How to Report a Cyber Breach in Your Country
Would you like to learn more?
Download our Pentest Sourcing Guide to learn everything you need to know to successfully plan, scope, and execute your penetration testing projects.
"Is it worth it to report a cyber breach?"
Cybercrime reporting is how law enforcement, national cyber agencies, and industry partners connect patterns, disrupt campaigns, and issue faster warnings. The key is knowing where to report based on country and incident type.
What to Do After a Cyber Breach
If there’s immediate danger or risk of harm, call emergency services in your area
If money or accounts are involved, contact your bank or payment provider immediately
Preserve evidence: don’t wipe machines or delete emails; instead, collect screenshots, headers, logs, timestamps, and transaction IDs
Report using the correct national channel
How to Report a Cyber Breach in Canada
For guidance on reporting cyber incidents: The Canadian Centre for Cyber Security
For reporting cybercrime and fraud: The RCMP and Canadian Anti-Fraud Centre reporting portal
For reporting fraud and scams: The Canadian Anti-Fraud Centre reporting options
Please note that, while the Canadian Centre for Cyber Security provides support, filing a report through its portal doesn’t automatically trigger a law enforcement investigation. Instead, use the listed bottommost options when filing a report.

How to Report a Cyber Breach in the United States
For reporting Internet-enabled crimes: The FBI’s Internet Crime Complaint Center (IC3)
For federal reporting guidance and pathways for ransomware incidents: CISA
For general federal direction on cybercrime reporting: DOJ guidance
Note: IC3 is a central collection hub for cyber-enabled crime reports. It's advised to use it even if you’ve also reported locally.

How to Report a Cyber Breach in the United Kingdom
For cybercrime affecting individuals and organizations: The Action Fraud National Reporting Centre
For directly reporting phishing: Forward suspicious emails to report@phishing.gov.uk; report scam texts via 7726
For cybercrime affecting organizations: Report incidents to the UK National Cyber Security Centre (NCSC) via its incident reporting channel
Although all Action Fraud reports are forwarded to the National Fraud Intelligence Bureau (NFIB) for assessment, please note that reporting doesn’t guarantee investigation. However, all reports help to build intelligence and case linkage.

How to Report a Cyber Breach in Australia
For general cybercrime reporting: Report via the official national portal "ReportCyber"
For cybercrime involving immediate harm or threat to life: Call 000 to report to ScamWatch (per the national guidance)
ReportCyber is run by the Australian Cyber Security Centre (ACSC) and is designed to route reports appropriately.

How to Report a Cyber Breach in New Zealand
For general cyber incidents: Report via the national portal
For online scams, fraud, and harassment: Report via the New Zealand Police online reporting pathway (Fraud/Scam/Cyber)
For scam help and guidance: Visit the Netsafe Scams Helpline
Please note that New Zealand government agencies are required to report incidents to NCSC (GCSB) and are encouraged to also report to CERT NZ.

What to Include in a Cyber Breach Report
The Timeline: Time of discovery; first suspicious activity; last known-good state
The "who/what": Impacted users, devices, systems, cloud tenants, and domains
The "how": Suspected entry point (phishing, exposed RDP/VPN, OAuth consent, misconfig, or stolen creds)
The indicators: Sender addresses, domains/URLs, IPs, filenames/hashes, ransom note text, wallet addresses
The impact: Data accessed/exfiltrated, encryption, downtime, financial loss, third parties involved
The evidence: Email headers, screenshots, logs (CloudTrail/Azure logs/GCP audit logs), EDR telemetry, or transaction IDs
Conclusion
Is it worth it to report a cyber breach?
Yes. Every time.
Each report helps law enforcement:
Make links between similar reports of cybercrime and fraud across Canada and internationally
Identify and prioritize reported threats and incidents for law enforcement purposes
Coordinate investigations and other law enforcement activities across jurisdictions
Contact Us
Speak with an Account Executive
Interested in Pentesting?

Penetration Testing Methodology
Our Penetration Security Testing methodology is derived from the SANS Pentest Methodology, the MITRE ATT&CK framework, and the NIST SP800-115 to uncover security gaps.
Download Methodology
Pentest Sourcing Guide
Download our Pentest Sourcing Guide to learn everything you need to know to successfully plan, scope, and execute your penetration testing projects.
Download GuideExplore in-depth resources from our ethical hackers to assist you and your team’s cyber-related decisions.

September 13 - Blog
Why Multi-Factor Authentication is Not Enough
Knowing is half the battle, and the use and abuse of common frameworks shed insight into what defenders need to do to build defense in depth.

November 19 - Blog
The Top Cybersecurity Statistics for 2024
The top cybersecurity statistics for 2024 can help inform your organization's security strategies for 2025 and beyond. Learn more today.

October 24 - Blog
Packetlabs at SecTor 2024
Packetlabs is thrilled to have been a part of SecTor 2024. Learn more about our top takeaway's from this year's Black Hat event.




