• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

Serious [ SingHealth Hacking News ] Beware of INDIANS : Singtel's Trustwave Found CECA Indian IT Analyst @ Tata Consultancy Was The Source of Manipulation

grandtour

Alfrescian
Loyal
https://www.trustwave.com/Resources...-the-SingHealth-Breach/#.W1vpVW0ZVmQ.linkedin

https://pastebin.com/1YFYJEzq

New Indicators Suggest Penetration Vectors and Earlier Dates for the SingHealth Breach

July 28, 2018
Posted By SpiderLabs


The Trustwave SpiderLabs team has found additional information that we believe may be associated with the recent SingHealth breach. You can read a summary of the breach in a previous post, but as a quick summary, Singaporean authorities announced on July 20th 2018 that the country's largest healthcare group, SingHealth, was compromised. The breach resulted in the loss of about 1.5 million patients' records which included information such as name, NRIC number, address, gender, race and date of birth. About 160,000 of these patients also had their outpatient prescriptions records stolen. According to the official account, the compromise persisted from between June 27 to July 4, 2018, but this information we discovered and explore here suggests that at least some reconnaissance and potentially access was established a few weeks earlier than that, maybe as early as June 9th.

Following the breach in SingHealth, we conducted some research which found some additional fragments of evidence which may be associated with this compromise. Our team discovered two separate Pastebin posts that appear to represent database access to SingHealth. One listed an exception log from a Java server while the other represented SQL queries..


May 24th, 2018

A Java exception trace was posted to Pastebin on May 24th, 2018 and several things stood out with this specific post.

The query was for delegating access to a database in SingHealth Headquarters (SHHQ) (see Fig 1). It attempts to delegate database control access from a Senior Manager in the Medical Technology Office of Singapore Health Services (see Fig 2) to an employee of a large Singaporean IT contractor, CTC (see Fig 3). The name of the IT contractor matches a LinkedIn account of an IT analyst that may work for a subcontractor for CTC (see Fig 4). It could be that the attacker had already compromised and controlled this contractor's user account and was able to use it to manipulate the SingHealth database.

The delegation request was set for the dates June 9 until June 17 this year. Employee names have been obscured in the pictures below to protect victim identities.


Figure 1: A portion of the Pastebin Java exception log



Figure 2: Contact information for the email referenced in the log



Figure 3: CTC Singaporean IT consultants



Figure 4: Potential IT contractor for CTC

You can also see in the request that the contact numbers have been faked and read "97865432" for both parties. This is just two swapped digits from a "98765432" countdown perhaps to avoid filtering for commonly faked fields.

Other parts of the same exception log indicated that the attackers were targeting the "portaldev" database. It is conceivable that the development environment server was not as well protected as the production server and therefore was an easier target. Finally, you can also see that the error listed in this log was that the 'delegatorID" was set to NULL (See Fig 5). Despite the large number of parameters listed, this was the only error. This show the sophistication and skill of whomever uploaded the log and if this was the only error they ran into, it was easily addressed.


Figure 5: A portion of the Pastebin Java exception log

Here is a more complete section of the exception log for those that want to follow the parameters.


Figure 6: More complete section of the exception log


June 15th, 2018

Our team also discovered some SQL queries on Pastebin uploaded on June 15th. This date sits in the middle of the period set in the May 24th delegation request (June 9 until June 17) and also contains information related to SingHealth.


Figure 7: A portion of the Pastebin SQL queries uploaded on June 15th

The queries reference not just SingHealth but also NHG – The Singaporean National Healthcare Group. You can also see in the query above that they are looking to eliminate returning records associated with "Dental Surgery" (WHERE `Sub-Specialty` <> "Dental Surgery") while including specifically records that allow "Direct Access" and "Direct Admit" (`Ref. Type`IN ("Direct Access P", "Direct Admit P")). This would make sense for someone looking for more sensitive information than you might get from dental patients, while focusing on patients that are given direct access or admittance, which might be reserved for high profile patients that are permitted to "skip the line".

