It was reported on Friday (20 Jul) that cyber hackers have broken into the computer systems of SingHealth and stolen the personal particulars of 1.5 million patients. The stolen data included confidential records of patients’ name, IC number, address, gender, race and date of birth.

Of these, 160,000 people, including PM Lee Hsien Loong and a few ministers, had their outpatient prescriptions stolen as well. SingHealth is the government entity in-charge of 4 hospitals, 5 national specialty centres and 8 polyclinics here in Singapore.

Health Minister Gan Kim Yong apologised, “We are deeply sorry this has happened.”

The cyber attack appeared to be “deliberate, targeted and well-planned”. Initial investigations showed that one SingHealth front-end workstation was infected with malware through which the hackers gained access to the data base.

SingHealth said it will be contacting the affected patients to notify them about the incident.

MOH said it has directed a thorough review of the public healthcare system to improve cyber security, and all public and private healthcare institutions have been advised to take cyber-security precautions.

Mr Iswaran, who is also Minister-in-Charge of Cyber Security, added that “we must get to the bottom of this breach”.

CSA Chief says no worry

Meanwhile, the Chief Executive of Cyber Security Agency of Singapore (CSA), David Koh, essentially told the media that there is nothing to worry about. He said the stolen information are “basic demographic data”.

“We are watching to see if anything appears on the Internet both in the open and in some of the less well-known websites,” he added, noting that this has occasionally happened in past data breaches.

“But considering the type of data that’s been exfiltrated (i.e, unauthorized transfer of data), it is – from our professional experience – unlikely that these will appear, because there is no strong commercial value to these types of data.”

In other words, he is telling the 1.5 million patients not to worry about the theft of their personal data, which includes their name, IC number, address, gender, race and date of birth.

CNA reported that the authorities know who was behind the attack. It reported, “There are only a few countries in the world who have shown this level of sophistication when it comes to cyber attacks.”

When pressed further, the CSA Chief apologised and replied, “We are not able to reveal more because of operational security reasons.”

UOB says easy to commit fraud with stolen sensitive information

However, on UOB website, it quoted a study by the Financial Crimes Enforcement Network (FinCEN) indicating that cyber attacks related to ID theft are on the rise.

“It is also alarming to note the rising trend of ID theft by people known to the victims,” UOB said.

Essentially, “ID theft” is a form of fraud in which someone assumes another person’s identity by pretending to be that person. It is usually done by cyber thieves to obtain financial gain, UOB said.

In the information sensitivity table provided by UOB below, it noted that criminals just need “low sensitivity information and 1-2 medium/high sensitivity information” to commit financial fraud:

UOB recommended, “The simple act of safeguarding your sensitive information could go a long way in protecting yourself against ID theft.”

So, going by UOB’s information sensitivity table, it appears that the cyber hackers of the SingHealth systems now possessed even information considered to be of “high sensitivity” by banks like IC numbers, thanks to the security loopholes in SingHealth.

And yet, Singapore’s cyber security chief David Koh said “there is no strong commercial value to these types of data”.

Subscribe
Notify of
1 Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
You May Also Like

UPR Consultation

Dear Friends, Singapore is due for its first review on human rights…

Dengue cases hiked to 311 cases during the past week

The National Environment Agency (NEA) reported that the cases of Dengue had…

谴责听证会审问异议者 加国学者声援覃炳鑫

再有国际学者跨海声援本地历史学者覃炳鑫博士,谴责新加坡国会“应对网络蓄意假消息”特选委员会,恶意打压覃博士针对新国历史的异议,严重侵害和不尊重学术自由,有必要向后者作出公开道歉。 加拿大大学讲师协会(CAUT)认可覃炳鑫博士的历史学者身份,专研上世纪5、60年代新加坡独立斗争史实。该协会以执行总监大卫罗宾逊名义,致函上述特委会主席暨新加坡国会副议长张有福,作出严正抗议。 该协会控诉,在今年3月由国会特选委员会召开的“应对网络蓄意假消息”的公开听证会,覃炳鑫遭六个小时的恶意盘问,已偏离原本要讨论的陈情书内容,实则藉此驳斥覃的历史观点和对政府的批评。 “覃炳鑫的研究已经受过同行的评议,但是在质询过程,特委会意图透过断章取义的方式,质疑覃炳鑫的历史观点。特选委员会的质询侵害了覃炳鑫的学术自由,以及在免于被当权者报复下发表其研究的权益。” 捍卫学者发表学术观点 拥有70万教职员会员的加拿大讲师协会称,该会致力捍卫学术自由,学者们传授、学习、研究和出版他们的研究或思想,应免于受任何体制或教条的规范、报复或歧视。 “覃博士受到的对待,彰显了新加坡当权者对待学界的态度,也威压国内其他学者行使他们的学术自由。” 为研究应对网路上蓄意散播的假消息,新加坡政府从2018年3月14日至29日,国会特选委员会召开公开听证会,广纳谏言,收集公民组织意见。在最后一天,却上演成律法部长沙姆甘针对覃炳鑫的审问。 然而,覃炳鑫提到1963年冷藏行动和1987年光谱逮捕行动,目的在于政治利益,而非国家安全问题,批评人民行动党和前总理李光耀,才是假新闻的散播者,引起律法部长善姆甘等人围剿。 针对上世纪50、60年代期间,新加坡是否有共产主义阴谋散布?左翼份子是否受马共唆使企图进行不利新加坡的政治活动,才有必要进行逮捕行动,覃炳鑫和善姆甘展开六小时的审问拉锯战。 质疑覃炳鑫历史观的理据 在过程中,善姆甘以“是或不是”、“同不同意”、“你有读过这些资料吗?”“对与否”等威权式的提问,无意与覃炳鑫对话,过度简化复杂的历史争议,其背后意图却是要质疑覃炳鑫历史研究的正当性和理据。…

Greenpeace Southeast Asia report says abuse of migrant fishers akin to modern slavery

Thirteen foreign distant water fishing vessels have been accused of abusing migrant…