Data leak

SingHealth Singapore National Health Database Breach (1.5M Patients, PM Lee Targeted)

πŸ“… 2018-06-27 🏒 SingHealth Sunrise Clinical Manager (SCM) patient database 🦠 Custom RAT (remote access trojan)
Primary Source β†—

Incident Details

Between 27 June and 4 July 2018, attackers exfiltrated personal data of 1.495 million patients from SingHealth’s Sunrise Clinical Manager outpatient database β€” approximately 25% of Singapore’s total population. Data stolen included NRIC numbers, names, addresses, dates of birth, race, and gender. 160,000 patients also had their outpatient dispensed medication records stolen. The personal records of Prime Minister Lee Hsien Loong were specifically and repeatedly targeted, suggesting geopolitical espionage motivations. The attack was first detected on 4 July 2018 by a database administrator who noticed unusual activity. Initial suspicious activity had actually been detected by Integrated Health Information Systems (IHiS) staff in late June but initial response was insufficient. The Committee of Inquiry (COI) set up by the Singapore government concluded in January 2019 that the attack was a deliberate, targeted, well-planned APT attack and not the work of casual hackers. The COI identified failures including insufficient staff training, inadequate incident response, and delayed escalation. IHiS CEO Chong Yoke Sin and two other staff received financial penalties. Singapore strengthened its Cybersecurity Act and mandatory breach notification regime following the incident. The attack is widely attributed to a state-sponsored threat actor linked to China.

Technical Details

Initial Attack Vector
Advanced persistent threat group (assessed as state-sponsored, linked to Chinese APT10/APT41) used phishing email to compromise a SingHealth front-end workstation, moved laterally to the SCM database via multiple infected machines, and used a custom remote access tool to extract data over approximately three weeks
Vendor / Product
SingHealth Sunrise Clinical Manager (SCM) patient database
Malware Family
Custom RAT (remote access trojan)

Timeline

  1. 2018-06-27 Breach occurred
  2. 2018-07-20 Publicly disclosed
  3. 2018-07-20 Customers notified