Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page175/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   171   172   173   174   175   176   177   178   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part V
Page 208 of 425

going around that spoofed the SingHealth SMS ID, and contained links that directed citizens to fake websites designed to collect their personal data. The second advisory was updated on 23 July 2018 to inform the public that fake
SingHealth text messages leading to phishing sites were being circulated. The updated advisory contained an infographic on precautionary measures for easy reference, and also reminded members of the public to visit the SingHealth website by keying the web address directly into their browser’s address bar.
662. MCI also developed an infographic for the precautionary measures advisory so that members of the public could easily absorb the information. This was published with the updated advisory on 23 July 2018.
34.5 Requesting IMDA to issue blocking order on IOCs
663. CSA sent a request to IMDA on 21 July 2018 for the ISPs to block the domain and IP addresses of the IOCs that had been discovered. The ISPs confirmed that the domain and IP addresses were blocked, as directed by IMDA, on 28 July 2018. This effectively blocked any communications made by the attacker, through local ISP networks, with the C servers.



COI Report – Part VI
Page 209 of 425

Part VI – Key Findings of the Committee on
TORs #1 and #2
664. The Committee’s findings in respect of TORs #1 and #2 have been set out in Parts III, IV, and V of this Report. From these findings, the Committee has identified five Key Findings.
Key Finding #1: IHiS staff did not have adequate levels of cybersecurity
awareness, training, and resources to appreciate the security implications
of their findings and to respond effectively to the attack

A number of IHiS’ IT administrators are commended by the Committee for their vigilance in noticing suspicious activity, such as unauthorised logins to the Citrix servers, suspicious attempts at logging into the SCM database, presence of unauthorised software, and suspicious queries being run on the SCM database. However, these same IT administrators could not fully appreciate the security implications of their findings, and were unable to co-relate these findings with the tactics, techniques, and procedures (“TTPs”) of an advanced cyber attacker. They were also not familiar with the relevant IT security policy documents and the need to escalate the matter to CSA. There was also no incident reporting framework in place for the IT administrators. Members of the Security Management Department, Computer Emergency Response Team, and senior members of IHiS’ management were similarly unable to fully appreciate the security implications of the findings.



Download 5.91 Mb.

Share with your friends:
1   ...   171   172   173   174   175   176   177   178   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page