www.straitstimes.com Open in urlscan Pro
152.195.53.15  Public Scan

URL: https://www.straitstimes.com/singapore/no-reason-to-believe-singapore-was-a-target-in-fireeye-hack-csa
Submission: On May 14 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

The Straits Times Toggle navigation


THE STRAITS TIMES


SINGAPORE


THE STRAITS TIMES

Edition :
 * International
 * Singapore


MAIN NAVIGATION

 * Home
 * Singapore Toggle Dropdown
   * Jobs
   * Housing
   * Parenting & Education
   * Politics
   * Health
   * Transport
   * Courts & Crime
   * Consumer
   * Environment
   * Community
 * Asia Toggle Dropdown
   * SE Asia
   * East Asia
   * South Asia
   * Australia/NZ
 * World Toggle Dropdown
   * United States
   * Europe
   * Middle East
 * Opinion Toggle Dropdown
   * ST Editorial
   * Cartoons
   * Forum
 * Life Toggle Dropdown
   * Food
   * Entertainment
   * Style
   * Travel
   * Arts
   * Motoring
   * Home & Design
 * Business Toggle Dropdown
   * Economy
   * Invest
   * Banking
   * Companies & Markets
   * Property
 * Tech Toggle Dropdown
   * Tech News
   * E-sports
   * Reviews
 * Sport Toggle Dropdown
   * Football
   * Schools
   * Formula One
   * Combat Sports
   * Basketball
   * Tennis
   * Golf
 * More Toggle Dropdown
   * Opinion
   * Life
   * Business
   * Tech
   * Sport
   * Videos
   * Podcasts
   * Multimedia

 * LOG IN
 * Subscribe

   
 * E-paper


Toggle navigation

The Straits Times Toggle navigation
 * LOG IN
 * Subscribe

Edition
 * International
 * Singapore


 * ST Read & Win

   
 * E-paper


MAIN NAVIGATION

 * Home
 * Singapore Toggle Dropdown
   * Jobs
   * Housing
   * Parenting & Education
   * Politics
   * Health
   * Transport
   * Courts & Crime
   * Consumer
   * Environment
   * Community
 * Asia Toggle Dropdown
   * SE Asia
   * East Asia
   * South Asia
   * Australia/NZ
 * World Toggle Dropdown
   * United States
   * Europe
   * Middle East
 * Opinion Toggle Dropdown
   * ST Editorial
   * Cartoons
   * Forum
 * Life Toggle Dropdown
   * Food
   * Entertainment
   * Style
   * Travel
   * Arts
   * Motoring
   * Home & Design
 * Business Toggle Dropdown
   * Economy
   * Invest
   * Banking
   * Companies & Markets
   * Property
 * Tech Toggle Dropdown
   * Tech News
   * E-sports
   * Reviews
 * Sport Toggle Dropdown
   * Football
   * Schools
   * Formula One
   * Combat Sports
   * Basketball
   * Tennis
   * Golf
 * More Toggle Dropdown
   * Opinion
   * Life
   * Business
   * Tech
   * Sport
   * Videos
   * Podcasts
   * Multimedia

 * SPH Websites
   * news with benefits
   * SPH Rewards
   * STJobs
   * STClassifieds
   * SITES
   * Berita Harian
   * Hardwarezone
   * Shin Min Daily News
   * STOMP
   * SGCarMart
   * SRX Property
   * tabla
   * Tamil Murasu
   * The Business Times
   * The New Paper
   * zaobao.sg
   * Obits.sg
   * Advertise with us





NO REASON TO BELIEVE SINGAPORE WAS A TARGET IN FIREEYE HACK: CSA


FireEye, one of the largest cyber security companies in the United States, said
earlier this month that it was hacked in a state-sponsored attack. ST PHOTO:
KELVIN CHNG
Hariz Baharudin
Indonesia Correspondent
Updated
Dec 17, 2020, 6:27 AM SGT
Published
Dec 16, 2020, 11:43 AM SGT
Facebook WhatsApp Twitter More
Whatsapp Linkedin FB Messenger Telegram Twitter Reddit WeChat Pinterest Print
Purchase Article Copy permalinkCopy to clipboard
https://str.sg/Jauw


SINGAPORE - There is no reason to believe that Singapore was a target of the
recent high-profile hacking attack involving cyber security firm FireEye and
software provider SolarWinds Corp, authorities said late on Tuesday (Dec 15).

Even so, the Cyber Security Agency of Singapore (CSA) said that it has sent out
an advisory on Dec 9 for firms to disconnect affected cyber security tools and
update their systems to protect against cyber criminals.

FireEye, one of the largest cyber security companies in the United States, said
earlier this month that it was hacked in a state-sponsored attack. The firm's
hacking tools, which are used to test the defences of its clients, was stolen in
the process.



The theft stems from malicious code injected by hackers into US-based SolarWinds
software that FireEye used, the cyber security firm said this week after
conducting an investigation.

The software facilitates the monitoring of computer networks of businesses and
governments for outages.

The malware, in the form of a software update, reportedly allowed hackers to spy
on secure information at some of the top agencies in the US.




The attack on FireEye, which holds a range of contracts in the United States and
its allies, is among the most significant breaches in recent memory. The firm,
which last month reported an all-time record revenue of US$238 million ($317
million) for the third quarter of this year, provides services for international
Government agencies.

Get a round-up of the top stories to start your day
Thank you!
Sign up

By signing up, you agree to our Privacy Policy and T&Cs.

It also works with big name firms like telecommunications company Vodafone, the
Bank of Thailand and lighting company Signify, which was previously known as
Philips Lighting.

The company is a strategic partner of CSA, which oversees national cyber
security functions and protects Singapore's critical services. CSA told The
Straits Times that based on its understanding, the scope of the FireEye attack
was limited and did not affect Singapore.

"Based on the information from FireEye, the attack was highly targeted, with the
breach limited to FireEye's US offices. There has been no evidence to suggest
that Singapore was or would be a target," it said.



The agency sent an advisory to Critical Information Infrastructure (CII)
leaders, to work with their security vendors and update their systems so that
they can be protected from the stolen FireEye tools.


SOFTWARE UPDATE

Hackers had gained access through a SolarWinds software called Orion, using
malware disguised as a software update.

SolarWinds provides network-monitoring and other technical services to thousands
of organisations around the world, including most Fortune 500 companies and
government agencies in North America, Europe, Asia and the Middle East. The firm
has an office in Suntec City.

According to reports, more than 18,000 private and government users had
downloaded this tainted software update, which reportedly allowed hackers to
monitor internal e-mails at some of the top agencies in the US.

The Singapore Computer Emergency Response Team (SingCert) had, in a public
advisory on its website on Monday, advised organisations to disconnect or power
down SolarWinds Orion products from their networks immediately. SingCert is a
unit of CSA.

"Administrators should also review the logs for suspicious activities, check
connected systems for signs of compromise and persistence mechanisms, and reset
credentials if necessary, especially ones used by or stored in SolarWinds
software," said CSA.

"Administrators are also advised to monitor their networks and systems for any
suspicious activities."

More On This Topic
US Homeland Security, thousands of businesses scramble after suspected Russian
hack
FireEye hack portends a scary era of cyber insecurity

CSA said that it has been in close contact with the US Cybersecurity and
Infrastructure Security Agency, as well as FireEye.

They have both provided CSA with more information, which the agency said has
helped it to better advise on preventive measures to take.

FireEye took swift action to mitigate the threat and alert their partners,
customers and other cyber security vendors, so that appropriate action can be
taken quickly, said CSA.

According to FireEye's statement, there is evidence to show the attackers are
state-sponsored and highly sophisticated. CSA has urged organisations to be
vigilant.

Associate Professor Chang Ee-Chien from the National University of Singapore's
School of Computing said that the attacks in this case are likely to affect
larger organisations instead of home users.

"State-sponsored attacks typically have large resources and political goals.
They do not direct towards home users but would have significant targets, for
example an attack on financial institutions or power systems," he said.

More On This Topic
Hackers attack US cyber-security firm FireEye; Russia suspected
FireEye discovered SolarWinds breach while probing own hack

--------------------------------------------------------------------------------


HERE'S A LOOK AT WHAT HAPPENED

Highly secure US government information, potentially involving some of its top
agencies, was targeted in a sophisticated hacking incident - one of the biggest
in recent years.

Malicious code was hidden in updates to a popular software called Orion, made by
the US company SolarWinds, which monitors networks of businesses and governments
for outages.

With the code, hackers were able to access an organisation's networks to steal
data.

Prominent cyber security company FireEye, which itself uses SolarWinds, said
earlier this week that it had experienced a breach due to the software. FireEye
supplies services to international government agencies as well as banks,
telecommunications providers and electricity companies.

More than 18,000 private and government users are reported to have downloaded
the tainted Orion software update, which could have allowed hackers to monitor
internal e-mails and steal information.

Agencies that may have been impacted include the Centres for Disease Control and
Prevention in the US, as well as the country's State Department and the Justice
Department.

It has been reported that last year, SolarWinds was alerted to the fact that
anyone could access its update server by using the password "solarwinds123",
exposing a jarring vulnerability in the firm's system.


WHO IS AFFECTED

It is likely that the scale of the attack is global, given how SolarWinds
provides network-monitoring and other technical services to thousands of
organisations.

This includes most Fortune 500 companies and government agencies in North
America, Europe, Asia and the Middle East.

Due to Orion's design - to look for problems in a computer network - experts
have said that it could give hackers a thorough view of an organisation, as well
as deep access into its systems.

SolarWinds said that it sent an advisory on Dec 13 to about 33,000 of its Orion
customers who might have been affected, though it estimated a smaller number of
customers - fewer than 18,000 - had actually installed the compromised product
update earlier this year.


WHO IS RESPONSIBLE AND WHAT'S NEXT?

SolarWinds said an "outside nation state" infiltrated its systems with malware,
but neither the US government nor the affected companies have publicly
identified the hackers.

A US official, speaking on condition of anonymity because of an ongoing
investigation, told The Associated Press on Monday that Russian hackers are
suspected. Russia responded the same day to say it had "nothing to do with" the
hacking.

SolarWinds may face legal action from private customers and government entities
affected by the breach.

Singapore's Computer Emergency Response Team (SingCert), a unit of the Cyber
Security Agency of Singapore (CSA), has recommended that organisations
disconnect or power down SolarWinds Orion products from their networks
immediately.

Save more every month with our annual plan: unlimited access, better price.

ST One Digital - Annual

$9.90 $4.95/month
Get offer
Billed at $59.40 for the first year, $118.80/ year thereafter.



ST One Digital - Monthly

29.90 S$9.90/month
Subscribe now
No lock-in contract.



Unlock these benefits

 * All subscriber-only content on ST app and straitstimes.com
 * Easy access any time via ST app on 1 mobile device
 * E-paper with 2-week archive so you won't miss out on content that matters to
   you

Join ST's Telegram channel and get the latest breaking news delivered to you.

 * Cyber security
 * Cyber warfare
 * Hacking

Facebook WhatsApp Twitter More
Whatsapp Linkedin FB Messenger Telegram Reddit WeChat Pinterest Print Purchase
Article Copy permalink
https://str.sg/Jauw

Read this subscriber-only article for free!
Just sign up for a free account and log in to continue reading.
No reason to believe Singapore was a target in FireEye hack: CSA
Sign up

Already have an account? Log in.
All done! This article is now fully available for you
No reason to believe Singapore was a target in FireEye hack: CSA
Read now
Please verify your e-mail to read this subscriber-only article in full
No reason to believe Singapore was a target in FireEye hack: CSA
Resend verification e-mail
The gift link for this subscriber-only article has expired.
Get unlimited access to all stories at $0.99/month for the first 3 months.
Subscribe now
You have reached your limit of subscriber-only articles this month.
Get unlimited access to all stories at $0.99/month for the first 3 months.
Subscribe now
Read and win!

Read 3 articles and stand to win rewards

Let's go!
Terms & conditions apply
Frequently asked questions
Good job, you've read 3 articles today!

Spin the wheel now

Let's go!
Terms & conditions apply
Frequently asked questions
FROM AROUND THE WEB


Ad
[Fotos] 30 Fotos, die wirklich zum Nachdenken anregen
Read More
Doctor Report

Ad
[Bilder] Annalena Baerbocks Millionen-Villa steht jetzt zum Verkauf, sehen Sie
selbst
Read More
Paperela

Ad
[Fotos] Kamera gefangen Menschen tun die meisten seltsame Dinge im Walmart
Read More
Hollywood Tale

Ad
[Fotos] Hochzeitsfotos, die mehr als peinlich sind
Read More
Authors Pick


Ad
Grow with Siemens. Accelerate your career & boost your skills and knowledge.
Siemens

Ad
Investors turning to art for diversification - here's why Business Times

Ad
Manufacturing: are your supply chains safe?
Learn More
Dassault Systèmes

Ad
Erkunden Sie New Jersey: Neun tolle Gründe für einen unvergesslichen Besuch New
Jersey Travel & Tourism


Ad
[Fotos] Annalena Baerbocks Millionen-Villa steht jetzt zum Verkauf, sehen Sie
selbst
Read More
Paperela

Ad
[Fotos] 21 wilde, perfekt getimte Bilder unzensiert
Read More
Divorce Pay Day

Ad
Leiden Sie unter Knieschmerzen? Suchen Sie jetzt nach Behandlungsmöglichkeiten
Knieschmerzen Behandlung | Suchanzeigen

Ad
Neuropathy & Nerve Damage? Do This Immediately (Watch) Growth Advice

Ad
Suche nach Sterbegeldversicherung Vergleich Suchanzeigen

Ad
Annual Report: L’Oréal’s performances are online L'Oréal Finance


THE STRAITS TIMES

Available for
iPhones and iPads
Available in
Google Play

 
 * E-paper
 * Facebook
 * Instagram
 * Twitter
 * LinkedIn
 * Podcasts
 * RSS Feed
 * Telegram
 * Youtube
 * TikTok

 * Singapore
 * Asia
 * World
 * Opinion
 * Life
 * Business

 * Tech
 * Sport
 * Videos
 * Podcasts
 * Multimedia

 * About Us
 * Terms & Conditions
 * Privacy Policy
 * Need help? Reach us here.
 * Advertise with us

Sign up for our daily newsletter
Thank you!
Sign up
More newsletters
By registering, you agree to our T&C and Privacy Policy.

MCI (P) 076/10/2022, MCI (P) 077/10/2022. Published by SPH Media Limited, Co.
Regn. No. 202120748H. Copyright © 2023 SPH Media Limited. All rights reserved.

Back to the top
search by queryly Advanced Search

✓
Thanks for sharing!
AddToAny
More…