Why Singapore's hyper-connectivity may be a boon for cybercriminals

By Zubaidah Jalil,



Singapore is one of the most digitally connected countries in South-East Asia. But cybercriminals are attempting to exploit its advanced networks and devices for their own ends, forcing the country to fortify its cyber-defences.

 
 By Zubaidah Jalil,Singapore's Ministry of Defence faced a considerable scare in February 2017.
A breach had been detected in its computer systems, indicating that the personal information of 850 national servicemen had been stolen, including their names, identification numbers, telephone numbers and dates of birth.
The ministry called the attack “targeted and carefully planned," and floated the possibility that the real motivation behind it was to gain access to official military secrets.
Later investigations revealed that the breach had occurred weeks before detection, with Second Minister for Defence Ong Ye Kung saying that it was "consistent with a covert attack, with means used to mask the perpetrator's actions and intent.”
Singapore’s vulnerability as a cyber target was later thrust under closer scrutiny when a report published by Israeli firm Checkpoint Security in September 2017 showed that it had emerged as the world's number one location for launching cyber attacks. 
But cybersecurity experts were careful to point out that a cyber attack recorded as coming from Singapore may in fact have originated elsewhere, thanks to its position as a vital artery for internet traffic flows. 
“It is highly possible that attackers leverage this connectivity and route attacks through Singapore using our local IP addresses to cover their tracks,” says David Koh, chief executive of Singapore’s Cyber Security Agency (CSA).
Another uneasy side effect of Singapore’s hyper-connectivity is the vulnerability that comes with the proliferation of internet-connected devices like IP cameras, Wi-Fi routers, and smart appliances - a phenomenon termed the Internet of Things (IoT). 
“People are usually early adopters here, so it comes with a lot of IoT devices,” says Aaron Eilat, general manager of cybertechnology research and design firm Custodio Technologies. 
An attacker need only use software to automatically scan the Internet for devices that can be easily hacked into. Once a network of infected devices, called a botnet, is amassed, they behave like digital footsoldiers, carrying out the attackers' bidding. 
Singapore’s Smart Nation initiative, which will see developments like tech-enabled homes, smart lamp posts and autonomous vehicles, means that the country's IoT engagement will only continue to deepen. 
At this juncture, a more pertinent question is perhaps not why the military breach occurred, but why such attacks don’t happen more frequently. 
Koh calls it “sheer chance” that the nation escaped largely unscathed in the wake of global attacks like the WannaCry ransomware attack, in a 2017 interview with Channel NewsAsia.

The attack allowed hackers to seize complete control of an organization's computers, threatening to destroy data unless payments in cryptocurrency were made. 
But the attack was relatively primitive, targeting vulnerabilities in older versions of Windows operating systems, which were not widely used in Singapore. In addition, unlike European targets, Singapore was not the intended aim.
“If it was, the result might have been different,” he says, pointing to how hospitals in Britain were forced to turn away non-critical patients as a result of MRI scanners, theatre equipment and blood-storage refrigerators being affected. 
Estimates placed the total destruction wrought by Wannacry at anywhere between hundreds of millions of dollars to several billion dollars, extending across some 200,000 computers in 150 countries.
The Singapore government has amplified efforts to buttress its digital defences, passing a Cybersecurity Bill in February that legally compels organizations serving critical areas - like energy, aviation and healthcare - to secure their infrastructure and report any suspicious incidents to the CSA.
“It puts requirements in place that weren’t necessarily there before. Part of the problem ... is that people don’t report it, it may be that the organization may not even know,” says Paul Hadjy, CEO and co-founder of Horangi Cyber Security.
The country has also signed a joint declaration with Germany to strengthen cybersecurity cooperation by pledging to exchange information and promote voluntary norms of responsible state behaviour in cyberspace.
But experts warn that even as defensive strategies become increasingly robust, so too does the level of sophistication and nefariousness of cyber attacks, fuelled in part by the Dark Web. 
The Dark Web refers to the part of the internet that isn’t trawled by search engines, allowing cybercriminals to congregate and trade malware codes under layers of secrecy and anonymity. 
“There are a lot of libraries and malware [codes] that you can obtain from the Dark Web. You wouldn’t know who’s asking for these resources... and what his intention is,” says Keoh Sye Loong, Associate Professor of Computing Science at University of Glasgow Singapore.
It’s a digital arms race that doesn’t augur a clear victor.
“It’s an area of high-innovation on both sides ... a constant battle,” says Hadjy. “I don’t ever see it ending.”


Comments (0)
New comment: