security audits are important. It will show who may have too much data access or if a problem happened with this account. We see often where in small firms or not-for-profits everybody’s trustworthy, everybody gets administrator access. That’s horrible. That means if anybody gets hacked it’ll affect the entire company. You need to limit data access to only those who need it.

Howard: The final news item we’re going to look at is a report from Accenture on a type of malware called an information stealer. This malware goes after victim information like passwords, usernames, cookies and such stored in browsers or email clients, messaging platforms or cryptocurrency wallets. They may also steal logs from multifactor authentication apps. Why? Because employees are increasingly using multifactor authentication to protect their login credentials. So threat actors want this personal information to defeat MFA. One way is by bombarding the smartphones of target individuals with multifactor authentication requests. If the victim gives in and presses OK, under the right conditions the attacker gets control over the smartphone. With a crook authenticated they can launch deeper attacks into an IT environment. Common information stealers that IT departments should be looking out for are called Red Line, Raccoon, Vadar and Taurus. Terry are IT and security teams meeting the challenge of this type of malware?

Terry: It’s very, very difficult. These come in often from phishing attacks. We use the same tactics in a penetration test — we’ll send a phishing email to an employee and if he clicks on it and he has enough access on his computer we can become an insider threat. I could turn on his video camera, turn on the microphone, and extract the passwords from his browser. Or we can even do a pass-the-hash attack where we can log in as a person without ever knowing the password. The key here is really around employee awareness training, especially around MFA. fatigue. This is where you receive repeated messages on your phone asking if you logged in from Montreal. A victim clicks yes, and boom, the attacker is in. This is where IT departments need to start looking at authentication-based apps [instead of receiving SMS confirmation texts] where the user has to type in a password. Awareness training is going to be key.

Howard: The thing is threat actors can buy monthly access to information stealers or they can buy a lifetime licence — and it’s cheap. One information stealer can be had for US$150 a month or US$1,000 for a permanent license.

Terry: We’re also seeing there’s been more leakage of [victim’s stolen] logs on the dark web, which has the information of users and their passwords. This really comes down to awareness training. Also, [IT and security teams] should look at dark web monitoring for their companies. There are services that do it and give an alert the moment an employee’s password has leaked.

Howard: The report notes that in October the U.S. arrested a major player behind the Raccoon stealer and allegedly dismantled the malware’s IT infrastructure. However, someone claimed on an exploit forum that the project is still running.

Terry: We’ve talked about this in various podcasts before that groups are coming and going. But the background players are all usually the same.

Howard: What more should IT and security teams be doing to blunt the threat of information stealers?

Terry: Again, I think dark web monitoring is going to be key to help with some automation. IT also needs to need to start looking at how they set up their MFA authentication mechanisms. Use an authentication-based app instead of push notifications, includes biometrics [for logins] and also look at awareness training especially, around MFA fatigue and social engineering attacks. Users users need to understand how to spot email problems in the ‘From’ address, or it’s addressed to ‘Dear customer,’ and how to hover over a link to show the real domain it goes to. It’s hard to encourage users to learn about these things to protect themselves online … but we need to really keep hammering home on this.

The post Cyber Security Today, Week in Review for Friday Dec. 9, 2022 first appeared on IT World Canada.

Can technology advances bring manufacturing jobs back to North America? Hashtag Trending Weekend Edition. An interview with Eric Whitley, L2L

Can advances in technology bring manufacturing jobs back to North America?

For years we’ve made manufacturing cheaper by moving it overseas to lower wage economies. That’s had some devastating impacts on our manufacturing economy. It’s decimated communities and towns. It’s been an environmental problem as we ship goods thousands of miles unnecessarily.

In a world where it’s cheaper to cut down a tree, ship the raw wood overseas and bring back chopsticks to be used in a restaurant in a town near you, something’s radically wrong!

But what if technology and the advent of what’s been termed Manufacturing 4.0 can actually bring high paying manufacturing jobs back to North America. Is that possible?

In this episode we discuss this and more with Eric Whitley of L2L. Eric has worked in manufacturing for his entire career.

Whitley was part of the Lean Manufacturing movement, ironically a movement founded on the work of an American, but which was adopted widely in Japan. Lean, adapted as “the Toyota Way” made Toyota the largest auto manufacturer in the world. This success inspired a new wave of Lean Manufacturing in North America, saving much of what was left of manufacturing on this continent.

