Thursday, November 1, 2018

SingHealth cyberattack: IHiS announces measures to protect healthcare sector against online threats
Read more at https://www.channelnewsasia.com/news/singapore/singhealth-cyberattack-ihis-measures-prevent-online-threats-10887424

 (Updated: )
Very happy that almost 100% of my recommendation to safeguard against "State sponsored Advanced Persistent Threat" to protect SingHealth IT infrastructure are implemented.

This will make SingHealth IT infrastructure safer, can detect any attack early and can respond faster.

Clap Clap Clap Clap Clap ----- so indeed the Government do read social media postings for good recommendation and proposal !

Keep it up !
LikeReply1m
Freddy Chin
Hahaha... Ricky Lim..any one who has taken CISSP or similar would know all those things. It's that ihis has been sloppy all these years in cybersecurity threat prevention, mitigation and mediation. If one were to look further into this matter, the weakest link is actually the people... The senior management who never ensure and prioritise security and cybersecurity education and the employees who do not know the reporting process and SOP.
Reply6h
Paul Tan
All is require is to have strong encryption on everything data, source code and everything. IBM latest mainframe does that and support cloud solution as well but as usual not cheap.
Reply1h
Freddy Chin - CISSP do give the knowledge.
But implementing all the security knowledge in a highly complex IT infrastructure that cut across all IT domain is a challenge and not many can do it.

Imagine putting all the above security recommendation and implement it on the below IT domain without causing disruption to the IT operation SingHealth-wide.

Ricky Lim
Eg. you will need :-
(1) a router expert - and there are so many types of routers out there - eg. cisco router, juniper router, alcatel routers etc - you will need to know each and every commands, its security features, how it logs its security traces etc and how to break its security to gain access and take over it as the administrator to control and manage it.

(2) a firewall expert - juniper firewall, cisco firewall, WAF firewall, palo alto firewall, etc - same thing you need to have experts in each type of firewall to break it.

(3) an OS expert - unix expert, linux expert, windows expert etc - and you need expert in each OS.

(4) a database expert - eg. Oracle expert, MS SQL database expert, DB II expert etc.

(5) Host IPS expert - eg. Symantec SCSP Host IPS, Trend Micro host IPS etc.

(6) L2/L3 LAN switches expert - eg. Cisco expert, Alacatel expert, Huawei expert etc.

(7) Cloud - eg. VMware, Amazon, MS Azure, HP cloud, IBM cloud etc

(8) Wireless LAN - eg. Cisco WLAN, Alcatel WLAN etc

(9) Programming languages - eg. Python, C programming, C++, Java etc.

(10) SIEM - eg. HP Arcsight, Symantec etc.

(11) APT - eg. Fireeye, Palo Alto, Trend Micro etc.

(12) DLP - eg. Symantec DLP, Trend Micro DLP etc.

(13) Storage system - eg. IBM Storage Subsystem, HP storage, HDS, etc - SCSI, FC, FCOE etc.

(14) SAN switch - eg. Brocade , Cisco MDS SAN switch etc.

(15) Hyperconverge - eg. Nutanix etc

(16) Server - eg. dell, ibm, hp, etc

etc etc etc
---

If I am not wrong, I have come across many IT infrastructure - that 
did not implement all the above security recommendation - even though they have CISSP and many other certifications around.
LikeReply1m

Paul Tan - IBM mainframe is a closed architecture that are use in the 1980s and 1990s - very rare now - probably some banks used it - and they are very expensive.

IBM mainframe don't used TCP/IP protocol - and they used their proprietary SNA protocol and they need to be converted to TCP/IP via SNA/IP gateway - to talk to the Internet for user to use their cloud solution.

Even end device need to download the 3270 SNA emulation or use dumb termnial - to access their mainframe.
PC need to be installed with 3270 SNA emulation card and use proprietary cabling system to access the mainframe.

Wond
er does notebooks, tablets and mobile phones have to download SNA emulation apps to run without 3270 SNA emulation card ?

