기본 콘텐츠로 건너뛰기

Hackers Stole a Third of Singapore's Healthcare Data, Including Prime Minister's

Singapore's Ministry of Health (MOH) revealed today that a hacker had breached its IT systems and stolen personal and health-related data on roughly 1.5 million citizens.
MOH officials said this was not the work of casual hackers or criminal gangs but a deliberate and well-planned attack that sought to gather health information on the country's prime minister.
"The attackers specifically and repeatedly targeted Prime Minister Lee Hsien Loong’s personal particulars and information on his outpatient dispensed medicines," the MOH said in a statement.

Data stolen for 1.5 million citizens

The hackers were successful in exfiltrating Prime Minister's Lee data. According to MOH, hackers stole data for around 1.5 million patients who visited SingHealth’s specialist outpatient clinics and polyclinics from 1 May 2015 to 4 July 2018.
Officials say the stolen data included details such as name, NRIC number, address, gender, race, and date of birth. For 160,000 patients, the data also included details on dispensed medicines.
Data such as diagnosis details, test results, or doctors' notes, were not stolen. Officials said hackers didn't edit or delete any patient records, but only exfiltrated it to a remote server.

Hackers had been stealing data for eight days when discovered

According to the findings of a preliminary investigation, hackers had breached MOH's systems last month, and had exfiltrated data from June 27 to July 4, when officials discovered the breach.
MOH said it notified law enforcement, secured its network, and will be contacting affected citizens in the coming days.
Protective measures included resetting all user and systems accounts, placing additional controls on workstations and servers, setting up additional system monitoring controls, and temporarily imposing Internet surfing separation.

Intruders believed to be nation-state hackers

While there were some theories online that the hack may be related to the 2018 North Korea–United States summit that took place at the start of June, the incident actually took place after the event, and doesn't appear to be related.
Nonetheless, security experts didn't rule out this attack being the work of a nation-state actor.
"Health records contain information that is valuable to governments and they are often targeted by nation-state threat actors," Eric Hoh, President of Asia Pacific at FireEye, told Bleeping Computer via email today.
"Nation-states increasingly collect intelligence through cyber espionage operations which exploit the very technology we rely upon in our daily lives," he added, suggesting that anyone has at least some value in the eyes of a foreign actor.
"A cyber espionage threat actor could leverage disclosure of sensitive health information, or financial health related vulnerabilities to coerce an individual in position of interest to conduct espionage," he added.

Singapore lauded for fast response

Neither Hoh nor FireEye put forward any theory on which nation-state actor might have been behind the hack. But Hoh did praise Singapore officials for revealing the hack to its citizens and not covering it up.
"Singapore ranks among the leaders in cyber security, and we would like to see more governments follow their lead in disclosing breaches," Hoh said. "Disclosure enables other organizations to take steps to improve their defenses against similar attacks."
The Singapore hack is a happy ending incident. Hoh said that on average, Asia Pacific organizations usually take 498 days before they detect intruders in their networks.
"Against those metrics, this is a relatively fast response," Hoh added.

By  July 20, 2018

댓글

이 블로그의 인기 게시물

Six Tools Used by Hackers to Steal Cryptocurrency: How to Protect Wallets

In the early July, it was  reported  that Bleeping Computer detected suspicious activity targeted at defrauding 2.3 million Bitcoin wallets, which they found to be under threat of being hacked. The attackers used malware — known as “clipboard hijackers” — which operates in the clipboard and can potentially replace the copied wallet address with one of the attackers. The threat of hacking attacks of this type has been  predicted  by Kaspersky Lab as early as November of last year, and they did not take long to become reality. For the time being, this is one of the most widespread types of attacks that is aimed at stealing users’ information or money, with the overall estimated share of attacks to individual accounts and wallets being about 20 percent of the total number of malware attacks. And there’s more. On July 12, Cointelegraph  published  Kaspersky Lab’s report, which stated that criminals were able to steal more than $9 million in  Ethere...

BLACK LABEL, Joined CeBIT 2018 hosted in Hanover, Germany

South Korean IT Companies Target the European Digital Market -  KOTRA operates the unified Korean pavilion for Hanover Information Communication Exhibition 2018 ... 56 companies in total. Black Label participated with IoT module and IoT product developed directly at CeBIT 2018 in Hanover, Germany. Click on the blog link below for a list of government press releases and participating companies. 한국 IT 기업들 , 유럽 디지털 시장 공략 -KOTRA, 2018 독일 하노버 정보통신전시회 (CeBIT 2018) 통합 한국관 운영 ... 총 56 개사 참가 블랙라벨이 독일 하노버에서 열린 CeBIT 2018에 직접 개발한  IoT 모듈과 IoT 제품을 가지고 참가했습니다. 아래의 블로그 링크를 클릭하시면 정부보도자료와 참가업체 리스트를 확인하실 수 있습니다. http://blog.daum.net/htiger31/18387695 블랙라벨 관련 문의사항 HP: 010-9818-3511 / 이메일:  uklim72@gmail.com 블랙라벨 홈페이지  https://blacklabel.io/index.do

Keeping Smart Homes Safe And Secure

Bad actors are increasingly targeting connected devices, and network providers are fighting back. But when it comes to protecting the IoT, a one-size-fits-all approach simply doesn’t fit. The security measures that protect IoT devices in business settings don’t readily translate to devices in consumers’ homes, says Marcio Avillez, SVP of networks at CUJO AI. In the latest Intelligence of Things Tracker, Avillez makes a case for taking a device-specific approach in thwarting threats to smart homes. Consumers often find the promise of greater convenience to be a convincing reason to buy connected devices. Unfortunately, reports of breached connected devices are all too frequent, and consumers may find they are introducing not just connectivity, but also bad actors, into their homes. IoT-related breaches are innumerable. In 2017, the FBI  warned  consumers against purchasing IoT-connected toys, stating that such devices could be hacked and used to record and spy on c...