www.straitstimes.com
Open in
urlscan Pro
152.195.53.15
Public Scan
URL:
https://www.straitstimes.com/singapore/no-reason-to-believe-singapore-was-a-target-in-fireeye-hack-csa
Submission: On May 14 via api from US — Scanned from DE
Submission: On May 14 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
The Straits Times Toggle navigation THE STRAITS TIMES SINGAPORE THE STRAITS TIMES Edition : * International * Singapore MAIN NAVIGATION * Home * Singapore Toggle Dropdown * Jobs * Housing * Parenting & Education * Politics * Health * Transport * Courts & Crime * Consumer * Environment * Community * Asia Toggle Dropdown * SE Asia * East Asia * South Asia * Australia/NZ * World Toggle Dropdown * United States * Europe * Middle East * Opinion Toggle Dropdown * ST Editorial * Cartoons * Forum * Life Toggle Dropdown * Food * Entertainment * Style * Travel * Arts * Motoring * Home & Design * Business Toggle Dropdown * Economy * Invest * Banking * Companies & Markets * Property * Tech Toggle Dropdown * Tech News * E-sports * Reviews * Sport Toggle Dropdown * Football * Schools * Formula One * Combat Sports * Basketball * Tennis * Golf * More Toggle Dropdown * Opinion * Life * Business * Tech * Sport * Videos * Podcasts * Multimedia * LOG IN * Subscribe * E-paper Toggle navigation The Straits Times Toggle navigation * LOG IN * Subscribe Edition * International * Singapore * ST Read & Win * E-paper MAIN NAVIGATION * Home * Singapore Toggle Dropdown * Jobs * Housing * Parenting & Education * Politics * Health * Transport * Courts & Crime * Consumer * Environment * Community * Asia Toggle Dropdown * SE Asia * East Asia * South Asia * Australia/NZ * World Toggle Dropdown * United States * Europe * Middle East * Opinion Toggle Dropdown * ST Editorial * Cartoons * Forum * Life Toggle Dropdown * Food * Entertainment * Style * Travel * Arts * Motoring * Home & Design * Business Toggle Dropdown * Economy * Invest * Banking * Companies & Markets * Property * Tech Toggle Dropdown * Tech News * E-sports * Reviews * Sport Toggle Dropdown * Football * Schools * Formula One * Combat Sports * Basketball * Tennis * Golf * More Toggle Dropdown * Opinion * Life * Business * Tech * Sport * Videos * Podcasts * Multimedia * SPH Websites * news with benefits * SPH Rewards * STJobs * STClassifieds * SITES * Berita Harian * Hardwarezone * Shin Min Daily News * STOMP * SGCarMart * SRX Property * tabla * Tamil Murasu * The Business Times * The New Paper * zaobao.sg * Obits.sg * Advertise with us NO REASON TO BELIEVE SINGAPORE WAS A TARGET IN FIREEYE HACK: CSA FireEye, one of the largest cyber security companies in the United States, said earlier this month that it was hacked in a state-sponsored attack. ST PHOTO: KELVIN CHNG Hariz Baharudin Indonesia Correspondent Updated Dec 17, 2020, 6:27 AM SGT Published Dec 16, 2020, 11:43 AM SGT Facebook WhatsApp Twitter More Whatsapp Linkedin FB Messenger Telegram Twitter Reddit WeChat Pinterest Print Purchase Article Copy permalinkCopy to clipboard https://str.sg/Jauw SINGAPORE - There is no reason to believe that Singapore was a target of the recent high-profile hacking attack involving cyber security firm FireEye and software provider SolarWinds Corp, authorities said late on Tuesday (Dec 15). Even so, the Cyber Security Agency of Singapore (CSA) said that it has sent out an advisory on Dec 9 for firms to disconnect affected cyber security tools and update their systems to protect against cyber criminals. FireEye, one of the largest cyber security companies in the United States, said earlier this month that it was hacked in a state-sponsored attack. The firm's hacking tools, which are used to test the defences of its clients, was stolen in the process. The theft stems from malicious code injected by hackers into US-based SolarWinds software that FireEye used, the cyber security firm said this week after conducting an investigation. The software facilitates the monitoring of computer networks of businesses and governments for outages. The malware, in the form of a software update, reportedly allowed hackers to spy on secure information at some of the top agencies in the US. The attack on FireEye, which holds a range of contracts in the United States and its allies, is among the most significant breaches in recent memory. The firm, which last month reported an all-time record revenue of US$238 million ($317 million) for the third quarter of this year, provides services for international Government agencies. Get a round-up of the top stories to start your day Thank you! Sign up By signing up, you agree to our Privacy Policy and T&Cs. It also works with big name firms like telecommunications company Vodafone, the Bank of Thailand and lighting company Signify, which was previously known as Philips Lighting. The company is a strategic partner of CSA, which oversees national cyber security functions and protects Singapore's critical