Also mainframe to connect to LAN will have to use token rings (invented by IBM) to talk TCP/IP - they don't use Ethernet (which is predominantly the LAN architecture that are used worldwide).
Imagine an organisation have to bridge mainframe SNA with token ring with ethernet and then connect to Internet?
Bridging and switching is no longer possible - and you will need to do routing (internal routing) to route through the various different LAN architecture.

Also an organisation need to maintain 2 sets of cabling system - one proprietary thick cabling system for mainframe and one SCS (Structured Cabling System) consisting of multimode/single mode fiber and UTP copper cabling system for LAN ethernet. The LAN riser will be choked with cables and will be extremely difficult to maintain and troubleshoot.

Encryption is only one part of the security solution - and IT security is more than encryption - because malware can also be encrypted and cause havoc later when it get into the system when decrypted.

Just that no hackers want to spend their time hacking IBM mainframe - as they are rarely used anywhere in the World - and also IBM mainframe being a closed architecture running proprietary SNA protocol that are not used in the Internet - which uses TCP/IP.
LikeReply1m
In a media release on Thursday (Nov 1), IHiS outlined the measures which include two-factor authentication for local administrators, complex passwords managed centrally as well as added training for the security team to boost their understanding of advanced hacker tools.
---
Posted on:- 20 Jul 2018

Ricky Lim
4. 2 FA authentication for administrator to be installed for login before allowing management of network device, software, database. Hackers may be able to steal the admin id and password, but without 2FA, hackers cannot administer and manage network device, edit software, access data in database.
LikeReply1m
用李
Key lesson learnt here pls dun ever push for galan gabo policy. This time we r merely lucky, next round can we b so lucky??

Pls look further & do the preparation now is my advise to the up coming second batch GOV.
LikeReply2h
Ricky Lim
用李 - Based on what i know, many institutions IT security is still not yet up to mark.

Only very critical IT infra are of highly secured states.

SingHealth are private sectors - that are beefing up into a highly secured states.

Other than banks and some financial institutions -- many private sectors IT infra are still susceptible to APT types of attack.


High cost to beef up the IT infra is one issue.
2nd issue are skillsets.
LikeReply1m
Freddy Chin
Ricky Lim .. Singhealth is private??
LikeReply6h
Ricky Lim
Freddy Chin -
Some hospitals are :-
"The Government has restructured all its acute hospitals and specialty centres to be run as private companies wholly-owned by the government. This is to enable the public hospitals to have the management autonomy and flexibility to respond more promptly to the needs of the patients."
-- They are not really "public sectors" - and thus are not cover under the Ministry stringent IT protected infra.

They can decide on how they plan, design and operate their IT infra.
LikeReply1m

Ricky Lim
That is why they may not have all the national resources and talents that can be found in the Government and GLCs - to withstand the State sponsored type of APT attack.
LikeReply1m

Freddy Chin
Ricky Lim , thanks for the great info.
Healthcare in Singapore is really really messy, albeit so many restructuring. Seems like another restructuring soon after this cyber attack... it is a big joke.
LikeReply4h
Ricky Lim
Freddy Chin - I think they will move into the CII (Critical Information Infrastructure) under CSA for IT security monitoring, management and response.
LikeReply1m
This includes expediting the planned implementation of Client Advanced Threat Protection (ATP), a security solution which, according to IHiS, blocks threats based on exploit techniques and sophisticated malware used by advanced threat actors.
---
Posted on:- 20 Jul 2018

Ricky Lim

3. APT advanced persistence threat or maybe dlp (data loss protection) protection can be put in place to filter known, unknown, zero day attack, virtual patching and sandbox unknown but anomaly threat.
LikeReply1m

Ricky Lim
IHiS added that it has implemented Temporary Internet Surfing Separation (ISS) across the public healthcare sector earlier as a precaution.
This means computers that are connected to the internal networks and systems cannot be used to access the Internet. To access the Internet, healthcare staff will need to use separate terminals which are not connected to internal networks and systems.
--
Posted on:- 20 Jul 2018