In addition, the class types referenced in the portion of the query that reads "Class IN ("A", "AP", "ARF", "B1", "B1P", "B1RF", "B2RF", "CRF", "NR", "PTE", "PTEP", "PTRF")" references valid medical class types (see Fig 5). Two queries listed in the Paste separate the records between "Private" client classes and "Subsidized" perhaps to further focus on potentially high profile cases.


Figure 8: Table of medical class types taken from: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5427184/

Finally, this query was recently removed from Pastebin, which would match with someone trying to cover their tracks.


Figure 9: This Pastebin post is no longer available

Now it's fair to say that these sorts of things are commonly posted to Pastebin as developers often share error logs and queries with each other for troubleshooting purposes, so we can't know for sure who uploaded this content to Pastebin or why. However there are three likely scenarios.

The first is that the attackers themselves uploaded the queries in order to share the code with collaborators for troubleshooting purposes.

The second scenario is that an internal developer uploaded the data as they discovered the breach in their exception logs and proceeded to share the information for troubleshooting.

The third scenario is that it has nothing at all to do with the compromise and was simply exception logs uploaded by an internal developer for their own troubleshooting purposes. If this were the case, it is still interesting due to the close timing to the actual breach. If attackers were looking for a way into SingHealth or NHG, stumbling upon this random Pastebin post would be a goldmine of information.

So while we cannot know for certain if these findings are directly related to the SingHealth compromise, the combination of suspicious items occurring directly within the attack window are highly suspicious. Within less than two months prior to and during the official attack window, we have identified the following:
  • Java exception logs indicating that an unknown suspect was attempting to delegate access (provide elevated privileges to a new user) to a SingHealth database.
  • SQL queries targeting medical data on SingHealth were identified (although already deleted) on Pastebin.
Taken individually, these items could be considered unusual but given the timeline and the confluence of events, we believe that these items are related to the SingHealth breach. At this point, Trustwave SpiderLabs is not assigning attribution to a specific threat actor. We have strong suspicion but do not feel we have enough information to confirm attribution. However, we remain convinced that this is the work of a nation-state actor for intelligence gathering purposes, and not simple cybercrime / cybergang activity.

Credit: Thanks to Nikita Kazymirskyi, Anat Davidi, Ziv Mador, Karl Sigler, Brian Hussey, and Jeremy Batterman for their contributions to this research and post.

Tags: Incident Response, Security Research
 

halsey02

Alfrescian (Inf)
Asset
Such a long post....the moral of the story is?. HAD THE PM, MIN OF HEALTH, THE CEO OF SINGHEALTH..THE WHOEVER, WHATEVER...APOLOGISE? No one committed harakiri & they will are keeping quiet....so that...this will slowly fade away....THE USERS OF SINGHEALTH ARE THE ONES GETTING FOOK..WITH THEIR NAME. ID, ADD, CONTACTS ETC...is out there in the wild, wild..internet.
 

virus

Alfrescian
Loyal
so is modi the prev? is sinkieland gg to summon the snake ambassador and kick out or jail him?
 

halsey02

Alfrescian (Inf)
Asset
Summary: Singhealth got illegally penetrated by ah neh

They invited the ah neh to 'rape' them....so it was not the Russians, not the Chinese nor the Malaysians or...it was talents they brought in from the slums of calcutta that is now ravishing them.... ha ha ha ha
 

halsey02

Alfrescian (Inf)
Asset
KNN whoever seek tata consultancy can tata KNN

It will just a slap on the hands & the those gets fook hard are the patients of Singhealth...now every one in the world will have proof that the males here who voted for pxp...have tiny testicles from the medical records or speak with a high pitch voice & gelek with they walk & sit cross leg... ha ha ha ha plus their full names, NRIC numbers, card details if any, contact numbers & address..

These are the people who gets fook...not TAT or what!
 

JohnTan

Alfrescian (InfP)
Generous Asset
This article is a filthy lie. CECA has been nothing but good for sinkies and Singapore. With more kelings, our IT industry has grown exponentially year after year. Everyone knows that ah nehs are good in programming.
 

songsongjurong

Alfrescian
Loyal
hack in, then upsell Singhealth more firewall,security apps,deploy more CECA dalit for security ops..