services. CSA told The Straits Times that based on its understanding, the scope of the FireEye attack was limited and did not affect Singapore. "Based on the information from FireEye, the attack was highly targeted, with the breach limited to FireEye's US offices. There has been no evidence to suggest that Singapore was or would be a target," it said. The agency sent an advisory to Critical Information Infrastructure (CII) leaders, to work with their security vendors and update their systems so that they can be protected from the stolen FireEye tools. SOFTWARE UPDATE Hackers had gained access through a SolarWinds software called Orion, using malware disguised as a software update. SolarWinds provides network-monitoring and other technical services to thousands of organisations around the world, including most Fortune 500 companies and government agencies in North America, Europe, Asia and the Middle East. The firm has an office in Suntec City. According to reports, more than 18,000 private and government users had downloaded this tainted software update, which reportedly allowed hackers to monitor internal e-mails at some of the top agencies in the US. The Singapore Computer Emergency Response Team (SingCert) had, in a public advisory on its website on Monday, advised organisations to disconnect or power down SolarWinds Orion products from their networks immediately. SingCert is a unit of CSA. "Administrators should also review the logs for suspicious activities, check connected systems for signs of compromise and persistence mechanisms, and reset credentials if necessary, especially ones used by or stored in SolarWinds software," said CSA. "Administrators are also advised to monitor their networks and systems for any suspicious activities." More On This Topic US Homeland Security, thousands of businesses scramble after suspected Russian hack FireEye hack portends a scary era of cyber insecurity CSA said that it has been in close contact with the US Cybersecurity and Infrastructure Security Agency, as well as FireEye. They have both provided CSA with more information, which the agency said has helped it to better advise on preventive measures to take. FireEye took swift action to mitigate the threat and alert their partners, customers and other cyber security vendors, so that appropriate action can be taken quickly, said CSA. According to FireEye's statement, there is evidence to show the attackers are state-sponsored and highly sophisticated. CSA has urged organisations to be vigilant. Associate Professor Chang Ee-Chien from the National University of Singapore's School of Computing said that the attacks in this case are likely to affect larger organisations instead of home users. "State-sponsored attacks typically have large resources and political goals. They do not direct towards home users but would have significant targets, for example an attack on financial institutions or power systems," he said. More On This Topic Hackers attack US cyber-security firm FireEye; Russia suspected FireEye discovered SolarWinds breach while probing own hack -------------------------------------------------------------------------------- HERE'S A LOOK AT WHAT HAPPENED Highly secure US government information, potentially involving some of its top agencies, was targeted in a sophisticated hacking incident - one of the biggest in recent years. Malicious code was hidden in updates to a popular software called Orion, made by the US company SolarWinds, which monitors networks of businesses and governments for outages. With the code, hackers were able to access an organisation's networks to steal data. Prominent cyber security company FireEye, which itself uses SolarWinds, said earlier this week that it had experienced a breach due to the software. FireEye supplies services to international government agencies as well as banks, telecommunications providers and electricity companies. More than 18,000 private and government users are reported to have downloaded the tainted Orion software update, which could have allowed hackers to monitor internal e-mails and steal information. Agencies that may have been impacted include the Centres for Disease Control and Prevention in the US, as well as the country's State Department and the Justice Department. It has been reported that last year, SolarWinds was alerted to the fact that anyone could access its update server by using the password "solarwinds123", exposing a jarring vulnerability in the firm's system. WHO IS AFFECTED It is likely that the scale of the attack is global, given how SolarWinds provides network-monitoring and other technical services to thousands of organisations. This includes most Fortune 500 companies and government agencies in North America, Europe, Asia and the Middle East. Due to Orion's design - to look for problems in a computer network - experts have said that it could give hackers a