Table of contents exchange of letters with the minister executive summary


The attacker employed advanced tactics, techniques, and



Download 5.91 Mb.
View original pdf
Page84/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   80   81   82   83   84   85   86   87   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019
The attacker employed advanced tactics, techniques, and
procedures, as seen from the suite of advanced, customised and stealthy malware used, generally stealthy movements, and ability to find and exploit various vulnerabilities in SingHealth’s IT network and the SCM application. CSA has highlighted that network intrusion techniques with low attack signature area hallmark of an advanced threat actor. Apart from evading detection for almost 10 months from 23 August 2017, the attacker was conscientious in erasing logs on compromised workstations and servers. Notably, the attacker even reentered the network after being detected, to erase system and program logs. c)
The attacker was persistent, having established multiple footholds and backdoors, carried out its attack over a period of over
10 months, and made multiple attempts at accessing the SCM database using various methods. It is particularly noteworthy that



COI Report – Part III
Page 96 of 425

even after its attack was thwarted on 4 July 2018, the attacker reentered the system on 19 July 2018 through an earlier established foothold and sought to reestablish control over the network (see section 14.7 (pg 70) above. db The attacker was a well-resourced group
, having an extensive C network, the capability to develop numerous customised tools, and a wide range of technical expertise.
287. Our cyber defences will never be impregnable. The skill and sophistication of the attacker has been recognised by the Solicitor-General, CSA, and all the interested parties. The expert witnesses also noted that an APT, given enough time, will breach the perimeter of any network. However, it is vital to note that while it maybe difficult to prevent an APT from breaching the
perimeter of a network, the success of the attacker in obtaining and exfiltrating the data in this attack was not inevitable. In this regard, the Solicitor-General has rightly pointed out two key considerations a) First, the attacker was stealthy but not silent, and signs of an attack were observed. As will be discussed in the next Part, these signs were not acted upon either because of (i) the relevant staffs inability to recognise that an attack was ongoing or (ii) inaction on the part of the staff responsible for responding to attacks. Had they taken appropriate action, the attacker could have been stopped before it achieved its objectives. b) Second, as explored in this Part, there were vulnerabilities, weaknesses, and misconfigurations in the SingHealth network and
SCM system that contributed to the attacker’s success in obtaining and exfiltrating the data, many of which could have been remedied before the attack. Doing so would have made it more difficult for the attacker to achieve its objectives.



Download 5.91 Mb.

Share with your friends:
1   ...   80   81   82   83   84   85   86   87   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page