Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page213/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   209   210   211   212   213   214   215   216   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 256 of 425

classification) being regarded as being of low risk. Consequently, endpoints have less coverage in terms of defensive, preventive and detection controls. Attackers know this, and exploit this vulnerability by targeting endpoints as part of their
modus operandi.
739. Endpoints are the common points of ingress for attackers, and the platforms from which an attack is propagated, after initial breach is achieved. Further, multiple endpoints maybe compromised during lateral movement, as the attacker navigates the network towards its end objective.
740. Given the nature of the advanced cyber threats that organisations now face, conventional signature-based and prevention-oriented solutions are insufficient. The conventional technique for detecting malware is to check to see if a program or process has been previously identified as being malicious. These checks depend on signatures that have been identified as being associated with the program or process – the name of the program or process, the size of the program, the date when it was created, a hash of the program etc. A signature-based approach to detection has two primary weaknesses. First, it is easy to alter the malware code without affecting what it can do. An unlimited number of functionally equivalent variants of the malware can thus be created with different signatures, thereby frustrating signature-based detection. Second, signature- based detection cannot identify a program as a virus or malware if the program has never been seen before.
741. Further, anew type of so-called fileless malware has emerged. Unlike attacks carried out using conventional file-based malware, intrusions using fileless malware do not involve attackers installing malicious programs on a victim’s computer. Instead, tools that are builtin to Windows (for example,
PowerShell) are abused by attackers and used for malicious purposes. The fact that conventional file-based malware is not used is significant, as this means that there is no signature for antivirus software to detect. Fileless malware cannot only slip into a system without being detected by signature-based endpoint



Download 5.91 Mb.

Share with your friends:
1   ...   209   210   211   212   213   214   215   216   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page