COI Report – Part VII
Page
320 of
425 proved to be significant, as this IP address belonged to a malicious C server that was later used during the Cyber Attack.
933. In Vivek’s expert opinion, it is possible that investigation and proper followup on the above activities would have offered the CERT a chance to hunt the attacker before he did further damage during the Cyber Attack.
934. Accordingly, a formal method of communication
should be established by IHiS led by the CEO, in the form of a centralised communication dashboard. This central dashboard would display all the details of the current state of investigations, allowing all members of the incident response team to keep abreast of developments and retrieve the information necessary to perform their roles. This would provide a more coordinated means of communication and would serve to document all communications, and limit the disruption and confusion arising from constant messaging across multiple platforms. Multiple streams of communication across different channels could otherwise overwhelm individuals and lead to missed messages or conflicting information.
935. For example, there was no centralised way for members of the CERT to ascertain whether items were being followed upon. In January 2018, Benjamin had already discovered that there were instances of callbacks to a suspicious IP address from PHI 1 and SGH. He arranged for this IP address to
be blocked from PHI s network, but not from the SGH network. Benjamin sent an email to Ernest and his other colleagues from SMD, but did not followup and was not personally aware if anyone had blocked the suspicious IP address from the
SingHealth network.
In fact, no one did. A centralised communication dashboard can also help in managing, tracking and segregating information and updates relating to multiple concurrent investigations that maybe ongoing.
Share with your friends: