Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page58/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   54   55   56   57   58   59   60   61   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part III
Page 61 of 425

170. In the context of the attack, Workstation B was used to login remotely to the SGH Citrix Servers 1 and 2. It is also suspected that Workstation B, or a spoof of it, was used to host virtual machines
20
(referred to in this report as “VM 1” and “VM 2”) used by the attacker to login to the SGH Citrix servers.
14.4.7
Attempts to login to the SCM database from Citrix Server 1 from 24
May to 12 June 2018
171. The events discussed in this section are summarised in the following figure
Figure 8: Attempts to login to the SCM database from Citrix Server 1 Unauthorised access to Citrix Server 1 from 17 May to 12 June 2018 172. From 17 May 2018 to 11 June 2018, the attacker used the LA. account to remotely login to SGH Citrix Server 1 on numerous occasions. The LA. account is a local domain administrator account not ordinarily used for day today operations. A virtual machine (“VM”) is an emulation of a computer system that, like a physical computer, runs an operating system and applications. A VM allows one to run two operating systems alongside one another on a single machine.



COI Report – Part III
Page 62 of 425

173. The unauthorised logins to Citrix Server 1 were also made via Remote Desktop Protocol (“RDP”) from workstations which would not ordinarily use the LA. account, including (i) the PHI 1 Workstation (ii) a SGH workstation referred to in this report as “Workstation C”; (iii) VM 1; and (iv) VM 2.
174. On 11 June 2018, IHiS staff became aware of the unusual logins to Citrix Server 1 using the LA. account, and they changed the password for the LA account that same evening. This was based on the understanding that (i) the LA. account is not ordinarily used for day today operations and (ii) the unauthorised logins to Citrix Server 1 were made from workstations with hostnames which would not ordinarily use the LA. account.
175. On 12 June 2018, the attacker attempted to login to Citrix Server 1 using the LA. account, but was unable to do so. It then used another account to access the server. Failed attempts to login to the SCM database from 24 May to 12 June 2018 176. Starting from 24 May 2018, the attacker made a number of failed attempts to login to the SCM database from Citrix Server 1. These attempts failed because the attacker either used invalid user-IDs. The latter group included the user-ID of the user account of Workstation A. The failed logins prior to 11 June 2018 were not noticed by IHiS staff at the time.
177. On 11 June 2018, the attacker made a number of failed attempts to login to the SCM database from Citrix Server 1. Most of these attempts failed because the attacker used invalid user-IDs. The attacker also attempted to use the DA. account to login to the SCM database, but this was unsuccessful because the account was not granted permission to the access the SCM database. It was on
11 June 2018 that Katherine, an IHiS database administrator, noticed some of the failed logins from that day.
178. The Citrix system event log for Citrix Server 1 was also deleted in the evening of 11 June 2018. The system event log is a set of Windows generated



Download 5.91 Mb.

Share with your friends:
1   ...   54   55   56   57   58   59   60   61   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page