Technology and digitalisation woes can bring down Singapore

Singaporean's home address illegally changed by scammers via ICA service, triggering banking nightmare​

In December, Raymond Tan discovered that his home address had been changed without his knowledge. His Singpass account was then frozen, disrupting his access to essential government services.
Singaporean's home address illegally changed by scammers via ICA service, triggering banking nightmare

The Immigration and Checkpoints Authority (ICA) Building in Singapore.

Tang See Kit

18 Feb 2025

SINGAPORE: A rude shock followed by worries and frustration – 2025 has so far been an emotional rollercoaster for Mr Raymond Tan after he discovered that his home address registered with the authorities was changed without his knowledge.

The Singaporean is one of 71 people whose addresses were illegally altered by scammers via the Immigration and Checkpoints Authority’s (ICA) electronic service.

Parts of this e-service have been halted since Jan 11 so ICA can roll out further security measures. Authorities have also suspended the Singpass accounts of all affected individuals.

For Mr Tan, who is in his forties, the knowledge that his personal details in a government system can be accessed and changed by fraudulent actors has been unnerving.

While the suspension of his Singpass account has caused inconveniences, the biggest shock came when his personal bank accounts were nearly shut down.

“It has not been a peaceful start to the new year,” Mr Tan told CNA in an interview on Wednesday (Feb 12).

A TROUBLING DISCOVERY​

Mr Tan first realised something was amiss on Dec 30 while purchasing travel insurance at the airport.

Using MyInfo, a digital service that auto-fills forms with government-stored data, he noticed his home address had been changed to an unfamiliar Housing Board unit in Commonwealth Drive.

“I called Singpass immediately. They said they didn’t know what happened, but they gave me the option to freeze my Singpass. Of course, I did that,” he recounted.

Fearing further unauthorised access, he agreed to additional security measures requiring a video call for his Singpass account to be reinstated.

Still, even while on holiday, questions lingered in his mind.

“I was thinking if it means that my account had been compromised and if so, how long has it been and what else is affected,” Mr Tan said.

“I checked everything else, like the history of my Singpass transactions and my banking apps, and they seemed okay. So I told myself maybe it’s just a glitch and not something bad.”

But his fears were confirmed on Jan 11 when ICA disclosed that scammers had exploited vulnerabilities in its online service to alter residential addresses.

Mr Tan has since been issued a new identity card.

While he understands the need for his Singpass account to remain suspended during investigations, the situation has caused some disruptions. Without Singpass – an authenticator for various public and private sector digital services – he could not retrieve documents needed for his domestic helper's six-monthly medical examination.

He also could not proceed with his appointment as a donee in his father-in-law's Lasting Power of Attorney. An LPA is a legal document that allows individuals to appoint others to make decisions on their behalf if they become mentally incapacitated.

“Things like these are quite time-sensitive, especially with my father-in-law's advanced age … But I was told by the officer-in-charge that there’s no offline option to do this without my Singpass,” said Mr Tan.

To add to his stress, he discovered that his personal bank accounts at CIMB and OCBC had been put under review.

On Jan 27, he could not log into CIMB's internet banking service. His brother was also unable to access their joint account. Though resolved the next day, no explanation was provided as to why the review was initiated.

Two days later, in the midst of Chinese New Year celebrations, Mr Tan found that he could not transfer funds to his OCBC savings account. A call to the bank revealed that all his accounts, including joint accounts with his children, had been under review since Jan 20.

The biggest shock came on Feb 3 when letters from OCBC arrived saying that his accounts would be closed within 14 days due to “a change in the profile and/or activities”.

“We regret to inform you that we can therefore no longer provide products and/or services to you,” the OCBC letters said.

Frustrated, he pressed the bank for an explanation but received none.

“If this is due to the address issue, the bank can make it more troublesome for me, like requiring me to go down in person for transactions as a temporary measure, and that’s okay. But to suddenly want to close my and my children’s accounts without an explanation, I felt quite bullied,” he said.

OCBC eventually reversed its decision, informing Mr Tan last Thursday that his accounts would not be closed.

In response to CNA’s queries, OCBC said it reviews customers’ accounts for risk management purposes, sometimes leading to closures due to suspicious activities or law enforcement requests.

