SingHealth cyber attack Flashcards

1
Q

SingHealth data breach 3 effects overview

A
  1. personal info of mass public leaked
  2. personal info and outpatient med records of PM leaked
  3. outpatient med records of mass public leaked
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key events of SingHealth databreach(8)

A
  1. Attacker infected workstations through phishing, dormant before lateral movement to Citrix servers and SCM DB
  2. Remote connection to SGH Citrix servers
  3. IHIS IT admin noticed unauthorised and failed attempts to access SCM DB
  4. Attacker querying SCM DB
  5. Suspicious queries were spotted, terminated and measures put in place to prevent further queries
  6. Only a select few knew about incident and not brought up to senior management and big govt orgs until later
  7. Joint investigations by IHIS and CSA
  8. Public announcement via SMS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

purpose of joint investigations

A

contain existing threat
eliminate attacker foothold
prevent recurrence of attack
- implemented internet surfing separation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key Findings of SingHealth cyber attack(5)

A

1.lack of cybersecurity awareness and proper response
2.failed to take effective and timely response
3.Vulnerabilities not remedied before attack
4. Attack was skilled and sophisticated
5. Cyber defence will never be impregnable but attack was not inevitable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attacker was sophisticated(4)

A

1.clear goal
2.Advanced Tools/tactics/procedures
3.Persistent, multiple footholds and backdoors
4.extensive command and control network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What could have been done to stop the attacker(6)

A
  1. Staff training
  2. Regulated remote internet access
  3. 2FA
  4. Strong passwords and enforcement
  5. vulnerabilites fixed immediately
  6. inactive email accounts removed immediately to reduce attack surface area
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cyber Kill Chain Framework (RWDEICA)

A

Reconnaissance
Weaponisation
Delivery
Exploitation
Installation
Command and Control
Action on objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malicious artefacts in SingHealth attack(4)

A
  1. log file from malware with plaintext passwords
  2. Hacking tool with persistence, attacker can do brute force attackers, access mail exchange servers, used as hidden backdoor for reentry
  3. RAT1:executing of shell scripts remotely
  4. RAT2: not detected by standard anti virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Other vulnerabilities in SingHealth attack(2)

A

1.Old Outlook version
2. masqueraded malicious powershell scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of SQL queries on SCM DB(3)

A

1.Reconnaissance of schema
2. Direct queries on individuals
3. Bulk queries on patients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Flow of data out to attacker in SingHealth data breach(4steps)

A
  1. SCM DB sever
  2. Citrix Server
  3. Workstation
  4. C2 servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Factors causing SingHealth Cyber attack(5)

A
  1. Network connections between SGH Citrix servers and SCM DB
  2. Lack of monitoring SCM DB for unusual queries and access, DAM solutions not implemented
  3. SGH Citrix servers can be logged into without 2FA, vulnerability used for convenience, lack of firewalls, no real time vulnerability analysis
  4. Internet connectivity in IT network increased attack surface, avenue of entry and exit
  5. Outdated Outlook version
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

7 Important COI committee recommendations

A
  1. Enhanced security structure and readiness
  2. Cyber stack needs reviewing
  3. Staff need better cybersecurity awareness
  4. Enhanced security checks: vulnerability assessments, certification of vendor products, penetration testing
  5. Privileged admin accounts tighter control and monitoring: 2FA, passphrases, enforced password policies,
  6. Better incident response processes
  7. Partnerships between industry and govt
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Other COI committee recommendations(9)
(pics radur)

A
  1. Regular serious risk assessment/audit
  2. Enhanced safeguards to protect electronic medical records
  3. Domain controllers better secured
  4. Robust patch management process
  5. Software upgrading policy on security
  6. Internet access strategy limiting exposure
  7. Better incident response plans
  8. Improved competence of incident response personnel
  9. Post breach forensic review of network, endpoints and SCM system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Personal security(4)

A
  1. Back up data
  2. Not daisy chain accounts
  3. Not use same email prefix across multiple accounts
  4. Recovery address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is phishing still around(4)

A
  1. One employee to make whole system fail
  2. Unsure how to verify link
  3. Attractive deals from forwarded links
  4. Assumed link from close friends are secure
17
Q

How to reduce phishing(3)

A
  1. Train employees to hover links, recognise correct links and seek help in doubt
  2. Highlight malicious link to everyone if appeared in group
  3. Send everything in text instead