Ricky Lim
Protecting IT resources to minimise hacking are not that scary.
1. IT design to segregate back-end oob (out of band) mgt from front end internet fronting (in band) will definitely minimise internet hacking attack of such scale. The reason being, front end (in-band) is internet facing, out-of-band (back end) is segregated from front-end (inband) - and when hackers attack from front-end (in-band) - it cannot get into the back end (out-of-band) as the front end network is separated from back-end network. Breaching the front probably may get access to one or the most a few transactions --- but will not be able to do a mass copy of data - using backend admin with powerful rights.

Ricky Lim
Most important, ensure that in-band (front-end) network must not be routable to the out-of-band (back-end) network.

Ensure this mistake must not be made - else 佛都保不到你。。。。。
Like · Reply · 1m
LikeReply1m

Ricky Lim
The agency is also studying the possibility of using a virtual browser solution, where staff can only access reproduced content on the web to minimise risk of downloading or executing malicious files which may reside on the original sites.
--
Posted on :- 06 Aug 2018

Ricky Lim

PROTECTION OF STAFF INTERNET SURFING

Posted on :- 06 Aug 2018 03:17PM (Updated: 06 Aug 2018 03:27PM)

Ricky Lim
He also spoke about the possibility of a virtual browser solution as an alternative to the ISS.
--
Virtual browser solution will be like the VMWare VDI (Virtual Desktop Infrastructure) ThinApp or Citrix thin client - whereby it inherit the following security features :-
(1) It operates with a virtual server.
(2) The virtual server will maintain a golden virtual desktop clone.
(3) When the desktop client login to the virtual server, the virtual server will download a virtual desktop clone to the client.
(4) the virtual desktop client - come with its operating system and web browser - that is logically segregated from the client physical desktop.
(5) It means that users can make use of the virtual client to browse the internet - but any files cannot be saved into the desktop physical client and vice versa.
Thus any attack from the internet via the virtual client will be limited to the virtual client and cannot take over the physical client that connect to the intranet.
(6) When user logout from the virtual server, its virtual client will disappear.

This is a safe approach to browse internet without physical separation from the internet.
Like · Reply · 1m · Edited

Ricky Lim
This is the same concept of :-
色即是空,空即是色。
"Physical is Virtual, Virtual is Physical".
Like · Reply · 1m\

Ricky Lim
It should be noted that :-
(1) The Virtual Server that dish out virtual clients to the desktop users - should be hosted in a Public DMZ - protected by the following slew of security measures :-
a. Firewall - where ACL is to filter inbound and outbound internet traffic restricted to Public DMZ only and not allow to enter the Intranet.
b. SSL Decryptor - to decrypt web content to allow for deep packet inspection.
b. APT (Advanced Persistent Threat) - to perform Virtual Patching for zero-day attack, deep inspection on content, application and user, sandbox detonation for unknown threat, flag, display and alert known threat.
c. Full Web Reverse Proxy, and Forward Proxy.
d. WAF - Web Application Firewall to protect against SQL injection, Cross scripting.
e. IPS - Intrusion Prevention System to monitor, detect, alert, respond, protect against known threat and unknown threat.
Like · Reply · 1m
LikeReply1m
Ricky Lim
“An expanded suite of managed security services will be implemented via the Advanced Security Operations Centre, including proactive threat hunting, threat intelligence, response services, and more,” said IHiS.
Meanwhile, to further prevent the use of weak passwords, IHiS is enhancing the access management capability to manage complex passwords centrally, and automatically update and protect administrator accounts, the agency added.
“The access management will be boosted with threat analytics to provide earlier detection of suspicious account activities by applying a combination of statistical modelling, machine learning, as well as behaviour analytics to identify unusual activities, and respond faster to threats,” said IHiS.
---
Posted on:- 20 Jul 2018

