219 views

Singaporeans' stolen SingHealth data exposed to identity and tax fraud

The SingHealth cyberattack affected over 1.5 million Singaporeans, specifically 160,000 patients.

About 1.5 million patients that visited SingHealth’s specialist outpatient clinics and polyclinics from 1 May 2015 to 4 July 2018 have had their non-medical personal particulars illegally accessed and copied. Information on the outpatient dispensed medicines of about 160,000 of these patients was also withdrawn.

Considered Singapore’s largest cyberattack, the entities also stole the information of prime minister Lee Hsien Loong as well as other ministers of the government.

Sid Deshpande, research director at Gartner, explained how the initial statements indicate that a front-end workstation was compromised, followed by privileged access credentials being used to access a database. “Attackers are usually after administrator credentials because these often enable direct access to sensitive data,” he said.

Olli Jarva, managing consultant of software integrity group Synopsys, added that healthcare data has grown its value such that hackers are now willing to go the extra mile to obtain it. “This has been a growing trend over the past few years, such that healthcare data has outgrown the value of credit card or social security numbers,” he said.

Deshpande warned that the most immediate threats people will face are that of identity fraud, financial fraud, and tax fraud. "Data contained in healthcare records is more permanent than credit card information for example so citizens need to be alert to scams resulting from social engineering efforts," he added.

"Generally, information contained in medical records is more ‘permanent’ than financial information like credit card numbers – so this type of information likely fetches higher payouts on the dark web. It could also be sponsored by nation states that have interests inimical to Singapore’s," he said.

However, Deshpande noted how the cyber attack defence was able to get perform good detection and response capabilities. “Attackers usually intend to stay dormant in systems to avoid detection and cause further damage, so the fact that the breach was detected this early actually shows that the security teams, in this case, were actively monitoring systems to detect incidents,” he added.

Still, Jarva noted that from a security standpoint, the healthcare industry shares the same shortcomings as other enterprises, but with some added obstacles. Aside from the lack of resources, the industry also has to deal with an “extremely heterogeneous environment.”

“Whilst healthcare organizations may standardize on laptops and IT servers, providers also manage multiple devices that are attached to the network. These can include drug infusion pumps, imaging devices like MRI and CT scanners, and treatment software (such as those used to manage implantable pacemakers),” Jarva said.

Typically, large computer systems are part of a bigger project developed and delivered by System Integrators (third parties), where the supply chains can get complicated.

“This compounds the challenge to manage security, as different parts of the system may have different third-party software components and inherent vulnerabilities, and often, may not be properly identified and patched early enough. This isn’t a challenge that is unique to healthcare, it is a challenge that every large organization goes through,” Jarva added.

PwC Singapore digital trust leader Tan Shong Ye noted how an organisation’s future investments can focus on strategy, process, technology, people, and culture. “With the increase in emphasis on digital and information comes the need for cyber risk assessments to keep personal data, client data and intellectual property safe,” he said.

As a final measure, Tan reminded that cybersecurity hygiene should be a personal responsibility and a skill that everyone should pick up. “This includes installing anti-virus/malware software, ensuring that passwords are secure, checking that strong 2-factor authentication are required for sensitive on-line transactions, and to be careful of phishing emails that could cause malware to be installed on your computer without your knowledge, increasing the risk of data to be stolen,” he concluded. 

Join Singapore Business Review community
Since you're here...

...there are many ways you can work with us to advertise your company and connect to your customers. Our team can help you dight and create an advertising campaign, in print and digital, on this website and in print magazine.

We can also organize a real life or digital event for you and find thought leader speakers as well as industry leaders, who could be your potential partners, to join the event. We also run some awards programmes which give you an opportunity to be recognized for your achievements during the year and you can join this as a participant or a sponsor.

Let us help you drive your business forward with a good partnership!

Top News

Lorem Ipsum text in year 2025
Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old.
Lorem Ipsum is simply dummy text of the printing and typesetting industry.
Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source. Lorem Ipsum comes from sections 1.10.32 and 1.10.33 of "de Finibus Bonorum et Malorum" (The Extremes of Good and Evil) by Cicero, written in 45 BC. This book is a treatise on the theory of ethics, very popular during the Renaissance. The first line of Lorem Ipsum, "Lorem ipsum dolor sit amet..", comes from a line in section 1.10.32.

Exclusives

Cropping Issue on Responsive one
Contrary to popular belief, Lorem Ipsum is not simply random text. 
Artificial Inteliigence Testing
Contrary to popular belief, Lorem Ipsum is not simply random text. 
Lorem Ipsum is simply dummy text of the printing and typesetting industry.
Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source. Lorem Ipsum comes from sections 1.10.32 and 1.10.33 of "de Finibus Bonorum et Malorum" (The Extremes of Good and Evil) by Cicero, written in 45 BC. This book is a treatise on the theory of ethics, very popular during the Renaissance. The first line of Lorem Ipsum, "Lorem ipsum dolor sit amet..", comes from a line in section 1.10.32.
Lorem Ipsum Singapore Business Review
The text to display in the title bar of a visitor's web browser when they view this page. This meta tag may also be used as the title of the page when a visitor bookmarks or favorites this page, or as the page title in a search engine result. It is common to append 'Singapore Business Review' to the end of this, so the site's name is automatically added. It is recommended that the title is no greater than 55 - 65 characters long, including spaces.The text to display in the title bar of a visitor's web browser when they view this page. This meta tag may also be used as the title of the page when a visitor bookmarks or favorites this page, or as the page title in a search engine result. It is common to append 'Singapore Business Review' to the end of this, so the site's name is automatically added. It is recommended that the title is no greater than 55 - 65 characters long, including spaces.