Singapore Defense Ministry Under Remote Attack

Singapore’s defense ministry (MINDEF) has recently disclosed that a breach in an Internet-connected system earlier in February had resulted in the personal data of 850 national servicemen and employees being stolen. 

According to MINDEF, the I-net system used by personnel to access the Internet through terminals at the ministry and other facilities was breached by an attack in early February. 

While personal data, including identification numbers, phone numbers, and date of birth, were believed to have been stolen during the incident, the ministry said no classified information was compromised because it is stored on a separate system not connected to the Internet.

Singapore is no stranger to such cyber-attacks. As noted before, it has been paying keen attention to the cyber domain as a developed, highly-networked country. Singapore is particularly vulnerable as it relies on its reputation for security and stability to serve as a hub for businesses and attract talent. 

Indeed, last year, Deloitte found that Singapore was among the five Asian countries most vulnerable to cyber-attacks. The past few years have seen breaches in other parts of the city-state’s government as well, including the foreign ministry’s IT system as well as the Prime Minister’s Office website.

In response, Singapore has unveiled a series of initiatives aimed at boosting cyber-security, including creating new institutions, safeguarding critical infrastructure, training cyber security personnel, and collaborating more with the private sector.
Nonetheless, the cyber-attack recently is a reminder that even the more capable states in the Asia-Pacific continue to struggle with confronting threats in the cyber realm. 

This was the first publicly disclosed cyber-attack that MINDEF has experienced, and the ministry has described it as “targeted and carefully planned,” with the purpose of gaining access to official secrets. And based on what Singaporean officials have discovered so far, the attack appears to be less like the work of regular hackers and more along the lines of sophisticated state or state-backed actors.

The Diplomat

INTERPOL Targets Cybercrime in Asia:

China’s Cyber Attacks on Governments and Corporates in Asia:

China’s Cyber War Capabilities Alarm The Neighbours:

 

« Why SMEs Need Cyber Insurance
Britain Bombarded With High Level Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

NextLabs

NextLabs

NextLabs provides data-centric security software to protect business-critical data and applications.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

Soracom

Soracom

Soracom offers secure, scalable, cloud-native connectivity developed specifically for the Internet of Things.

Truepic

Truepic

Truepic’s photo verification platform aims to build a more trustworthy internet through certified authentic images & videos.

Aujas

Aujas

Aujas helps organizations manage information security risks by protecting data, software, people and identities in alignment with best practices and compliance requirements.

Bugraptors

Bugraptors

BugRaptors is a certified software testing company with extensive experience as a third-party testing vendor, effectively proven as a leader in software testing & QA Services.

BrandShield

BrandShield

BrandShield is an anti-counterfeiting, anti-phishing and online brand protection solution.

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

Green Radar

Green Radar

Green Radar is a next generation cybersecurity company which combines technologies and services together to deliver Threat Detection for Emails and Deep Threat Analytics and Response.

Toka Group

Toka Group

Toka empowers government agencies with critical and previously out-of-reach digital forensics, force protection and Intelligence capabilities, tackling the fields' most pressing challenges.

Network Contagion Research Institute (NCRI)

Network Contagion Research Institute (NCRI)

NCRI provides pioneering technology, research, and analysis to identify and forecast cyber-social threats targeting individuals, organizations, and communities.

Incyber

Incyber

Incyber is a fully integrated network and cybersecurity solutions provider contracted to safeguard public and private enterprise, high value data and sensitive industries.

Karate Labs

Karate Labs

Karate is an open-source unified test automation platform combining API testing, API performance testing, API mocks & UI testing.