Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page59/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   55   56   57   58   59   60   61   62   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part III
Page 63 of 425

logs categorised into Application, Security and System. These logs record events such as system boot-up, processes that have been started or stopped, and logins. In particular, the security event log would have captured the details of all the accounts that had logged into Citrix Server 1. The deletion was not performed by any IHiS staff. It was presumably done by the attacker to cover its tracks.
179. On 12 June 2018, there were further failed logins from Citrix Server 1 to the SCM database. The error logs show that for most of these, the logins failed because they were from untrusted domains. For other attempts, the attacker used accounts which had not been granted access to the SCM database.
180. Based on the incidents of 11 and 12 June 2018, IHiS’ Citrix administrators disabled logins to Citrix Server 1 on 12 June 2018, and shutdown the server on
13 June 2018.
14.4.8
Attempts to login to the SCM database from Citrix Server 2 and Citrix
Server 4 on 13 June 2018
181. The events discussed in this section are summarised in the following figure
Figure 9: Attempts to login to the SCM database from Citrix Servers 2 and 4



COI Report – Part III
Page 64 of 425

Citrix Server 2 182. On 13 June 2018, the attacker used a compromised local service account, the SA. account, to remotely login to Citrix Server 2, which was an SGH Citrix server. VM 1 was used to login to Citrix Server 2, and these were not legitimate logins.
183. In the afternoon of 13 June 2018, a number of failed attempts were made to login to the SCM database from Citrix Server 2. These attempts failed because invalid user-IDs were used. In one attempt, the server name fora H-Cloud Citrix server (referred to in this report as “Citrix Server 3”), was used as a user-ID. Other attempts were made using the invalid user-IDs.
184. Later in the afternoon of 13 June 2018, another round of failed attempts was made to login to the SCM database from Citrix Server 2. Again, the server name for Citrix Server 3 was used as a user-ID in one attempt. The user-ID in another attempt was the name of a service account which would not ordinarily be used for the purposes of logging into the SCM database. In yet another attempt, the attacker used a user-ID that it had used in a prior attempt to connect to the SCM database from Citrix Server 1 on 12 June 2018.
Citrix Server 4 185. In the afternoon of 13 June 2018, after the attempted logins from Citrix Server 2, the attacker used the account belonging to the user of Workstation A to remotely login to another SGH Citrix server (referred to in this report as “Citrix
Server 4”) from VM 2. A few minutes later, the attacker attempted to access the
SCM database from Citrix Server 4, but this failed because the account used was not granted access to the SCM database.




Download 5.91 Mb.

Share with your friends:
1   ...   55   56   57   58   59   60   61   62   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page