Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page221/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   217   218   219   220   221   222   223   224   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 266 of 425

endpoints through RDP, allowing for lateral movement throughout the network, without restriction.
771. Segmentation is a significant deterrent to attackers, and we recommend that a network architecture review be carried out to segment the SingHeath network as part of a defence-in-depth strategy.
772. Monitoring of east-west traffic. After an attacker has gained access to a network, seeing, detecting and tracking their actions is crucial to reducing the likelihood of their mission objective (e.g. exfiltration of data) being achieved.
East-west visibility of network traffic refers to the ability to see malicious activity that is contained within the network.
773. Unless a specific solution is in place to monitor east-west network traffic, blind spots will exist where an attacker could be hiding. Without a solution for monitoring network communications between endpoints, a wide variety of malicious lateral movement will not be detected, and valuable forensic information will not be collected information which could prove essential for analysis after an attack.
774. We recommend that an east-west security solution be implemented that can identify abnormal traffic types on the network. Leong Seng has testified that
IHiS plans on enhancing network monitoring of east-west traffic to detect lateral movement within the entire network.




COI Report – Part VII
Page 267 of 425

37.5 Application security for email must be heightened as it is the
most common attack vector for cyber attacks
775. It starts with one email – malicious emails are, by far, the weapon of choice for cyber attackers. The Cyber Attack has reaffirmed the fact that emails are the most common intrusion vector,
62
and that stepped-up measures are essential to defend against this threat.
776. CSA’s hypothesis was that the initial intrusion into the SingHealth network was via a phishing email. CSA was unable to determine conclusively what the source of the initial infection was, but based on a phishing email sent on 18 July 2018 when the attacker attempted to regain a foothold in the
SingHealth network, CSA’s hypothesis was that the attack vector was a phishing email containing malicious code.
777. While we acknowledge that no security solution can be 100% effective, the successful phishing attack in 2017, and the fact that in the Cyber Attack similar emails laden with malicious code passed through email security filters and reached the inboxes of a number of recipients in SingHealth institutions, necessitates an urgent review of email security measures that are in place.
778. According to Leong Seng, SingHealth email systems are managed centrally by IHiS with multilayered preventive measures including a) Antivirus, anti-spam, and attachment blocking technology, which filters emails that may pose security risks, analyses attachments, and scans macros in attachments b) URL rewrite technology to detect malicious URLs and render them benign and An intrusion vector, or attack vector, is a path or means by which an attacker can gain access to a computer or network in order to deliver a payload or malicious outcome.



Download 5.91 Mb.

Share with your friends:
1   ...   217   218   219   220   221   222   223   224   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page