Rear view of a male doctor with stethoscope in hospital ward from Shutterstock.com

More than 800,000 individuals who have donated blood or have attempted to do so in Singapore had their personal particulars placed at risk over the Internet due to unauthorised access by a Health Sciences Authority (HSA) vendor for over two months.

In a statement on Friday (15 Mar), HSA revealed that it was only alerted by “a cybersecurity expert” to a vulnerability in its database, which was stored in one of Secur Solutions Group Pte Ltd (SSG)’s servers, two days prior to its announcement.

The expert proceeded to inform the Personal Data Protection Commission regarding the vulnerability a day later, following which the Commission had promptly forwarded the matter to the HSA, as the Authority is responsible for handling Singapore’s blood bank.

HSA said that it had “immediately worked with SSG to disable access to the database”, in addition to making a police report regarding the breach.

At 9.35 am, 22 minutes after HSA had received the alert from the Commission regarding the breach, the Authority instructed SSG to disable access to the database.

According to HSA, the database was fully secured at 10 a.m. against any further unauthorised access.

An SSG spokesperson told Straits Times that the affected server “was immediately secured upon notification of the unauthorised access”.

“We have engaged external cyber security professionals, KPMG in Singapore, and initiated a thorough review of our IT systems. We are working closely with HSA and other authorities in continuing investigations,” added the spokesperson.

According to ST, the cybersecurity expert, who HSA has declined to identify, is foreign and is based overseas.

“The expert has confirmed to HSA that he does not intend to disclose the contents of the database,” said the Authority, adding: “HSA is in contact with the expert on deleting the information”.

“SSG provides services to HSA and was working on a database containing registration-related information of 808,201 blood donors”, said HSA.

Some of the information stored in the database include those regarding the “name, NRIC, gender, number of blood donations, dates of the last three blood donations, and in some cases, blood type, height and weight” of over 800,000 people who have donated or registered to donate blood in Singapore since 1986.

However, the Authority assured that “the database contained no other sensitive, medical or contact information”.

HSA added that “no other unauthorised person had accessed the database” according to “preliminary findings from HSA’s review of the database logs”.

“HSA had provided the data to SSG for updating and testing,” according to the Authority.

ST reported that the relevant databases were HSA’s Westgate Tower and Woodlands blood banks’ databases.

The data was also provided by HSA to SSG for “testing purposes after some donors said their data was outdated”.

“SSG placed the information in an internet-facing server on 4 Jan 2019 and failed to institute adequate safeguards to prevent unauthorised access.

“It had done so without HSA’s knowledge and approval, and against its contractual obligations with HSA,” said the Authority.

Chief Executive Officer of HSA Dr Mimi Choong said in response to the breach: “We sincerely apologise to our blood donors for this lapse by our vendor.

“We would like to assure donors that HSA’s centralised blood bank system is not affected.

“HSA will also step up checks and monitoring of our vendors to ensure the safe and proper use of blood donor information,” she added.

The Authority had also urged concerned donors whose particulars may have been affected by the breach to contact the Authority at its hotline number: 62200183.

The HSA database breach is the third cybersecurity breach concerning public healthcare databases in Singapore that has been reported thus far in recent months, following the HIV registry leak and Singapore’s largest cyberattack to date, the SingHealth data breach involving the particulars of around 1.5 million patients, including those of Prime Minister Lee Hsien Loong.

Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments
You May Also Like

小贩休假一周前未通知将罚款 司徒国辉再揭社企小贩中心苛刻合约

本地美食家司徒国辉,揭露本地社会企业管理小贩中心,在合约中限定小贩们必须24小时营业,每周两日周休。如果小贩要另行请假,则需在一个月内通知管理层,否则将遭罚款250元。 他在个人脸书专页,张贴疑是淡滨尼综合小贩中心的摊位租赁合约部分内容。其中提到,小贩如要请假必须一周前通知租约许可人,否则需付违约赔偿金,从销售退款支票中扣除250元。而如果小贩在一个月内未通知就休假超过五次,许可人有权终止合约,租户还需赔偿损失。 对于一再重犯的租户,需赔偿高达每日500元的违约金。 司徒国辉认为,假设是在私人商场或食阁,买卖租赁都是自由选择,地主肯定可以随喜好征收费用或订合约。但是搞社会企业和管理公共资助的小贩中心,就请不要这么做。 他认为,社企有责任确保公众享有经济美食,而不是增加小贩成本和消费者的开销。 “请想想,如果家中小孩或长辈临时有急事,小贩需临时休业回家处理,如果管理层认为小贩无故休假多日,难道要罚他每日500元的赔偿金?” 连放多少蔬菜、卡路里都要管 他揭露,有关社企小贩中心合约洋洋洒洒51页,甚至有条文限定每盘菜肴该有多少蔬菜和卡路里;例如椰浆饭没有放黄瓜片就不算合格。 “再者,如果小贩无法维持国家环境局的’A’级卫生指标,也会被当作违约。即便有些参观也很难长期维系卫生指标,更何况是新手小贩?” 感到这些繁文缛节对小贩绑手绑脚,司徒国辉呼吁有关管理层砍掉这些不必要的束缚,小贩反而能放开手去做,肯定能吸引更多食客到来。他提醒,小贩事业需要的是扶持才能蓬勃成长,而不是用惩处规章诸多掣肘。 一些读者看到司徒国辉的贴文,也留言分享本身经历。网民Brian Liew说,原本和获颁有意申请淡滨尼综合中心的小贩档口。但是看见其中设定的不合理规章、租金和条件,令他打退堂鼓。…

CPF Life – How can fund become insolvent and thus stop payouts?

Manpower Minister’s assurance on payouts is confusing. Leong Sze Hian.

Late LG Ng rejected PM Lee’s offer to “live off” Govt unlike LGs Desmond Kuek and Ng Yat Chung

Earlier this month (2 Jan), Singapore’s second Chief of Defence Force (CDF),…