Over 117,000 systems in Singapore infected by malware last year, 67% jump from 2023: CSA report

By CNA

TechnologyBusinessFinance
Share:

Key Concepts:

  • Cybersecurity Landscape Report (Singapore)
  • DDoS Attacks (Distributed Denial of Service)
  • Ransomware
  • Advanced Persistent Threat (APT)
  • Cyber Hygiene
  • Critical Information Infrastructure (CII)
  • Preemptive Exposure Management
  • Cyberstar (National Level Crisis Readiness Exercises)

Cybersecurity Landscape in Singapore: 2024 Surge in Attacks

  • Increase in Cyber Incidents: Singapore experienced a significant surge in cyber incidents, with over 117,000 systems compromised in 2024. This represents a 67% increase compared to 2023, as reported by the Cyber Security Agency of Singapore (CSA) in its annual Cyber Landscape report.
  • Cause of the Surge: The increase is attributed to infected devices, including servers and smart cameras, which hackers exploit to launch DDoS attacks, blocking access to web services.
  • Singapore as a DDoS Target and Source: In the last quarter of 2024, Singapore was the seventh most targeted country globally for DDoS attacks and the third largest source of such internet traffic. The CSA attributes this to Singapore's status as a digital hub.
  • User Negligence: The CSA highlights a "troubling fact" that users are failing to adequately protect themselves despite the increasing prevalence and sophistication of cyber threats.

Ransomware Attacks: A Growing Concern

  • Increase in Ransomware Cases: Reported ransomware cases in Singapore increased by 21% in 2024, totaling 159 cases, mirroring global trends.
  • Targeted Sectors: The manufacturing and professional services sectors were the most targeted, accounting for over a third of all cases.
    • Manufacturing: Suffered 35 reported attacks. The industry is a prime target due to its handling of intellectual property and sensitive data.
    • Professional Services: Experienced 28 reported attacks. Consulting and legal firms were particularly targeted due to their management of vast amounts of sensitive client data.

Advanced Persistent Threats (APTs) and Geopolitical Tensions

  • Increased APT Activity: The CSA has observed an increase in APT activity worldwide. These are often state-backed hacker groups that infiltrate systems for extended periods to steal data or disrupt systems.
  • UNCC 3886: Authorities named UNCC 3886 as an APT attacking Singapore's critical infrastructure. This marked the first time an APT was publicly identified by authorities.
  • Geopolitical Correlation: The rise in APT activity is correlated with geopolitical and trade tensions, leading to increased espionage and information gathering to benefit negotiations.
  • Targeted Infrastructure: APTs have targeted organizations that support or deliver essential services or critical infrastructure, including telcos, trains, and the finance industry.

Cyber Hygiene and Preemptive Measures

  • Increased Attention to Cyber Hygiene: Following the public disclosure of the UNCC 3886 attacks, companies are paying more attention to their cyber hygiene practices.
  • Preemptive Exposure Management: There is higher interest in preemptive exposure management services, which focus on identifying and fixing system weak spots in devices like sensors or smartphones before hackers can exploit them.
  • Challenges for Smaller Firms: Smaller firms, including startups and mid-sized companies, may lack the resources for 24/7 monitoring and in-depth defenses, making them potential soft spots.

Government Initiatives and Crisis Readiness

  • National Level Crisis Readiness Exercises: National level crisis readiness exercises like Cyberstar are crucial for enhancing cybersecurity preparedness.
  • Collaboration with CII Providers: The CSA is working to tighten efforts with Critical Information Infrastructure (CII) providers.
  • Classified Briefings and Threat Intelligence Sharing: This includes convening CEOs of all CII organizations for classified briefings on the threat landscape and ensuring timely threat intelligence sharing to sharpen the CII organization's response.
  • Third-Party Vendor Risk Management: Efforts also include managing risks from third-party vendors.

Notable Quotes:

  • "[T]he correlation of the geopolitical tensions, the trade tensions that exist. There is more interest to preposition uh and perform espionage uh to collect information to benefit for negotiations."
  • "From the reporting that we've seen, it is definitely higher interest, especially around our preemptive exposure management uh services, which is sort of the edge devices we were talking about that these APS are are targeting."

Technical Terms and Concepts:

  • DDoS (Distributed Denial of Service): An attack that overwhelms a system with traffic, making it unavailable to legitimate users.
  • Ransomware: A type of malware that encrypts a victim's data and demands a ransom payment for its release.
  • APT (Advanced Persistent Threat): A sophisticated, long-term cyberattack campaign, often conducted by state-sponsored actors.
  • Cyber Hygiene: Practices and measures taken to maintain the health and security of computer systems and networks.
  • CII (Critical Information Infrastructure): Systems and assets that are essential for the functioning of a society or economy.
  • Preemptive Exposure Management: Proactively identifying and mitigating vulnerabilities in systems before they can be exploited by attackers.

Synthesis/Conclusion:

The cybersecurity landscape in Singapore is facing increasing challenges, with a significant rise in cyberattacks, particularly DDoS and ransomware incidents. The threat is exacerbated by the growing sophistication of threat actors, including state-backed APTs, and geopolitical tensions. While the government is strengthening cyber defenses and promoting collaboration with CII providers, it is crucial for organizations of all sizes to prioritize cyber hygiene, invest in preemptive security measures, and participate in national-level crisis readiness exercises to effectively mitigate the evolving cyber threats. The observable rise in malicious cyber activities impacting Singapore is a clear indicator of the scale and the severity of the threat.

Chat with this Video

AI-Powered

Hi! I can answer questions about this video "Over 117,000 systems in Singapore infected by malware last year, 67% jump from 2023: CSA report". What would you like to know?

Chat is based on the transcript of this video and may not be 100% accurate.

Related Videos

Ready to summarize another video?

Summarize YouTube Video