Generally, when an account is flagged as suspicious, the bank immediately places a hold on it to prevent potential misuse or to protect customers from unauthorised and fraudulent transactions, said Mr Beaver Chua, head of anti-fraud at OCBC’s group financial crime compliance.

This hold is followed by a thorough review to ensure accuracy. During this process, the bank cannot disclose specific details as doing so could compromise the investigation.

“Once the review is completed and a customer’s account is found to be compliant, we will release the hold on the account. Otherwise, the account will be closed if it is found to be suspicious or misused by bad actors,” said Mr Chua.

Similarly, CIMB said it takes a proactive approach to combating scams by working with regulatory authorities and law enforcement agencies.

“By implementing enhanced security measures swiftly, we remain committed to protecting our customers’ bank accounts,” a spokesperson said.
how_to_check_your_residential_address_on_the_ica_website.png

“NOTHING MUCH I CAN DO”​

Authorities said scammers exploited an “Others” option in ICA’s online service, which allowed address changes through a proxy. The process required a Singpass login, the applicant's NRIC number and date of issue, and a verification PIN mailed to the new address.

The scammers used "relinquished" Singpass accounts to impersonate proxies and fraudulently change victims' addresses, said Minister of State for Home Affairs Sun Xueling in a parliamentary update earlier this month.

She also said that ICA’s change of address e-service, launched in 2020, included safeguards such as requiring the NRIC's date of issue. However, these measures have proven inadequate as malicious actors managed to get hold of the information.

Mr Tan speculates that his NRIC details may have been compromised through common practices such as exchanging IDs for building entry passes or submitting photocopies for major purchases such as cars.

“Until the incident happened, I don't think anybody really thought that the IC’s date of issue is so important,” he said.

Even after resolving his banking issues, Mr Tan remains on guard. Just last week, he received a notification from an insurer about a change in his contact details – which triggered a flurry of calls and emails before the insurer confirmed it was "a glitch".

He continues to worry about how much of his personal information is in the hands of scammers and the impact this could have on him and his family.

“If this person was able to change my address, did he also get into other parts of my account? If he has all my information, what will he do with it? Can he masquerade as me?” he said with a sigh.

“At this point, I will say that I feel quite helpless. It seems like there's nothing much I can do.”
 
This is one of the reasons why some hawkers are resistant and won't go into digital-payment mode.
Digital systems are unreliable. Cash is king.
But worse, once digitalised, gov can screen payments and see transactions, which means all the tax evasion may kena spotted.
So many hawkers with steady regular business, WILL NOT opt for digital payment and even food delivery.
Their status will always be, want to eat, come and queue, eat here or take go. Once sold out, close shop, come back tomorrow.
Need some privacy from eyes n minds of IR@S mah
 

Singtel fibre broadband services restored after disruptions in some areas​


Some Singtel customers were unable to connect to the internet using fibre broadband on March 24, with some users facing interruptions with their home digital line and Singtel TV as well.

Singtel said all affected services had been restored as at 7.15pm but did not say what caused the outage.

Mar 24, 2025

SINGAPORE - Some Singtel customers were unable to connect to the internet using fibre broadband for several hours on March 24, with some users facing interruptions in their home digital line as well as Singtel TV.

The telco said in a Facebook post at 5.35pm it was aware that some customers were experiencing issues in Choa Chu Kang, Bukit Panjang and Woodlands.

“Our engineers are working to resolve the issue, and we apologise for any inconvenience caused. Thank you for your patience,” Singtel said.


In response to queries from The Straits Times, Singtel said all affected services had been restored as at 7.15pm but did not say what caused the outage.

In an update on Facebook at about 7.50pm, the telco advised customers still experiencing issues to reboot their routers.

According to Downdetector, a website that tracks outages, there was a spike in people reporting issues with Singtel’s services, starting from about 3.50pm.

The number of reports peaked at 4.31pm, with more than 1,000 reports, but began dropping steadily to 678 complaints at 6.51pm, to fewer than 50 at 9.06pm.
 

DBS, POSB users report not being able to log in to digital banking services​


Over 1,735 reports in total were recorded for DBS and POSB services as at 3.40pm.

Over 1,735 reports in total were recorded for DBS and POSB services as at 3.40pm.