In the past years, Whitley had been working on intelligent manufacturing systems and what has been termed Manufacturing 4.0 – the “digital transformation” of manufacturing.

There’s been a lot written on Manufacturing 4.0. If you’ve seen or heard some of this and want to know what’s really happening, this discussion with Whitley gives us a first hand look from a “sleeves rolled up” expert.

The post Can technology advances bring manufacturing jobs back to North America? Hashtag Trending Weekend Edition. An interview with Eric Whitley, L2L first appeared on IT World Canada.

The Best Managed IT Services in Toronto

Regardless of your company’s size or the number of employees, there are a number of managed IT services in Toronto to choose from. These services are designed to keep your IT infrastructure running smoothly. These companies will provide you with a wide range of support, from helping you get started to monitoring and maintaining your network.

Technical Action Group (TAG)

Founded in 2003, Technical Action Group has been providing IT Services to small and medium businesses in the Toronto area. With more than 10 years of experience, MBC delivers quality and consistent IT Services to clients.

Technical Action Group’s core competencies include a broad array of IT infrastructure and network deployment services. Their clientele includes several IIROC member firms, as well as a large number of clients in the Financial Services sector.

Technical Action Group’s clients range in size from 25 to over 100 employees. Most of their clients have transitioned to Managed Services, which is an important part of their business model. These clients also operate in a variety of verticals.

Technical Action Group has developed a reputation for delivering IT services that are secure, modern, and simple. The company is able to help clients stay within their IT budgets and end downtime.

Technical Action Group’s founder, Joe Stoll, began his career as an independent technical support consultant in 1999. During his years as a consultant, Joe discovered that many small and medium-sized businesses were dissatisfied with the support services available in the marketplace. These businesses relied heavily on their technology to conduct their day to day operations, but were often frustrated with the unreliability of their technical infrastructure or the lack of understanding demonstrated by their support provider surrounding their unique business requirement

Technical Action Group portfolio of Managed IT Services is unique in the city of Toronto. The company offers a range of services, including Cloud Solutions, Disaster Recovery, and networking. These services allow customers to focus on their business and let Technical Action Group handle their corporate technology needs.

Tektonic

Tektonic is the premier IT support provider in the GTA. Their top of the line solutions include cloud and data center management, IT consulting, and IT outsourcing. The company offers the latest in cloud computing technology to ensure a reliable, scalable and secure network. They also offer a 15 minute no obligation consultation. They also don’t charge for travel and accommodation costs. The company can help you tackle the biggest IT challenge, so you can concentrate on running your business.

Their cloud based solution means you’ll never have to worry about downtime again. Unlike other providers, they don’t need to be on site to handle your IT needs. Whether you’re running a small or large enterprise, Tektonic can provide the solution. Aside from their stellar customer service, you’ll get the peace of mind of knowing that your network will be a constant source of stability. This is important when it comes to your employees and their productivity. With their award winning cloud and data center solutions, you can focus on the bigger picture while they take care of the details.

The best part is, you can get started with a free consultation today. Tektonic will show you what to look for in a good managed IT service provider and answer all of your questions.

Cygnik Tech

Cygnik Tech is one of the best IT service providers in Toronto, Canada. This company is a well-established name and has been serving the Greater Toronto Area (GTA) for more than two decades. The firm offers day to day technology support for its employees as well as co-location services. The team is ready to tackle any and all of your IT needs.

For the most part, Tektonic’s offerings are geared towards enterprise level clients. Their solutions include network, database and application administration, as well as back-end development for marketing agencies. They also have the knowledge to keep your business running at peak performance. The best part is that they offer 15-minute no obligation consultations.

They are the best IT managed services provider in Toronto, and their business model is designed to meet your every need. The IT staff at Cygnik Tech are highly-skilled and incredibly knowledgeable. Aside from being able to meet the demands of a busy organization, they are also experts in cloud adoption technology. They can help your organization implement the latest and greatest cloud technologies to boost productivity and increase profitability.

While Cygnik Tech is new to the scene, they have already figured out the most effective and innovative ways to improve their client’s business. Their business model is centered around the premise of empowering organizations through digital transformation. Their motto is to provide quality solutions to their clients, while at the same time, ensuring that they get the most for their dollar.

