Table of contents exchange of letters with the minister executive summary


Network security must be enhanced to disrupt the Command



Download 5.91 Mb.
View original pdf
Page217/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   213   214   215   216   217   218   219   220   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019
37.4 Network security must be enhanced to disrupt the Command
and Control and Actions on Objective phases of the Cyber Kill
Chain
752. The SANS Institute defines network security as the process of taking physical and software preventative measures to protect the underlying network infrastructure from unauthorised access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for



COI Report – Part VII
Page 261 of 425

computers, users, and programs to perform their permitted critical functions within a secure environment 753. According to Leong Seng, the SCM IT network had preventive measures securing network traffic at every tier and every access point, including within and across the various sectors.
He added that prior to the Cyber Attack, IHiS had in place a range of preventive measures to address network security, including a) Network firewalls, which segregate each network segment so as to ensure that only authorised network traffic is permitted to cross segments or zones, and which filter incoming and outgoing network traffic based onsets of rules b) Intrusion Detection and Prevention Systems (“IDS/IPS”), which are used in SingHealth and H-Cloud to inspect network traffic in real-time, and to block and generate alerts for traffic associated with security risks and threats and c) Proxy servers, which act as intermediaries between users and the internet.
754. However, the tools and technologies in place were shown to be inadequate during the Cyber Attack, in two respects a) callbacks to C (command and control) servers went undetected for months and b) lateral movement by the attacker through numerous systems similarly went undetected. SANS Institute, Network Security Resources.



COI Report – Part VII
Page 262 of 425

755. These two aspects of the attacker’s behaviour relate to the Command and Control and Actions on Objective phases of the Cyber Kill Chain Had the network cyber stack been adequate, the Cyber Kill Chain may have been disrupted at either one, or both, of these phases.
37.4.1
A solution must be put in place to better detect and block malicious
outgoing traffic
756. C servers, to which callbacks were being made from compromised endpoints in the SingHealth network, were identified through malware and forensic analysis by CSA.
757. During the early stages of the Cyber Attack, outgoing communications with one C server were detected, but only by the fortuitous actions of Benjamin, who discovered the callbacks in January 2018 when investigating a malware infected workstation. However, human error on the part of Benjamin resulted in this C not being blocked. Worse still, according to Ernest, the Senior Manager of SMD, communications with the C server need not have been blocked, in any event, as it had not been confirmed as being a malicious C. The failure to have an effective solution to automatically detect and block malicious outgoing traffic had dire consequences as the C server was actively used throughout the attack in June/July 2018.
758. It is precisely to avoid errors in judgment like this, that Vivek has recommended the implementation of advanced detection tools for malicious traffic on all outbound internet traffic. This is important because most attacker communications would have to traverse the internet and so can be spotted with the right level of monitoring. Alerts should be configured such that every detection of C traffic is treated with high priority. The Cyber Kill Chain reveals the phases of a cyber attack from early reconnaissance to the goal of data exfiltration. See also paragraph 141 (page 51).



Download 5.91 Mb.

Share with your friends:
1   ...   213   214   215   216   217   218   219   220   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page