SG whoring herself to CECA shithole dalit scums! worse than PRC ah tiongs!!many times over!!!
 

virus

Alfrescian
Loyal
hack in, then upsell Singhealth more firewall,security apps,deploy more CECA dalit for security ops..

SG whoring herself to CECA shithole dalit scums! worse than PRC ah tiongs!!many times over!!!

i hope the same shit happens with SIA data. then see how pinkie gg to hide the shit.
 

grandtour

Alfrescian
Loyal
This article is a filthy lie. CECA has been nothing but good for sinkies and Singapore. With more kelings, our IT industry has grown exponentially year after year. Everyone knows that ah nehs are good in programming.

A new report by Aspiring Minds, the world’s largest employability assessment company, has revealed that over 95 percent of all IT “engineers” in India are incapable of basic programming—shattering the myth of Indian “IT expertise” and destroying the controlled media’s often-repeated claim that engineers from that country are urgently needed to “boost the skill sets of Europe and America.”



DQ-Frontage-M.jpg




According to the study, titled “National Programming Skills Report,” only 4.77 percent of Indian IT engineers can write the correct logic for a program—a minimum requirement for any programming job.



National-Programming-Skills-Report-Engineers-2017-Report-Brief-10.jpg




Aspiring minds is world-famous for helping organizations, governments and institutions measure and identify talent. Their client base includes Sapient, Coca Cola, GE, Amazon, Genpact, Bank of America, CITI bank, HCL, Wipro, Tata Motors, Du Pont, Daimler, and Hyundai.

Their latest report on India’s IT skill levels is also featured as a front cover news story in Dataquest, India’s leading technology magazine in its April 2018 edition.

Over 36,000 engineering students from IT related branches of over 500 colleges took a test developed by Aspiring Minds called Automata, which is the world’s smartest programming assessment that evaluates coding ability of candidates. Using simulated environment for C, C++, C#, Java, PHP, Python, SQL and over a dozen languages, Automata is the only tool to leverage advanced Machine Learning technology to evaluate code.

According to the report’s executive summary:

* Only 1.4 percent of Indian IT engineers can write functionally correct & efficient code.

* More than 60 percent of candidates cannot even write code that compiles.

* Only 4.77 percent candidates can write the correct logic for a program, a minimum requirement for any programming job.

* Programming skills is five times poorer for third tier colleges as compared to tier 1 colleges.

The key findings of the study are listed as follows:

– “Only 36% engineers are able to write compilable code . . . Unfortunately, we find that out of the 2 problems given per candidate, only 14% engineers are able to write compilable codes for both and only 22% write compilable code for exactly one problem. To sustain the growth of IT industry, we need candidates with high technology caliber and better programming skills.”

– “Lack of adequate knowledge to build a logically correct, maintainable code is the key reason for low employability.

– “As low as 2.21% engineers possess the skill to write a fully functional code with best efficiency and writing practices Functionally correct code is the basic requisite of a good programmer . . . The analysis unveils that only 2.21% engineers possess the skillset to write logically correct code with best efficiency & least time-space complexity.”

– “Programming Practices and Programming Ability are the areas of maximum skill gap across demographics . . . Programming Practices is the ability to code in readable & maintainable fashion and Programming Ability is the ability to code in most optimized way.”

The report also found that although Indian males perform terribly at IT skills, Indian females were even worse. Under the section of the report titled “Programming Skill Gender Comparison,” the following summary is found:

“[Skill level] A4: Functionally and logically correct code: Male 3.16 %; Female 0.71%”

“[Skill level] A3: Functionally correct code with few anomalies: Male 3.48%; Female 1.10%”

“[Skill level] A2: Functionally incorrect code: Male 36.15%; Female 22.93%”

“[Skill level] A1: Syntax Error: Male 57.21%, Female 75.25%.”

The report concludes that “Only 25% of [Indian] females are able to write a compilable code and less than 1% can write logically & functionally correct code.”



National-Programming-Skills-Report-Engineers-2017-Report-Brief-14.jpg




The report undermines the oft-repeated claim in the controlled media that India is an “IT giant” and that engineers from that country are urgently needed to “boost the skill sets of Europe and America.”
 
Top