Monday, August 6, 2018

SingHealth cyberattack the work of sophisticated, usually state-linked attackers: Iswaran
Read more at https://www.channelnewsasia.com/news/singapore/singhealth-cyberattack-the-work-of-sophisticated-usually-state-10592762

 (Updated: )

Ricky Lim
The cyberattack on SingHealth’s IT database in June, which resulted in the most serious breach of personal data in Singapore’s history, was “the work of an advanced persistent threat (APT) group” that are “usually state-linked”, said Minister for Communications and Information S Iswaran on Monday (Aug 6).
Internationally, APT groups have also hacked the United States (US) Democratic National Committee in 2016 and the US Office of Personal Management (OPM) in 2014, which resulted in more than 20 million personnel records stolen.
Mr Iswaran said the SingHealth cyber attacker had used advanced and sophisticated tools, including customised malware that was able to evade the healthcare provider’s antivirus software and security tools. Once they got into the system, they took steps to remain in the system undetected before stealing patients’ information, which included that of Prime Minister Lee Hsien Loong.
--
Posted on :- 20 Jul 2018

Ricky Lim
This sounds like an Advanced Persistent Attack (APT) - by hijacking a legitimate workstation through remote access, steal the password (at least the administrator password of the database) and do a sweeping copies of the database for eg. via SQL.

SingHealth network infrastructure that run independently seems to be independent from the Ministry - and may lack the security rigour of the more protected IT infra.

Posted on:- 20 Jul 2018
Ricky Lim
(1) An APT is a highly sophisticated stealth hacking technique that not a single or a group of hackers can pull off.
It require a large pool of very skillful hackers who are familiar with virtually all network devices, security devices, computer devices, OS, system software, security measures, applications, database, TCP/IP, remote access, encryption, decryption etc.
Only a State resources of easily 50 or 100 or 1000 or more varied experts in the relative specialised areas can pull off such a sophisticated and targeted attack - without being detected.

(2) Also noticed that out of hundreds, thousands or even millions of such varied IT resources, servers, equipment, apps software, system software etc - this group of hackers manage to identify just one weak workstation through reconnaisance (without detection) - to break its password, take control of it remotely via remote desktop access protocol or other form of remote control and hacked into the database by breaking the database admin password.

(3) You have to note that every device, server, system software, or security devices - you will need an expert of each hardware and software to be able to break its security, know how they store record and store their security logs - so that they can skillfully remove all the digital footprint or security trace of their illegal access.

If there is few hundred specialised IT hardware and software - you will easily required at least a few hundred experts in the respective fields to break through and clean it up.

If this is not State Sponsored hacking attacks (commiting a full national resources of IT experts) - you think a disparate few expert hackers can pull off such an attack?
LikeReply1m
Ricky Lim
Eg. you will need :-
(1) a router expert - and there are so many types of routers out there - eg. cisco router, juniper router, alcatel routers etc - you will need to know each and every commands, its security features, how it logs its security traces etc and how to break its security to gain access and take over it as the administrator to control and manage it.

(2) a firewall expert - juniper firewall, cisco firewall, WAF firewall, palo alto firewall, etc - same thing you need to have experts in each type of firewall to break it.

(3) an OS expert - unix expert, linux expert, windows expert etc - and you need expert in each OS.

(4) a database expert - eg. Oracle expert, MS SQL database expert, DB II expert etc.

(5) Host IPS expert - eg. Symantec SCSP Host IPS, Trend Micro host IPS etc.

(6) L2/L3 LAN switches expert - eg. Cisco expert, Alacatel expert, Huawei expert etc.

(7) Cloud - eg. VMware, Amazon, MS Azure, HP cloud, IBM cloud etc

(8) Wireless LAN - eg. Cisco WLAN, Alcatel WLAN etc

(9) Programming languages - eg. Python, C programming, C++, Java etc.

(10) SIEM - eg. HP Arcsight, Symantec etc.

(11) APT - eg. Fireeye, Palo Alto, Trend Micro etc.

(12) DLP - eg. Symantec DLP, Trend Micro DLP etc.

(13) Storage system - eg. IBM Storage Subsystem, HP storage, HDS, etc - SCSI, FC, FCOE etc.

(14) SAN switch - eg. Brocade , Cisco MDS SAN switch etc.

(15) Hyperconverge - eg. Nutanix etc

(16) Server - eg. dell, ibm, hp, etc

etc etc etc --- do i still need to go on listing ?????

etc etc etc

Anyone can claim he is an expert in everything listed here?

If not a State Sponsored National resources of all IT experts congregate here ---- which hackers can be so "EXPERT", so "POWERDERFUL" to pull off an APT?
Like · Reply · 1m · Edited

Ricky Lim
No "ONE" person will ever acquire the "Expert" knowledge of everything.

Unless he is a "Buddha" or a "God"?
Like · Reply · 2m
LikeReply1m

Ricky Lim
Ricky Lim
The hallmark of State sponsored attack - that is the Advanced Persistent Attack are:-
(1) Advanced persistent presence
(2) Remote access and remote management
(3) Abiltiy to avoid detection of its illegal access and evade security measures
(4) Automated data mining to steal data - and pipe back to the hacker server
(5) Connect and disconnect quickly - and remove forensic digital footprint

- The Singhealth attack seems to have all the above features - the hallmark of State sponsor attack.
Like · Reply · 1m
LikeReply1m

No comments:

Post a Comment