Jun 02, 2025

SINGAPORE – Some DBS and POSB customers could not log in to the banks’ digital banking services for over two hours on June 2 afternoon.

From around 2pm, users began reporting the disruption to both the app and website on Downdetector, a website that tracks service disruptions.

More than 1,735 reports in total were recorded for DBS and POSB services as at 3.40pm.


Several users also took to social media to highlight the disruption. In a comment on the latest post on DBS’ official Facebook page, dated May 30, one user wrote on June 2: “Sorry DBS my DBS application cannot be accessed, what is the problem now?”

Another Facebook user, who identified himself only as Willy, told The Straits Times that he could not log in from 2.50pm.

“I needed to make an urgent payment. So I used another bank to pay,” he said.

In a Facebook update at 4.38pm, DBS said access to the DBS/POSB app “has returned to normal as at 4.08pm”.

“We appreciate our customers’ patience and are sorry for the inconvenience caused,” the bank said.

The bank previously faced a disruption of more than 12 hours on Oct 14, 2023, which affected its online and mobile services and physical card transactions.


It led the Monetary Authority of Singapore (MAS) to impose a six-month restriction on DBS’ non-essential banking activities. The restriction, implemented on Nov 1, 2023, was not extended beyond April 30, 2024.
 

DBS, POSB users report not being able to log in to digital banking services​


Over 1,735 reports in total were recorded for DBS and POSB services as at 3.40pm.


Over 1,735 reports in total were recorded for DBS and POSB services as at 3.40pm.

Jun 02, 2025

SINGAPORE – Some DBS and POSB customers could not log in to the banks’ digital banking services for over two hours on June 2 afternoon.

From around 2pm, users began reporting the disruption to both the app and website on Downdetector, a website that tracks service disruptions.

More than 1,735 reports in total were recorded for DBS and POSB services as at 3.40pm.


Several users also took to social media to highlight the disruption. In a comment on the latest post on DBS’ official Facebook page, dated May 30, one user wrote on June 2: “Sorry DBS my DBS application cannot be accessed, what is the problem now?”

Another Facebook user, who identified himself only as Willy, told The Straits Times that he could not log in from 2.50pm.

“I needed to make an urgent payment. So I used another bank to pay,” he said.

In a Facebook update at 4.38pm, DBS said access to the DBS/POSB app “has returned to normal as at 4.08pm”.

“We appreciate our customers’ patience and are sorry for the inconvenience caused,” the bank said.

The bank previously faced a disruption of more than 12 hours on Oct 14, 2023, which affected its online and mobile services and physical card transactions.


It led the Monetary Authority of Singapore (MAS) to impose a six-month restriction on DBS’ non-essential banking activities. The restriction, implemented on Nov 1, 2023, was not extended beyond April 30, 2024.
 

Critical infrastructure in S’pore under attack by cyber espionage group: Shanmugam​


Coordinating Minister for National Security K. Shanmugam said that Singapore is facing serious threats from state-linked advanced persistent threat (APT) actors.

Coordinating Minister for National Security K. Shanmugam said that Singapore is facing serious threats from state-linked advanced persistent threat (APT) actors.

PHOTO: LIANHE ZAOBAO

Jul 18, 2025


SINGAPORE – The authorities are dealing with an ongoing attack on Singapore’s critical information infrastructure by a state-sponsored cyber espionage group, UNC3886.

Naming the nation’s attacker for the first time on July 18, Coordinating Minister for National Security K. Shanmugam said that Singapore is facing serious threats from state-linked advanced persistent threat (APT) actors.

These are well-resourced attackers that use sophisticated techniques to evade detection. They lurk in networks to spy over the long term, to steal sensitive information or disrupt essential services, among other objectives.


“UNC3886 poses a serious threat to us, and has the potential to undermine our national security,” said Mr Shanmugam at the Cyber Security Agency of Singapore’s (CSA) 10th anniversary dinner at Sands Expo and Convention Centre.

“Even as we speak, UNC3886 is attacking our critical infrastructure right now.”

Mr Shanmugam, who is also Home Affairs Minister, did not disclose UNC3886’s sponsors, but experts have said that the group is linked to China.

Cyber-security firm Mandiant first detected the Chinese espionage group in 2022. UNC3886 is said to have targeted prominent strategic organisations – including those in the defence, technology and telecommunication sectors – on a global scale.

