Table of contents exchange of letters with the minister executive summary


Detecting an active login to Citrix Server 2 and disabling the SA



Download 5.91 Mb.
View original pdf
Page143/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   139   140   141   142   143   144   145   146   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019
27.2 Detecting an active login to Citrix Server 2 and disabling the SA.
account on the morning of 5 July 2018
523. Midway through the meeting on the morning of 5 July 2018, Joanne noticed that there was alive active session by the SA. account connecting to
Citrix Server 2 via RDP from VM 1. Lum observed that a)
VM 1 was the same hostname that was discovered to have accessed
Citrix Server 1 using the LA. account as early as 8 June 2018; and b) the SA. account ought not to have the privileges to login to the server following its removal from the administrator group on 26 June 2018.
524. Lum told Joanne to terminate the RDP session immediately.
He also informed Ernest of what they observed, and made it clear that this was an unauthorised access to Citrix Server 2. After Joanne terminated the session, the same RDP session reappeared a few minutes later and was again terminated.




COI Report – Part IV
Page 167 of 425

27.3 Implementing a firewall rule to block all connections to the SCM
database from any SGH Citrix server on 5 July 2018
525. On 5 July 2018, the Citrix Team implemented a firewall rule which blocked all connections to the SCM database from any SGH Citrix servers to ensure that the SGH Citrix servers could not be used to access the SCM database.
27.4 Enforcing the use of Privileged Access Management to access the
SGH Citrix servers from 5 July 2018
526. The Citrix administrators were also told to access the SGH Citrix servers using only Privileged Access Management (“PAM”). The use of PAM required factor authentication.
27.5 Forensic examination of Workstation B
527. On 5 July 2018, Benjamin conducted further forensic investigations into the memory dump and hard disk image of Workstation Busing forensic tools.
528. For the forensic investigation of the memory dump, Benjamin detected a suspicious process and file. He took a memory dump of the process and performed an analysis using an online service, which indicated that this was an unsafe file.
529. Benjamin also searched the memory dump for more unusual background processes, given what he had learnt previously. Again, he found that there were other suspicious background processes, and analysed them using online tools. The results of one tool indicated “malicious_confidence_80%”, and another tool indicated that this was an unsafe file. Benjamin prepared a report of his findings from the memory dump of Workstation B. He updated Ernest orally of his findings, and also showed Ernest the report. For the forensic investigations into the hard disk image of Workstation B, Benjamin also made a number of findings from this.



Download 5.91 Mb.

Share with your friends:
1   ...   139   140   141   142   143   144   145   146   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page