In a cross-examination that lasted more than two hours on Friday (28 Sep), deputy director at the Chief Information Officer’s Office at SingHealth Clarence Kua was probed by the Committee of Inquiry (COI) as to why he had overlooked an alleged security flaw in SingHealth’s Electronic Medical Records (EMR) in 2014.

The sixth day of the public hearing witnessed Mr Kua, who is employed with the Integrated Health Information Systems (IHiS), being cross-examined by COI’s chairman Richard Magnus and deputy public prosecutor Sarah Shi regarding his failure to respond to an email he had received from then-chief executive officer of IHiS Chong Yoke Sin on 18 Sep 2014.

Mr Kua reiterated multiple times that “My focus was to double-check the private email address of Mr Zhao to verify that he was the person who had sent the email to Epic Systems,” to which Mr Magnus responded: “You can focus on two things at the same time.”

IHiS system analyst Zhao Hainan had flagged an alleged “loophole” in the EMR system, supplied by Allscripts Healthcare Solutions, that could allow hackers to “gain admin control of the whole database easily”, and “this could lead to a serious medical data leak, or even a national security threat.” 

Zhao had originally sent the email to Epic Systems, a competitor of Allscripts, in a bid to get the former to contact him regarding the coding flaw. However, it was noted that Allscripts managed to get a hold of the email, and had subsequently forwarded it to Dr Chong.

Chief executive officer of the Asia-Pacific base of Allscripts David Chambers notified Dr Chong via email, highlighting the seriousness of the matter, and must be accepted as “genuine,” as Mr Zhao had worked for Allscripts in its development laboratory.

Dr Chong attempted to contact Mr Kua for the second time via email on the same day in a bid to get him to perform a verification process that will help confirm Mr Zhao’s role in the alleged “loophole” email. Subsequently, he also dismissed Mr Zhao, and had his accounts with IHiS and SingHealth terminated immediately.

Mr Zhao had confessed in a private hearing on Thursday that he was “angry” with IHiS and Allscripts over not being allowed to do coding, and that as a result, he would not have shared details of the flaw with IHiS to help the organisation, according to IHiS’ lawyer senior counsel Philip Jeyaretnam.

The testimony of Mr Zhao’s supervisor, Ms Angela Chen, on Friday however, contradicted Mr Jeyaretnam’s statement. She claimed that Mr Zhao was a “very good worker” and “technically strong,” and that he had a healthy relationship with his colleagues.

IHiS director of programme delivery for clinical care Foong Lai Choo also received the first email sent by Dr Chong to Mr Kua.

Ms Foong, who is in charge of the operations and management of the EMR system, claimed that “the loophole was not a big deal” upon first impression, and thus did not take action to investigate it, saying: “I believe there was some communication between Mr Chambers from Allscripts and (Dr Chong) but I was not included in the communications.

“I do not know what action, if any, was taken by Allscripts in relation to this matter.”

She also revealed that while IHiS had immediately made a police report, the case was subsequently closed. 

Server left running in the absence of security updates, making the system susceptible to the cyberattack in July

On Thursday (27 Sep), it was revealed that a server within the National Cancer Centre (NCC) at the Singapore General Hospital was infected by a virus after being left to run without any security updates for a year, which made room for the cybersecurity breach of the medical data of approximately 1.5 million patients under the SingHealth system.

While no data was stolen from the server itself, that particular server as well as several others of its kind were manipulated by the hackers as means to infiltrate the Sunrise Clinical Manager, a platform that houses electronic medical records of patients under SingHealth.

It was alleged that a senior manager at the NCC had, unbeknownst to a senior officer at IHiS, had assumed the role of managing the server in 2016 as a part of a “convenient arrangement”.

Tan Aik Chin was given the login details of the local administrator account to the server between 2014 and 2015 in the event that IHiS staff required assistance regarding troubleshooting of the server.

Mr Tan acknowledged that the last time he had updated the server was in May last year upon IHiS’ instruction to update “all Windows servers” as a measure to combat the spread of the WannaCry ransomware, which took place worldwide.