APT hackers like UNC3886 gain unauthorised access into networks by employing techniques such as custom malware and tools available on the victim’s system to evade detection. Zero-day exploits, which are unpatched vulnerabilities, are also typically used to gain entry to networks.

Mr Shanmugam said CSA and relevant agencies are actively dealing with the attack, and are working with relevant critical information infrastructure owners.


Describing UNC3886 as highly sophisticated and persistent in victim networks, he said: “The intent of this threat actor in attacking Singapore is quite clear. They are going after high-value, strategic targets – vital infrastructure that delivers our essential services.

“If it succeeds, it can conduct espionage, and it can cause major disruption to Singapore and Singaporeans.”

Mr Shanmugam said the number of suspected APT attacks in Singapore has increased more than fourfold from 2021 to 2024.

Illustrating how APTs seriously threaten national security, Mr Shanmugam said a cyber attack on Singapore’s power system could disrupt its electricity supply, which could have a knock-on effect on other essential services such as healthcare or transport.

“There are also economic implications. Our banks, airport and industries would not be able to operate. Our economy can be substantially affected,” he said.

Attacks on Singapore’s telco systems and payment systems can have very serious consequences too, he added.


He said attacks on the nation’s systems and infrastructure will impact how it does business, with Singapore having to relook its vendors and supply chains.

Trust and confidence in Singapore as a whole can also be affected, he added.

“Businesses may shy away if they are unsure about our systems – whether the systems are clean, resilient, safe,” he said.

Mr Shanmugam cited APT attacks in Ukraine that caused a power outage. He also cited a cyber attack on a South Korean telecommunications company in April 2025 that exposed the SIM data of nearly 27 million users and caused widespread concern in the country.

“Singapore has been attacked as well. We are a relevant country geopolitically. We are a digital and data hub that connects the world,” he said. “People want to get into our systems, to both influence us and threaten us.”

He highlighted some attacks from APT actors in Singapore that have been made public, but where the culprits were not named due to national security reasons.

These include an incident in 2014 when the authorities detected a security breach in the Ministry of Foreign Affairs’ technology systems. Steps were taken to isolate the affected devices, and the networks were strengthened following the discovery.

In what was the first sophisticated attack against universities here, NUS and NTU discovered intrusions in their networks in 2017.

No classified data or student personal data was stolen. But the attackers were believed to have targeted the two institutions to steal government and research data. The universities were involved in government-linked projects for the defence, foreign affairs and transport sectors.

Then in 2018, Singapore experienced its worst data breach involving the personal particulars of 1.5 million patients, including then Prime Minister Lee Hsien Loong.

The attacker in the SingHealth breach was said to be persistent in its efforts to penetrate the network, bypass the security measures, and illegally access and exfiltrate data.

The attacker is believed to have lurked in the healthcare group’s network for at least nine months. Its mission: to access SingHealth’s electronic medical records system, which is critical information infrastructure in Singapore. The unauthorised transfer of sensitive data took place in 2018.

Most recently in 2024, about 2,700 devices in Singapore were discovered to have been infected after CSA took part in a cyber operation against a global botnet.

APT hackers behind the botnet exploited poor cyber hygiene practices to infect devices, including baby monitors and internet routers. No critical information infrastructure was affected by the attack.

Mr Shanmugam said Singapore has been and continues to be attacked by cyber threat actors.

He cited a survey which showed that nearly 80 per cent of organisations in Singapore have experienced some form of cyber attack.

At the event on July 18, CSA chief executive David Koh noted that cyberspace is contested, and that the agency is on the front line of this dynamic domain.

“We will continue to be agile, to adapt to emerging threats, and to demonstrate our collective will and commitment to secure Singapore’s cyberspace,” he added.
 

What is UNC3886, the group that attacked Singapore’s critical information infrastructure?​

First detected in 2022 by cyber security firm Mandiant, UNC3886 is a China-linked cyber espionage group.

First detected in 2022 by cyber-security firm Mandiant, UNC3886 is a China-linked cyber espionage group.

Jul 18, 2025

SINGAPORE – Singapore’s critical information infrastructure has come under attack from cyber espionage group UNC3886.

A state-linked advanced persistent threat (APT) actor, it poses a menace to national security in many countries, including Singapore.


