Photo from Shutterstock.com

The number of common cyber threats detected in Singapore saw a decrease in 2018, although Singapore continues to be the target of cyber-attacks by advanced actors. said the Cyber Security Agency of Singapore (CSA) in the Singapore Cyber Landscape 2018 publication on Tuesday (18 June).

The authority stated that common cyber threats – such as website defacements, phishing, ransomware and Command and Control (C&C) servers – were observed to have decreased in 2018 compared to the year before.

According to CSA’s report, 605 website defacements were detected in 2018, as compared to 2,040 in 2017.

It said that most of the defaced websites belonged to Small and Medium Enterprises (SMEs), although larger organisations, as well as two Singapore Government websites, were also affected.

Notably, CSA noted that it observed a spike in defacements in November 2018, likely caused by an attacker exploiting vulnerabilities in an unpatched web server. 101 websites – belonging to various businesses hosted on this web server – were compromised by the same attacker in a single day.

As for phishing, there was a 30 per cent decrease in phishing URLs with a Singapore-link, from 23,420 URLs in 2017 to 16,100 URLs in 2018.

Phishing emails typically spoof a legitimate source to trick users into clicking on dubious links or opening file attachments. Companies in the banking and financial services, technology and file hosting services made up almost 90 per cent of spoofed companies in 2018.

There were also 21 ransomware cases reported to CSA in 2018, a decrease from 25 in 2017. Ransomware remains lucrative and continues to evolve in sophistication.

CSA said that GandCrab, one of the more aggressive forms of ransomware, infected a private financial institution in Singapore in February 2018. Europol has warned that targeted attacks which are tailored to specific organisations such as GandCrab and SamSam, may become the new normal.

In 2018, CSA also observed about 300 unique C&C servers in Singapore, a 60 per cent decrease from 2017. In addition, almost 2,900 botnet drones with Singapore IP addresses were observed on a daily basis in 2018.

Of the 470 malware variants detected in 2018, five – Gamarue, Conficker, Mirai, WannaCry and Gamut – accounted for over half of the observed infections. The prevalence of these malware variants indicates that many users have yet to adopt protective measures such as patching their devices and using anti-virus software.

The Singapore Police Force reported that cybercrime continued to rise, with 6,179 cases reported in 2018 and accounting for about 19 percent of the overall crime in Singapore.

1,204 cases were investigated under the Computer Misuse Act, an increase of about 40 per cent compared to 2017. Online scams continued to be a concern, with about 2,125 e-commerce scams reported in 2018, where victims lost a total of about S$1.9 million.

According to the authorities, 70 per cent of such scams took place on e-commerce platform Carousell and involved electronic products and tickets to events and attractions. Separately, 378 business email impersonation scams were observed in 2018, up from 332 cases in 2017.

CSA noted that businesses in Singapore suffered losses of close to S$58 million in 2018, an increase of about 31 per cent from 2017.

Source: CSA.
Source: CSA.

Despite the decrease in the number of common cyber threats detected in 2018, CSA stressed that Singapore has been, and will continue to be, the target of cyber-attacks by Advanced Persistent Threat (APT) groups and other actors.

In 2018, notable incidents included cyber-attacks on SingHealth and a number of universities in Singapore. Other incidents where SingCERT rendered assistance included a compromise on a training institute’s web servers by crypto-mining malware and an email extortion scam on a member of the public by a scammer using the victim’s leaked email address and password.

“These incidents highlight the need for organisations, businesses and individuals to stay vigilant and strengthen their cybersecurity to keep pace with increasingly targeted and sophisticated threats,” said CSA.

The report also identified six anticipated cybersecurity trends in the near future, which include more frequent data breaches, increased threat to global supply chains and more disruptive attacks against the Cloud.

Smart buildings and connected systems will also face greater risks of attacks, given the proliferation of Internet of Things (IoT) devices and connected industrial control systems.

In addition, threat actors may leverage on Artificial Intelligence (AI) to search for vulnerabilities and create smarter malware. They are also likely to target and manipulate biometric data to build virtual identities and gain access to personal information.