Evolvous

Choosing the right IT provider can make or break your business. Having a trusted partner in place will ensure your technology needs are covered, allowing you to focus on more important matters. Managed IT services can reduce the stress on your staff while ensuring your business is protected from the worst of the worst. Evolvous offers a flexible service model to meet your specific needs.

Evolvous’s offerings are not limited to the cloud; they also offer managed solutions for your desktop and mobile devices, ensuring the best possible performance and security. This includes the latest in mobile security, encryption, and data backup. Whether you need a new laptop or a more robust network, Evolvous can design, install, and support the best technology for your business.

Evolvous’s best of breed approach provides the most comprehensive IT solution. This means you get all the benefits of a boutique IT company without the hassle. The best part is you pay a flat rate for the entire package. The cost to run your network, install new equipment, and perform other maintenance tasks is minimal. The cost to run your network is reduced to a fraction of what you would pay in hire and training costs.

Softchoice

Founded in 1989, Softchoice is one of the leading IT solution providers in North America. Softchoice enables organizations to realize the full potential of modern IT infrastructure, from security to cloud services. It is a top-tier partner to over 2,500 technology manufacturers. Its comprehensive solutions offering includes networking, unified communications, vision consult, implementation services, and end-user productivity.

Softchoice has built a strong reputation for its ability to deliver on promises. Since its founding, the company has received numerous awards and accolades. For example, in 2016, Softchoice was named by Microsoft as an IMPACT Award winner for Enterprise Cloud Productivity Innovation. In addition, Softchoice has received the Google Cloud Managed Services Provider designation, which is awarded to companies that meet a stringent set of criteria.

With an emphasis on customer service in the technology industry, Softchoice provides a broad range of innovative cloud and converged infrastructure solutions. Its cloud services include a range of tools to maximize the use of your existing IT infrastructure, as well as expert technical support.

Softchoice is a member of the AWS Partner Network (APN), which is an ecosystem of more than 2,400 partners and systems integrators that offer cloud computing services. In addition, Softchoice has a strategic collaboration agreement with AWS.

SourceMash Technologies

Founded in 2009, SourceMash Technologies is a business agency in Mohali, India specializing in CRM consulting solutions, digital strategy, and e-commerce development. Its top notch tech support is a real steal and its client list reads like a who’s who of the Toronto tech scene.

The company has the enviable honor of being a member of the CloudSecure Tech family of exemplary managed IT service providers. The team works with some of the best in class providers in the business and guarantees custom built, on-demand managed services in Toronto. They also take a holistic approach to the entire IT lifecycle, from the cloud to the data center.

The aforementioned best-in-class custom managed service packages are available in the form of IT staff augmentation, managed IT security, and cloud-based backup and disaster recovery. As an added bonus, the company doesn’t charge for travel, accommodation, or any other expenses incurred by the technicians.

The company is the best-in-class in the IT managed services space and has an impressive track record of implementing the most complex technology and systems. Its clients include major financial institutions, insurance companies, and global e-commerce giants. The company has also carved out a niche for itself as a provider of IT and cloud consulting services for mid-sized businesses, startups, and government entities.

Logos IT Solutions Inc

Located in Markham, Ontario, Logos IT Solutions provides a variety of IT services. They are a Tier 2 solution provider for managed data storage. They provide scalable performance tiers and storage pricing options. They also offer a unified communications consulting service. Their VoIP services are easy to use and include voice messages assist, automated attendants, and multiple employee extensions. They can make business communication quick and convenient from almost anywhere.

They also specialize in data management, tech strategies, energy, government, and manufacturing. They offer help desk support, operational support, and more. They work with companies of all sizes. They are certified IT managed services providers. They also have offices in Toronto, Canada, and West Hollywood, California. They are a member of the Herjavec Group. Their service areas include cybersecurity, cloud consulting, and SI. They also have an office in Reading, United Kingdom. They serve mid-market companies in a variety of industries.

Genieall is another great company that offers a range of IT services. They provide operational and help desk support for small businesses. They have a team that works with clients from all over the world. They offer technology solutions, including ERP consulting, cloud consulting, and SI. They provide help desk support, web development, and email services.

