Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page127/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   123   124   125   126   127   128   129   130   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part IV
Page 147 of 425

447. Ernest has explained that even though the IP address range was not part of the SingHealth network, he did not think that this was a security incident because he had already taken action to impose firewall blocks for the IP address range, thus preventing any access to any of the SingHealth servers from this IP address range.
24.5 Discovering background processes being run on Citrix Server 2
448. Curious about what the SA. account was doing when logged into Citrix Server 2, Lum reviewed the system task-list and noticed some background processes being executed. However, he was unable to ascertain what scripts were being run.
Lum forwarded a screenshot of the task-list via email to Benjamin and the Citrix Team at pm on 26 June 2018.
24.6 Discovering the use of the DA. account to access Citrix Server 3
from Citrix Server 2 and that the system event logs for these
servers were deleted
449. On 26 June 2018, the Citrix Team reviewed the security event logs for
Citrix Server 2 and discovered that the DA. account was used to access the H-
Cloud Citrix Server 3 from Citrix Server 2. As explained in Part III above, it is probable that the attacker had stolen SCM database credentials from Citrix Server
3 at this time.
450. As mentioned above in section 20.1 (pg 116), the password for the DA. account had been changed on 11 June 2018. When contacted, the domain administrator confirmed that he had not logged into Citrix Servers 2 and 3 on 26 June On 26 June 2018, the domain administrator changed the passwords to the DA. account again.
451. The Citrix Team also discovered on 26 June 2018 that the Windows event logs for Citrix Servers 2 and 3 were deleted earlier that afternoon. This was further evidence of malicious activity.



COI Report – Part IV
Page 148 of 425

Download 5.91 Mb.

Share with your friends:
1   ...   123   124   125   126   127   128   129   130   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page