Ricky Lim

2. Proactive security incidents and event management of all critical information infrastructure using SIEMs whereby online real-time will trigger alarms and alerts the moment when stealth hacking occurs. Even stealth reconnaissance, the beginning of hacking by probing through network discovery, tcp port scanning, icmp ping, traceroute etc will be picked up.
LikeReply1m

Additionally, to secure the network against unpatched equipment, the access control will be enhanced to allow only authorised devices that are patched with the updated anti-virus and anti-malware signatures to join the network.
--
This is a security posture assessment - whereby upon login :-
(1) anti-virus posture is checked
(2) os patch is checked
(3) firewall is checked
--- if fail thrown into quarantine VLANs for update to the latest security posture.

- if pass, then allow access.
LikeReply1m

Ricky Lim
The National Electronic Health Record system is also being reviewed and tested by GovTech and the Cyber Security Agency of Singapore, as well as by PricewaterhouseCoopers (PwC), an independent IT consultant.
---
This are :-
Penetration testing.
Vulnerability scanning.
--- to detect any security vulnerability.
LikeReply1m
...WAH!...alotta of cyber security technologies are invented after LHL medical record was hacked into...really cannot imagine what mind boggling new technologies will be invented if LHL bank account is hacked...
LikeReply12h
Freddy Chin
Actually all those are not new technologies but have been around for quite some time. It is the people who are the biggest threat to cyber security...
Reply6h
Freddy Chin - Basically cost to implement security is a big issue.
2ndly, the skillsets to implement all encompassing and all pervasive IT security is the issue.
LikeReply1m
Freddy Chin
Ricky Lim , agreed absolutely.
Senior Management needs to find the money to fund the implementation which they are doing now, albeit very late and they should change their mindset about cyber security. If those people up there are still living in their ivory tower and relying on the directors who are not capable, this is scary. In fact, if the top is serious about cybersecurity, they should have promoted a culture and also provided proper and relevant education and training to their staff.

What makes me angry is that those people are working in healthcare for so long, don't they read about cybersecurity breaches in other countries? The COI has revealed that the IT security in ihis is terrible and the process and procedure are almost non-existence.
LikeReply4h
Freddy Chin - Actually, I believe Healthcare have been identified as one of the CII (Critical Information Infrastructure) that need to be secured.

CSA (Cyber Security Authority) is setup to move all identified CII under its management, monitoring, response to IT hacking incidents - altogether about 11 to 13 industries have been identified as CII.

I believe there are time table to move them in - but the amount of work involved in just 1 CII is no joke ---- you are talking about millions and millions of IT infrastructure devices to monitor and managed.

I think SingHealth hospitals and polycli
nics supposed to move in at a later date -- but just happen that this State sponsored APT strike before the CII move takes place (SingHealth very suay) ---- and this have fast forward the date for SingHealth group to move in as part of this CII initiative ahead of the time table - I guess.

You can see that all the above security recommendation are "upscale" and upgrade to the SingHealth IT infrastructure before it can move into the CII monitoring, management and response under CSA ---- the amount of work is no joke. (Definitely more skill intensive, more finese, more knowledge, and better project management required - much more than taking over a town council and "upscale an accounting software").
But the speed of how CSA, Govtech and SingHealth work to implement all the above security recommendation are commendable.

(Because you are talking about 
connecting dedicated leased line to CSA, integrating integrating network protocol, API, planting agents into servers and virtual machines, setting up security monitoring system, configuring quarantine VLANs, setting up security posture assessments, setting up out-of-band management, setting up virtual browsers, implementing 2FA authentication with OTP etc etc --- which make taking over town council invoices and keeping account balance look like kindergaten work).

I feel that SingHealth IT department cannot handle this alone - and need the Government and National resources and talent to do this CII move --- that is why we can see CSA and Govtech coming in.
LikeReply1mEdited
By centralising all CII under one roof will :-
(1) Help to save cost - as individual CII don't need to set up their own monitoring bodies and systems - which will be very costly. Imagine multiply this by 11 or 13 sets as compare to the cost of 1 set.