He also revealed that he was resting on the assumption that the server would “automatically” be updated and had already contained antivirus software.

Upon receiving alerts that the server was infected, he was told to disconnect the server from the SingHealth network, and to subsequently install a new antivirus software after uninstalling the old one.

A scan he performed revealed that there were “three threats,” two of which “had been cleaned” while “one was quarantined,” all of which he did not understand why.

Following the scan, he reconnected the server to the SingHealth network and performed a manual update, after which he ran another full scan that showed zero threats.

Director of the infrastructure services division in IHiS Serena Yong — who is the highest-ranking government officer to have testified before the COI to date since the public hearings began on Sep 21 — said that she had no knowledge of Mr Tan’s role in handling the server, and that it was only after the cybersecurity breach was exposed on 10 Jul that she found out about his involvement.

Ms Yong was tasked to supervise and to make recommendations regarding software updates, having had previous experience in end-user computing solutions in IHiS since 2009. She was appointed as director this year.

She also revealed having received alerts regarding “problems” related to the Sunrise Clinical Manager database between 7-8 Jul.

While she was told by her deputy director that there would be a meeting on 9 Jul, she said that “she did not get the impression that it was a serious problem”. Additionally, she did not ask her staff members to run tests in the database after the meeting.

On Wednesday (26 Sep), it was revealed that it was only the day after the meeting that an IHiS staff discovered that a query returned data.

Ms Yong, upon further probing by Mr Magnus on Thursday, said that she was unaware of the attempt to extract the first 100,000 electronic medical records.

The COI on the SingHealth cyber attack, which was dubbed as the largest data breach in Singapore’s history. was convened on 24 Jul.

Chaired by former Chief District Judge and current member of the Public Service Commission, Mr Richard Magnus, the COI comprises four members who were tasked to probe into the cybersecurity breach against SingHealth’s patients’ records in early July, which affected the personal medical data, such as the outpatient prescriptions of 1.5 million SingHealth patients, including that of Prime Minister Lee Hsien Loong.

Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments
You May Also Like

【冠状病毒19】8月25日 31例新增例确诊 一例入境病例

根据卫生部文告,截至本月25日中午12时,本地新增31例冠病19确诊,一例入境病例,没有社区病例。 本地累计确诊已增至5万6435例。 入境病例在入境我国后履行居家通知,其余病例是正在隔离的客工。 当局仍在收集病例详情,并将在晚间公布。

MOM: Telecommuting should be allowed by companies where "reasonably practicable"

Companies that do not provide telecommuting measures for workers at jobs that…

【马国政坛】安华单方面宣称慕尤丁政府倒台

邻国马来西亚在今年2月才刚经历希盟政府倒台,时隔7个月后,公正党主席安华突然在今午(23日)单方面宣布,本身已掌握三分二国会议席优势,现任国盟首相慕尤丁政府倒台。 他自称不是五至六位多数议员的微弱优势,而是已获得稳固的多数国会议员的支持。 马国有222国席,要掌握马国简单多数议席,需要得到112议员支持。三分二则是148席。 安华原本昨日(22日)应前往觐见国家元首,惟国家元首因病在国家心脏中心接受治疗而搁置,他表示在昨晚已致电祝福元首早日康复。 他宣称,所获得支持大多来自马来和穆斯林国会议员,他将在近期觐见国家元首,宣布进一步详情。 他强调,新政权是在多数马来人、土著和各族公平的代表下,属于能代表全民的政府。除了捍卫各族权益,也会继续捍卫马国宪法原则、承认伊斯兰地位、马来统治者主权、巩固马来语作为国语和土著权益等。 据了解,马国现任首相慕尤丁,仍会在下午下午2时30分透过电视台发表特别演说。

Ministerial Pay – The Frankenstein’s monster that won’t go away

Joshua Chiang/ When the proposal to benchmark ministers’ salaries to those of…