Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page130/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   126   127   128   129   130   131   132   133   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019
25 EVENTS OF 27 JUNE TO 3 JULY 2018
25.1 Further investigations into Workstation B
459. In the days following 26 June 2018, Benjamin forensically analysed the memory dump of Workstation Band Zac examined the hard disk image. Zac was unable to locate any evidence of malware or other suspicious activities or files on the hard disk. Antivirus programs also did not indicate any malware infection or suspicious files on Workstation B. He did, however, notice something unusual about the way certain background processes were being run on the workstation.
460. At pm on 28 June 2018, Benjamin sent an email to Ernest and the rest of the SMD; Wee was not copied in the email. This email contained some of
Benjamin’s forensic findings on Workstation B as described above in this section, and a set of Microsoft PowerPoint slides containing screenshots supporting these findings.
There was, however, little explanation on how to interpret the screenshots.
461. Ernest has informed that he received the email, but he did not understand the information provided by Benjamin in his email. Ernest also did not understand the screenshots in the slides, which appeared to him to be forensic- related, and he was not trained in digital forensics. However, he did not ask Benjamin for clarifications.




COI Report – Part IV
Page 151 of 425

25.2 Assessment of IHiS’ incident response from 27 June to 3 July
2018
462. It is important to note that in this period, the attacker was in fact making SQL queries on the SCM database and exfiltrating the stolen patient records. However, there is no evidence that IHiS staff had detected any suspicious activities in this period. As discussed in section 15.2 (pg 74) above, this was because of alack of monitoring at the SCM database for unusual queries and access.
463. Benjamin’s investigations into Workstation Band his identifying of unusual processes were steps in the right direction. Unfortunately, he was unable to fully appreciate the security implications of his findings, or to associate them with earlier findings. It is likely that this was due to the limited training and experience that he had. It also did not help that his reporting officer, Ernest, similarly lacked the necessary technical knowledge and experience, and did not take any steps to find out more about the findings which Benjamin presented to him.
464. The above clearly illustrates the importance of timely reporting and escalation. Had the matter been escalated to a level which could provide effective leadership, and which possessed the appropriate resources and technical expertise, it may have been possible to determine, from all the suspicious activities to-date, that the attacker was targeting the SCM database and sought to exploit the open network connection between the SGH Citrix Servers and the
SCM database. With timely action, the attack could have been detected and contained, minimising the damage caused. Unfortunately, the matter was not escalated and valuable time was wasted. On the facts, further suspicious activity was only discovered on 4 July 2018, eight days after the attacker first began querying the database.

Download 5.91 Mb.

Share with your friends:
1   ...   126   127   128   129   130   131   132   133   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page