(2) Pool all national resources and talents into one place - and not scatter all over the place.

(3) Make complex IT infrastructure constricted into a conduit - managed, supervised and run by a group of highly skilled IT experts to tackle highly skilled global hackers hacking effort.
LikeReply1mEdited

By moving the various identified industries or Economic sectors into the CII central monitoring, management and responses --- I am not saying that CISSP and other certified IT professionals are not required in the various industries or Economic sectors and need to move into the central.

Conversely CISSPs and other certified IT professionals need to be in their respective industries or Economic sectors to coordinate the IT security efforts in planning the move, during the move and after it run-in - to coordinate with the central sources with the ongoing operation.

If there are changes in each industries and economic sectors, the site CISSP and other certification IT professionals need to work with the Central sites to update, and move the addition, modification of devices, software etc with the Central sites.

If hacking attack on the respective sites takes place and is detected by the Central, IT professionals - CISSP or other IT professionals at the sites will need to take counter measures working in tandem with the Central to taut the attack.

In fact more jobs will be created not less.

This is to reassure IT professionals that your jobs will not be impacted - but instead more value-added works.
LikeReply1mEdited
Freddy Chin
The measures should have been in place long ago and most are the "basic" measures taught in any security courses like CISSP. This shows that the Senior Management in ihis has put low priority to cyber security previously. With so many "improvements" suddenly, may we know where the money come from? Is the healthcare cost going up again due to this spending? Hopefully it is not like SMRT and ihis' "bo chup" ness to cyber security previously is now paid by the consumers now.
LikeReply6h
Daniel Van Eej
I doubt it will work. The civil service is much to slack and more focused on their tea breaks.
LikeReply4h

Ricky Lim
Daniel Van Eej - I am very confident that by putting all the above security measures into the SingHealth IT infrastructure --- it will work and will greatly reduce the hacking risk.
LikeReply1m
=======================================================================

Ricky Lim
Posted on:- 20 Jul 2018

Ricky Lim
"Recommending ways to better protect SingHealth’s patient database system against similar attacks, and suggesting measures to reduce the risk of such cybersecurity attacks on public sector IT systems."
---
PROTECTION OF PUBLIC WEB SERVICE AND WEB ACCESS

Posted on:- 20 Jul 2018

Ricky Lim
Protecting IT resources to minimise hacking are not that scary.
1. IT design to segregate back-end oob (out of band) mgt from front end internet fronting (in band) will definitely minimise internet hacking attack of such scale. The reason being, front end (in-band) is internet facing, out-of-band (back end) is segregated from front-end (inband) - and when hackers attack from front-end (in-band) - it cannot get into the back end (out-of-band) as the front end network is separated from back-end network. Breaching the front probably may get access to one or the most a few transactions --- but will not be able to do a mass copy of data - using backend admin with powerful rights.

2. Proactive security incidents and event management of all critical information infrastructure using SIEMs whereby online real-time will trigger alarms and alerts the moment when stealth hacking occurs. Even stealth reconnaissance, the beginning of hacking by probing through network discovery, tcp port scanning, icmp ping, traceroute etc will be picked up.

3. APT advanced persistence threat or maybe dlp (data loss protection) protection can be put in place to filter known, unknown, zero day attack, virtual patching and sandbox unknown but anomaly threat.

4. 2 FA authentication for administrator to be installed for login before allowing management of network device, software, database. Hackers may be able to steal the admin id and password, but without 2FA, hackers cannot administer and manage network device, edit software, access data in database.

5. Remove all remote access by hardening and removing or shutting down all remote access capability to all network devices, software and database. Lockdown and identify dedicated jump host to administer all network devices, software, database by local access workstation or virtual machine that are securely protected. Any other workstation that are not identified as jump host for administration are not allowed to manage and administer supervisor function over the network devices, software and database. Remote management must be disallowed. By doing so, hacker compromising a weak front end workstation will not be able to mass copy the database - as it is not a dedicated jump host and will not be allowed to do so - also a security alarm and alert will be triggered to the sms and email to administrator that can quickly respond to the hacking.

6. Encryption of data storage, encryption key management and encryption of database maybe required. This ensure that even when the data is mass copied by the hackers, the data are encrypted and hackers will take a hard time to decrypt the data.

The above measures are recommended on top and above the below:-
(Assuming that all traditional security measures are put in place like firewall, segregration of web, apps, database, network IPS, host IPS, WAF - web application firewall, vpn ipsec, digital cert, encryption, authentication, directory service, desktop security features like personal firewall, anti-virus, latest security patches etc that have undergone security posture assessment such as BYOD, port authentication, secured shell for admin management, ssl etc have been put in place).

All these will prevent the singhealth APT hacking.
Reply · 1d · Edited
Like · Reply · 1m

Ricky Lim
Ricky Lim
Most important, ensure that in-band (front-end) network must not be routable to the out-of-band (back-end) network.

Ensure this mistake must not be made - else 佛都保不到你。。。。。
Like · Reply · 1m
LikeReply1m
Ricky Lim
Ricky Lim

PROTECTION OF STAFF INTERNET SURFING

Posted on :- 06 Aug 2018 03:17PM (Updated: 06 Aug 2018 03:27PM)

Ricky Lim
He also spoke about the possibility of a virtual browser solution as an alternative to the ISS.
--
Virtual browser solution will be like the VMWare VDI (Virtual Desktop Infrastructure) ThinApp or Citrix thin client - whereby it inherit the following security features :-
(1) It operates with a virtual server.
(2) The virtual server will maintain a golden virtual desktop clone.
(3) When the desktop client login to the virtual server, the virtual server will download a virtual desktop clone to the client.
(4) the virtual desktop client - come with its operating system and web browser - that is logically segregated from the client physical desktop.
(5) It means that users can make use of the virtual client to browse the internet - but any files cannot be saved into the desktop physical client and vice versa.
Thus any attack from the internet via the virtual client will be limited to the virtual client and cannot take over the physical client that connect to the intranet.
(6) When user logout from the virtual server, its virtual client will disappear.

This is a safe approach to browse internet without physical separation from the internet.
Like · Reply · 1m · Edited

Ricky Lim
This is the same concept of :-
色即是空,空即是色。
"Physical is Virtual, Virtual is Physical".
Like · Reply · 1m\

Ricky Lim
It should be noted that :-
(1) The Virtual Server that dish out virtual clients to the desktop users - should be hosted in a Public DMZ - protected by the following slew of security measures :-
a. Firewall - where ACL is to filter inbound and outbound internet traffic restricted to Public DMZ only and not allow to enter the Intranet.
b. SSL Decryptor - to decrypt web content to allow for deep packet inspection.
b. APT (Advanced Persistent Threat) - to perform Virtual Patching for zero-day attack, deep inspection on content, application and user, sandbox detonation for unknown threat, flag, display and alert known threat.
c. Full Web Reverse Proxy, and Forward Proxy.
d. WAF - Web Application Firewall to protect against SQL injection, Cross scripting.
e. IPS - Intrusion Prevention System to monitor, detect, alert, respond, protect against known threat and unknown threat.
Like · Reply · 1m

Ricky Lim
Recommending measures to enhance "incident response plans",
---
(1) Put Singhealth under CII (Critical Information Infrastructure Plan).
- Install SIEM & agents and agentless to Singhealth network infrastructure.
- Install Central logger to collect all syslog and security log.
- 24x7x365 security monitoring
- SMS, email alert for security incidents and events.

(2) Disconnect Web front access from backend access (apps and database access) upon detection of security breach attempt. This is to eliminate hackers from accessing the backend and database. If possible, redirect hacker access into a "honeypot".

(3) Monitor illegal access between Internet and web front - to trace and track hackers.
Collect forensic information.

(4) Inform public of security breach - when sufficient information is collected.
Like · Reply · 1m
LikeReply1m

No comments:

Post a Comment