thorough view of an organisation, as well as deep access into its systems. SolarWinds said that it sent an advisory on Dec 13 to about 33,000 of its Orion customers who might have been affected, though it estimated a smaller number of customers - fewer than 18,000 - had actually installed the compromised product update earlier this year. WHO IS RESPONSIBLE AND WHAT'S NEXT? SolarWinds said an "outside nation state" infiltrated its systems with malware, but neither the US government nor the affected companies have publicly identified the hackers. A US official, speaking on condition of anonymity because of an ongoing investigation, told The Associated Press on Monday that Russian hackers are suspected. Russia responded the same day to say it had "nothing to do with" the hacking. SolarWinds may face legal action from private customers and government entities affected by the breach. Singapore's Computer Emergency Response Team (SingCert), a unit of the Cyber Security Agency of Singapore (CSA), has recommended that organisations disconnect or power down SolarWinds Orion products from their networks immediately. Save more every month with our annual plan: unlimited access, better price. ST One Digital - Annual $9.90 $4.95/month Get offer Billed at $59.40 for the first year, $118.80/ year thereafter. ST One Digital - Monthly 29.90 S$9.90/month Subscribe now No lock-in contract. Unlock these benefits * All subscriber-only content on ST app and straitstimes.com * Easy access any time via ST app on 1 mobile device * E-paper with 2-week archive so you won't miss out on content that matters to you Join ST's Telegram channel and get the latest breaking news delivered to you. * Cyber security * Cyber warfare * Hacking Facebook WhatsApp Twitter More Whatsapp Linkedin FB Messenger Telegram Reddit WeChat Pinterest Print Purchase Article Copy permalink https://str.sg/Jauw Read this subscriber-only article for free! Just sign up for a free account and log in to continue reading. No reason to believe Singapore was a target in FireEye hack: CSA Sign up Already have an account? Log in. All done! This article is now fully available for you No reason to believe Singapore was a target in FireEye hack: CSA Read now Please verify your e-mail to read this subscriber-only article in full No reason to believe Singapore was a target in FireEye hack: CSA Resend verification e-mail The gift link for this subscriber-only article has expired. Get unlimited access to all stories at $0.99/month for the first 3 months. Subscribe now You have reached your limit of subscriber-only articles this month. Get unlimited access to all stories at $0.99/month for the first 3 months. Subscribe now Read and win! Read 3 articles and stand to win rewards Let's go! Terms & conditions apply Frequently asked questions Good job, you've read 3 articles today! Spin the wheel now Let's go! Terms & conditions apply Frequently asked questions FROM AROUND THE WEB Ad [Fotos] 30 Fotos, die wirklich zum Nachdenken anregen Read More Doctor Report Ad [Bilder] Annalena Baerbocks Millionen-Villa steht jetzt zum Verkauf, sehen Sie selbst Read More Paperela Ad [Fotos] Kamera gefangen Menschen tun die meisten seltsame Dinge im Walmart Read More Hollywood Tale Ad [Fotos] Hochzeitsfotos, die mehr als peinlich sind Read More Authors Pick Ad Grow with Siemens. Accelerate your career & boost your skills and knowledge. Siemens Ad Investors turning to art for diversification - here's why Business Times Ad Manufacturing: are your supply chains safe? Learn More Dassault Systèmes Ad Erkunden Sie New Jersey: Neun tolle Gründe für einen unvergesslichen Besuch New Jersey Travel & Tourism Ad [Fotos] Annalena Baerbocks Millionen-Villa steht jetzt zum Verkauf, sehen Sie selbst Read More Paperela Ad [Fotos] 21 wilde, perfekt getimte Bilder unzensiert Read More Divorce Pay Day Ad Leiden Sie unter Knieschmerzen? Suchen Sie jetzt nach Behandlungsmöglichkeiten Knieschmerzen Behandlung | Suchanzeigen Ad Neuropathy & Nerve Damage? Do This Immediately (Watch) Growth Advice Ad Suche nach Sterbegeldversicherung Vergleich Suchanzeigen Ad Annual Report: L’Oréal’s performances are online L'Oréal Finance THE STRAITS TIMES Available for iPhones and iPads Available in Google Play * E-paper * Facebook * Instagram * Twitter * LinkedIn * Podcasts * RSS Feed * Telegram * Youtube * TikTok * Singapore * Asia * World * Opinion * Life * Business * Tech * Sport * Videos * Podcasts * Multimedia * About Us * Terms & Conditions * Privacy Policy * Need help? Reach us here. * Advertise with us Sign up for our daily newsletter Thank you! Sign up More newsletters By registering, you agree to our T&C and Privacy Policy. MCI (P) 076/10/2022, MCI (P) 077/10/2022. Published by SPH Media Limited, Co. Regn. No. 202120748H. Copyright © 2023 SPH Media Limited. All rights reserved. Back to the top search by queryly Advanced Search ✓ Thanks for sharing! AddToAny More…