This week in Canadian telecom: CRTC rejects Telus’ credit card processing fee [Dec. 3-9]

Here’s almost everything that happened in Canada’s telecom sector this week.

Business

5G could contribute up to $120 billion to Canada’s GDP by 2036, according to a report from Deetken Insight. Commissioned by Telus, the report found the performance upgrades of 5G over 4G will lead to economic growth and improved quality of life.

The Canadian Radio-television and Telecommunications Commission (CRTC) has rejected Telus’ request to charge customers paying bills with credit cards a processing fee. However, the ruling only applies to services regulated by the CRTC, mostly consisting of home phone services in smaller communities.

Government

Canada is among a group of government bodies to enter an agreement to collaborate on telecom supplier diversity. Along with the U.K., U.S., and Australia, Canada has outlined six initiatives they say will help them achieve their goal.

Deals

TekSavvy is offering customers a $10 monthly discount when they refer a friend. Details are available here.

Some Koodo customers can add 25GB of additional data to their plan for $25/month. The Telus flanker brand sent some customers the offer by text, and a direct response is needed to redeem. More information is available here.

Streaming in Canada on Amazon Prime Video, Apple TV+, Crave, Disney+ and Netflix [Dec. 5-11]

Every week, MobileSyrup outlines some of the most notable movies and TV shows that recently hit Canadian streaming platforms.

Our ‘Streaming in Canada’ column typically focuses on new content from Amazon Prime Video, Crave and Netflix, but other services like Apple TV+ and Disney+ are mentioned when relevant. Premium video on demand (PVOD) platforms are also fair game as movies continue to come to digital early amid the COVID-19 pandemic.

Finally, we’ll highlight shows or movies that are made by Canadian companies, involve notable Canadian cast or crew and/or are filmed in Canada.

Apple TV+

Emancipation

This drama is based on the true story of “Peter,” an African-American who escaped slavery in the 1860s and helped inspire the abolitionist movement.

Emancipation was directed by Antoine Fuqua (Training Day) and stars Will Smith (Ali), Ben Foster (Hell or High Water), Charmaine Bingwa (The Good Fight) and Steven Ogg (the video game Grand Theft Auto V).

Apple TV+ Canada release date: December 9th, 2022
Genre: Historical action
Runtime: 2 hours, 12 minutes

Stream Emancipation here.

Little America (Season 2)

This anthology series is inspired by the stories of immigrants in America, and this season features episodes focused on a Belizian family worker in New York, a Korean man making hats for a Black church community Detroit and a Japanese woman in Columbus, Ohio, among others.

Little America hails from Kumail Nanjiani and Emily V. Gordon (The Big Sick) and Lee Eisenberg (The Office).

Apple TV+ Canada release date: December 9th, 2022
Genre: Anthology
Runtime: Eight episodes (around 30 minutes each)

Stream Little America here.

An Apple TV+ subscription costs $8.99/month in Canada.

Amazon Prime Video

Something From Tiffany’s

After receiving someone else’s engagement ring, a woman is led towards the person she’s meant to be with.

Something From Tiffany’s was directed by Daryl Wein (How It Ends) and stars Zoey Deutch (The Politician), Kendrick Sampson (How To Get Away With Murder), Ray Nicholson (Panic) and Mississauga, Ontario’s Shay Mitchell (Pretty Little Liars).

Amazon Prime Video Canada release date: December 9th, 2022
Genre: Romantic comedy
Runtime: 1 hour, 27 minutes

Stream Something From Tiffany’s here.

An Amazon Prime Video subscription is included at no additional cost with an Amazon Prime membership, which costs $99/year.

The full list of movies and shows hitting Amazon Prime Video Canada can be found here.

Crave

Doom Patrol (Season 4A)

https://www.youtube.com/watch?v=u3ZTtn9NbHk

The team travels to the future to find an unwelcome surprise.

Based on the DC Comics superhero team of the same name, Doom Patrol was created by Jeremy Carver (Supernatural) and stars Diane Guerrero (Orange is the New Black), April Bowlby (Two and a Half Men), Joivan Wade (EastEnders), Matt Bomer (Magic Mike), American-Canadian Brendan Fraser (The Mummy) and Timothy Dalton (License to Kill).

Crave release date: December 9th, 2022 at 9pm ET (first two episodes, new episodes every Friday)
Genre: Superhero
Runtime: Six episodes (around an hour each)

Stream Doom Patrol here.

His Dark Materials (Season 3)

In this third and final season, Lyra and Will must journey to a dark place from which no one has ever returned.

The series was adapted for the screen by Jack Thorne (Harry Potter and the Cursed Child) and stars Dafne Keen (Logan), Ruth Wilson (The Affair), Amir Wilson (The Letter For the King) and James McAvoy (X-Men franchise).

Crave release date: December 5th, 2022 (first two episodes, new episodes every Monday at 9pm ET)
Genre: Fantasy
Runtime: Eight episodes (around an hour each)

Stream His Dark Materials here.

standard Crave subscription is priced at $19.99/month, with Starz costing an additional $5.99/month. A mobile-only subscription is also available for $9.99/month.

The full list of movies and shows hitting Crave this month can be found here.

Disney+

Night at the Museum: Kahmunrah Rises Again

This sequel to the Night at the Museum trilogy from Montreal’s Shawn Levy follows Nick Daley, son of Larry, as he becomes the new Night Guard at the Museum of Natural History and faces one of his dad’s old foes.

Night at the Museum: Kahmunrah Rises Again was directed by Matt Danner (The Looney Tunes Show) and features the voices of Joshua Bassett (High School Musical: The Series), Jamie Demetriou (Fleabag), Alice Isaaz (The Gilded Cage) and Gillian Jacobs (Community).

It’s worth noting that Vancouver’s Atomic Cartoons (The Lego Star Wars Holiday Special) animated the film.

Disney+ Canada release date: December 9th, 2022
Genre: Animated
Runtime: 1 hour, 17 minutes

Stream Night at the Museum: Kahmunrah Rises Again here.

A Disney+ subscription costs $11.99/month or $119.99 here.

The full list of movies and shows hitting Disney+ Canada this month can be found here.

Netflix

Dragon Age: Absolution

A group of misfits must band together to steal an artifact from a sinister mage.

Based on BioWare Edmonton’s Dragon Age video game series, Dragon Age: Absolution was developer Mairghread Scott (Marvel’s Guardians of the Galaxy) and features the voices of Ashly Burch (Mythic Quest), Kimberly Brooks (Mass Effect), Matthew Mercer (Critical Role), Josh Keaton (Spectacular Spider-Man) and Phil LaMarr (Justice League).

Netflix Canada release date: December 9th, 2022
Genre: Animated
Runtime: Six episodes (around 30 minutes each)

Stream Dragon Age: Absolution here.

Emily the Criminal

Looking to pay off significant debt, a young woman becomes deeply involved in increasingly risky credit card scams.

Emily the Criminal was written and directed by John Patton Ford (feature directorial debut) and stars Aubrey Plaza (Parks & Recreation), Theo Rossi (Sons of Anarchy), Megalyn Echikunwoke (Night School) and Gina Gershon (Riverdale).

Original theatrical release date: August 12th, 2022
Netflix Canada release date:
December 7th, 2022
Genre: Crime thriller
Runtime: 1 hour, 33 minutes

Stream Emily the Criminal here.

Guillermo Del Toro’s Pinocchio

Oscar-winning writer-director Guillermo Del Toro (The Shape of Water) offers his own unique stop-motion take on the classic Pinocchio tale.

The film features the voices of Ewan McGregor (Star Wars franchise), David Bradley (Game of Thrones), Christoph Waltz (Inglorious Basterds), Tilda Swinton (Michael Clayton) and Vancouver’s Finn Wolfhard (Stranger Things).

Netflix Canada release date: December 9th, 2022
Genre: Animated musical fantasy
Runtime: 1 hour, 54 minutes

Stream Guillermo Del Toro’s Pinocchio here.

‘Basic with Ads’ subscription costs $5.99/month, ‘Basic’ Netflix subscription costs $9.99/month, a ‘Standard’ subscription (HD-supported) costs $16.49/month and a ‘Premium’ membership is priced at $20.99/month (4K-supported).

The full list of movies and shows that hitting Netflix Canada this month can be found here.

What are you planning on streaming this week? Let us know in the comments.

For more suggestions, check out last week’s Streaming in Canada column.

Image credit: Netflix