Mr David Koh, Commissioner of Cybersecurity and Chief Executive of CSA, said, “Cybersecurity incidents made some of the biggest headlines in 2018. Data breaches across various industries affecting high-profile organisations were reported but smaller businesses and individual users were not spared either. We have to learn from these incidents and push further in our cybersecurity efforts collectively as a nation, so that we can defend ourselves against increasingly sophisticated threats and prepare ourselves for a digital future.”

 

Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments
You May Also Like

FAS must explain “unfair” and “not consistent” punishments: Jose Raymond

It is “grossly unfair” that seven footballers from an S-League team in…

严燕松视察客工在区内临时住所安排 每房不超过10人

工人党阿裕尼集选区议员严燕松,在昨日(11日)在脸书上发文指出,近日将有40名客工,被安置在勿洛蓄水池弯附近工地的临时住所。这些客工将在这里建设一所为本地社区服务的特殊教育学校。 他与该项目经理交流,讨论有关保障客工权益事宜,以及减少对社区造成的不便。 该项目预计2021年下半年竣工,这段时间客工都需要驻扎在工地。目前他们仍居住在工地外的客工宿舍,每日仍要往返工地。 严燕松也表示,“这些客工每间房住不超过10人,且有提供餐点和无线网络,让他们能够获得温饱,与家人保持联系。” 他也指出,尽管勿洛蓄水池居民目前无法亲自会见这些客工,但他也邀请居民一同向辛苦的客工表达感谢。 此外,他也将会定期参观一些附近的建筑工地,因此也吁请民众能够提供更多意见和向他们表达疑虑,并公开自己的联系方式(WhatsApp 89250747),方便居民联络。 严燕松在本届大选中协同贝里安毕丹星等人角逐阿裕尼集选区,以59.93%得票率成功守住该集选区。 一直以来关注弱势群体的严燕松,也在近日并持续推动“蓝色环保”(BlueCycle)活动,鼓励民众捐出物品,帮助社区中有需要的居民。

前警员非礼女嫌犯 判处1年监禁与鞭笞一下

一名高级警曹长对女嫌犯进行非礼行为,目前该名警员已被判处1年监禁以及鞭苔一下。 39岁前高级警曹长李斯杰,在警局盘问室内爆出六度向两名女嫌犯伸出狼手,要求女嫌犯提供性服务、包括口交、手淫、搂腰、袭胸等行为。对此,被告亦于周二(19日)认罪。 据了解,李斯杰任职裕廊警署总部高级警长及调查小组成员。他被指控于2017年6月对两名分别为28岁及29岁中国籍女嫌犯作出非礼行为,当时两人被指涉嫌卖淫服务,目前共面对4项包括触犯侮辱女性尊严、非礼、警察部队法令(Police Force Act)的控状。 李斯杰一开始并没有被指派到该次卖淫逮捕活动中,但他随后发现了逮捕行动,便主动提出协助展开调查,而调查小组也不以为意,接受李斯杰的请求。 再逮捕活动后,他将其中一名女嫌犯带到盘问室,当时该名女嫌犯是上手铐,而他开始盘问女嫌犯在色情网站列出什么服务,两度要她替他按摩,但被女嫌犯拒绝。 随后,他将门锁上,并告知女嫌犯里头并没有任何监控,于是他再次提出按摩要求,尽管当下女嫌犯非常不情愿,但碍于威胁,最终还是同意了,勉强为他按压肩膀。 她后来以戴上手铐不方便为由,无法继续想要停止按摩行为,但李斯杰却开始对她进行猥亵。女嫌犯高喊,试图离开却在因李斯杰环抱着无法动弹。 李斯杰随后,强迫拉她手摸自己下体索性服务,还扯她衣领一窥酥胸。得逞后,李斯杰又对另一名女嫌犯下手,他以调查任务将另名女嫌犯带到盘问室要她为自己手淫、口交,最后当她的面自慰并射精在墙上。 事情曝光是在五天后,女嫌犯在回到警局索取文件延长特别准证,向警署透露,最后警方也劝她正式报警。 法官认为,当时女嫌犯上铐是属执法行为,斥责被告滥用职权,也是加重刑罚的考量。…