Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page219/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   215   216   217   218   219   220   221   222   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 264 of 425

37.4.2
Modifications to network architecture and/or monitoring of east-west
traffic within the network must be undertaken to limit the ability of
attackers to move laterally within a network
764. Traditional security thinking prioritises preventing an initial intrusion into a network. However, the initial compromise is often only the beginning. Once an attacker gains a foothold, it would attempt to move around the network and access other systems. This was the casein the Cyber Attack.
765. Once the attacker had established an initial foothold, network logs indicate that the attacker moved laterally in the network between December 2017 and June 2018. Forensic analysis revealed clear indicators that the attacker had moved laterally around the network. For example, the PHI 1 Workstation was compromised and infected with malware on 18 January 2018. This infected workstation was also found to be communicating with foreign C servers. Moving laterally, the attacker also gained access to Workstation Band planted a customised Remote Access Trojan on 17 April 2018. After this workstation was compromised, the attacker was able to remotely login to Citrix Servers 1 and 2 using the LA. account and the SA. account. The attacker had planned its route in the SingHealth network to reach its ultimate objective – the SCM database.
766. Given the risk of lateral movement in a future attack, IHiS must adopt measures to structure the SingHealth network in such away to limit an attacker’s opportunity to move laterally, or implement solutions to monitor, detect, and block lateral movement.
767. Network segmentation. Network segmentation in computer networking is the act of splitting a computer network into sub-networks, each being a network segment. In essence, groups of systems or applications are separated from each other. One of the advantages of splitting a network in this manner is improved security, as it makes it more difficult for an attacker to propagate an attack throughout the entire network. For example, there is a reduced attack



Download 5.91 Mb.

Share with your friends:
1   ...   215   216   217   218   219   220   221   222   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page