Naming the nation’s attacker

for the first time on July 18, Coordinating Minister for National Security K. Shanmugam said: “UNC3886 poses a serious threat to us and has the potential to undermine our national security.

“Even as we speak, UNC3886 is attacking our critical infrastructure right now.”

What is UNC3886? Are essential services in Singapore safe from the attack? The Straits Times sheds light on the attack and APTs.

1. What is UNC3886?​

First detected in 2022 by cyber-security firm Mandiant, UNC3886 is a China-linked cyber espionage group.

UNC3886’s attempts are known to be persistent, with the intention of intelligence gathering and long-term spying.

The “UNC” label stands for “uncategorised” or “unclassified”, as industry analysts have not formally classified it. “But that does not mean that it is any less of a threat,” said Mr Shanmugam, who is also Minister for Home Affairs.

2. How does UNC3886 operate?​

Mr Vivek Chudgar, managing director of Mandiant Consulting in Asia-Pacific and Japan, described UNC3886 as highly adept.


He said UNC3886 operates in a sophisticated, cautious and evasive manner and largely focuses on defence, technology and telecommunications organisations in the US and Asia.

The Chinese espionage group is known to target network devices, virtualisation systems and critical information infrastructure with zero-day exploits.

Zero-day exploits are attacks that take advantage of security vulnerabilities in software that vendors have yet to discover and develop patches for.

Unpatched vulnerabilities in the software of network devices, hypervisors and virtual machines are typically harder to monitor, Mr Chudgar said.

UNC3886 also employs custom malware and tools already available on the victim’s system to evade detection.

Like other APT attackers, UNC3886 is persistent – even if detected and removed from the network, it will attempt to re-enter.

3. What cyber attacks has UNC3886 been responsible for?​

Mr Chudgar said UNC3886 has attacked organisations in the US, Europe and parts of Asia. Specifically, it has targeted sectors such as government, telecoms, technology, aerospace, defence, energy and utility.

“UNC3886 poses a severe threat to national security for the organisations and the countries targeted,” he said.

The group has exploited vulnerabilities in routers from Juniper Networks, network security devices from Fortinet and virtual machines from VMware.

4. Are essential services in Singapore safe from the attack?​

On July 18, the Cyber Security Agency (CSA) said UNC3886’s activities have been detected in parts of Singapore’s critical information infrastructure that power essential services.

“We have been investigating UNC3886’s activities,” said CSA, which is leading the investigations. The agency added that it is monitoring all critical services sectors and sharing threat intelligence, but did not name the affected sectors.

Singapore’s 11 critical services sectors are: aviation, healthcare, land transport, maritime, media, security and emergency services, water, banking and finance, energy, infocommunications and government.

The agency is also working closely with other government bodies and partners to support the unnamed affected organisations.

CSA also did not say how long UNC3886 has been in the affected networks, saying instead: “These attacks are often protracted campaigns, and CSA will need to preserve operational security by not disclosing further information at this stage.”

5. What other APT attacks have hit Singapore?​

In 2014, the authorities detected a security breach in the Ministry of Foreign Affairs’ technology systems. Steps were taken to isolate the affected devices and strengthen the networks.

In what was the first sophisticated attack against universities here, the National University of Singapore and Nanyang Technological University discovered intrusions in their networks in 2017.

No classified data or student personal data was stolen, but the attackers were believed to have targeted the two institutions to steal government and research data. The universities were involved in government-linked projects for the defence, foreign affairs and transport sectors.

Then in 2018, Singapore experienced its worst data breach involving the personal particulars of 1.5 million patients, including then Prime Minister Lee Hsien Loong.


The attacker in the SingHealth breach was said to have been persistent in its efforts to penetrate the network, bypass the security measures and illegally access and exfiltrate data.

The attacker is believed to have lurked in the healthcare group’s network for at least nine months. Its mission: to access SingHealth’s electronic medical records system – critical information infrastructure in Singapore.

Most recently in 2024, about 2,700 devices in Singapore were discovered to have been infected after CSA took part in a cyber operation against a global botnet.

APT hackers behind the botnet exploited poor cyber hygiene practices to infect devices, including baby monitors and internet routers. No critical information infrastructure was affected by the attack.
 
Back
Top