By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Hackers got to SingHealth through a series of slip-ups, vulnerabilities, COI told
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Enterprise > Hackers got to SingHealth through a series of slip-ups, vulnerabilities, COI told
EnterpriseInternet

Hackers got to SingHealth through a series of slip-ups, vulnerabilities, COI told

Alfred Siew
Last updated: September 22, 2018 at 10:47 AM
Alfred Siew
Published: September 21, 2018
6 Min Read
SHARE
SCREENSHOT: SingHealth website

In the end, what will surely catch the eye is how an administrator password could have been set as P@ssw0rd. Or how a network connection that should have been cut remained online to let in a hacker.

Like any investigation into a high-profile data breach, the first day of the Committee of Inquiry (COI) hearings on the SingHealth hack in July brought up embarrassing details of the lapses and software vulnerabilities that led to Singapore’s worst cyber attack.

The hackers were stopped, fortunately, by a database administrator, just as they started to steal the medical data they sought, the committee heard from Solicitor-General Kwek Mean Luck today.

Still, the hackers made away with the outpatient prescription data of 160,000 patients, including Prime Minister Lee Hsien Loong. Also stolen was the personal data of 1.5 million people.

The attackers had gained a virtual foothold in SingHealth as far back as August 2017, the commitee heard today. They had infected frontline workstations that ran a version of Microsoft Outlook that was not up to date with software patches.

Up until May 2018, the hackers only moved “sideways” as they introduced more malware to other machines to gain access to them. This was a common tactic for such stealthy attacks.

What allowed the hackers to make an important leap was access to some local administrator accounts to Citrix servers in Singapore General Hospital (SGH), the committee was told.

It is not exactly clear how the hackers jumped from the workstations to the Citrix servers, which are commonly used to offer remote access to other machines, but the committee heard today that one of the admin accounts had a weak password. Yes, this was P@ssw0rd.

From here, the hackers still had some way to go to access the health records database, which had been migrated from the SGH servers to a private cloud for the healthcare industry in June 2017.

So, the system at SGH was to have been decommissioned, reported the Channel NewsAsia news website. However, there remained an open network connection from the Citrix server farm at SGH to the database servers on the cloud. The hackers exploited this.

They did not immediately get into the database servers holding the medical records because this required another level of access, which they did not have initially, said the Solicitor-General.

Through its investigations, the Cyber Security Agency (CSA) believe there was a high probability that a vulnerability in the database software allowed the attackers to steal the credentials needed to access the data.

The vulnerability was known as far back as 2014 to the Integrated Health Information System (IHIS), a company that manages the IT systems for the sector, according to the Solicitor-General. However, no action was taken, he added.

On June 26 this year, the hackers finally managed to get hold of the credentials to the database. The next day, they started stealing the data by running bulk “queries” on the database server.

This happened until July 4, when a database administrator noticed the activity and started to terminate it. On July 10, the senior management of IHIS, SingHealth, the Health Ministry and CSA came onboard. Ten days later, the news of the breach was told to a shocked public.

Did the teams at IHIS and SingHealth respond fast enough? The Solicitor-General said the staff did not appreciate the culmination of events, such as the unauthorised attempts to log in to the database, that eventually led to a breach.

They also did not report the incident in a timely manner, which is required because the database system is part of Singapore’s critical infrastructure, according to the Channel NewsAsia report.

Though the Solicitor-General said the focus of the COI was not to find fault, the various lapses are a sobering reminder of how difficult it is to keep out a well-planned attack.

It is easy to say now that the series of errors that led to the data breach can be avoided. On hindsight, everything is clear.

However, the lack of awareness that SingHealth is said to have suffered from is a common issue with many large organisations today. The IT systems they run are growing too complex to manage well.

It doesn’t help that they have multiple cyber security solutions onboard – too many of these solutions don’t work together coherently today and add to the confusion.

The lessons here, however, are valuable for other organisations faced with such advanced persistent threats on a daily basis. There will be more to learn, as the COI is expected to carry on until October 5.

SingTel: no plans to charge consumers separately for WhatsApp
Australia, Singapore and Thailand workers passing off AI work as their own: YouGov study
Self-driving cars show up the flip side of platform economy
Distance fares: use Gothere to easily find out how much you now pay
Q&A: Hyperconvergenced infrastructure needs a mindset change but is the way forward: Dell EMC
TAGGED:COIcyber attackcyber securityhackhealthcare systemsSingaporeSingHealth

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Avatar photo
ByAlfred Siew
Follow:
Alfred is a writer, speaker and media instructor who has covered the telecom, media and technology scene for more than 20 years. Previously the technology correspondent for The Straits Times, he now edits the Techgoondu.com blog and runs his own technology and media consultancy.
Previous Article Engineer turned up at 5:30am to collect his iPhone XS
Next Article Goondu review: Honor Play
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Scammers are so successful they even accidentally scam themselves now
Cybersecurity Internet
June 10, 2025
Doom: The Dark Ages review: Future fantastic demon slaying
Gaming
June 10, 2025
Plaud NotePin review: Note-taking made easy with AI
Internet Mobile
June 9, 2025
Can smart grocery carts, biometric payments boost retailers like FairPrice?
Enterprise Internet
June 6, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?