logo
#

Latest news with #ExerciseCyberStar

Singapore asks operators to immediately report suspected cyberattacks
Singapore asks operators to immediately report suspected cyberattacks

News18

time01-08-2025

  • Politics
  • News18

Singapore asks operators to immediately report suspected cyberattacks

Singapore, Aug 1 (PTI) A Singapore minister on Friday urged operators of critical systems, such as those managing energy, water and transportation services, to immediately report suspected cyberattacks, according to local media reports. 'Accept that, and be prepared to defend," National Security Minister K Shanmugam said while speaking on the sidelines of a biennial cyber-security exercise called Exercise Cyber Star, organised by the Cyber Security Agency of Singapore (CSA), The Straits Times reported. 'Tell us immediately the moment you suspect (something). We (will) work with you to try and deal with it," the minister said. Singapore authorities revealed in July that its critical information infrastructure (CII) came under attack from UNC3886, a state-linked advanced persistent threat (APT) actor. Experts have said that the group is linked to China, the paper said. However, declining to name the country behind the APT attack, Shanmugam urged organisations to understand that there are and will be breaches, the report said. The exercise is in its sixth edition, and is the largest to date. The 11-day exercise involved nearly 500 participants from CSA, sector leads, owners from Singapore's 11 critical sectors, and the Singapore Armed Forces' Digital and Intelligence Service. At the event, CII operators were tested on their skills in countering simulated cyber attacks, such as those from APT actors. CII operators were also tested on their ability to deal with spillover effects from attacks that affect the larger business community and society. In the light of increased threats, Singapore amended its Cybersecurity Act in 2024 to require that CII operators declare any cybersecurity outage and any attack on their premises or along their supply chain, the report said. Singapore experienced its worst data breach in 2018, involving the personal particulars of 1.5 million patients, including then Prime Minister Lee Hsien Loong, it said. PTI GS RD ZH RD RD view comments First Published: August 01, 2025, 19:30 IST Disclaimer: Comments reflect users' views, not News18's. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our Terms of Use and Privacy Policy.

Reporting advanced suspected cyber attacks will provide a defence framework: Shanmugam
Reporting advanced suspected cyber attacks will provide a defence framework: Shanmugam

Straits Times

time01-08-2025

  • Business
  • Straits Times

Reporting advanced suspected cyber attacks will provide a defence framework: Shanmugam

Sign up now: Get ST's newsletters delivered to your inbox (Seated, from left) Minister for Digital Development and Information Josephine Teo and Coordinating Minister for National Security K. Shanmugam touring the exhibits at the Exercise Cyber Star on Aug 1. SINGAPORE - Mandating that operators of critical systems, such as those that manage energy, water and transportation services, report suspected advanced attacks will provide the necessary framework for Singapore to defend itself, said Coordinating Minister for National Security K. Shanmugam on Aug 1. Declining to name the country behind the recent advanced persistent threat (APT) attack on Singapore, he urged organisations to have the mentality that there are and will be breaches. 'Accept that, and be prepared to defend,' he said, speaking on the sidelines of a biennial cybersecurity exercise, called Exercise Cyber Star, organised by the Cyber Security Agency of Singapore. 'Tell us immediately the moment you suspect (something). We work with you to try and deal with it,' he added. Mr Shanmugam's comments came after the authorities revealed in July that Singapore's critical information infrastructure (CII) came under attack from UNC3886, a state-linked advanced persistent threat actor. UNC3886 is one of several APT actors, whose activities have increased more than fourfold from 2021 to 2024, that target Singapore's CII. In light of increased threats, Singapore has also amended its Cybersecurity Act in 2024 to require CII operators to declare any cyber-security outage, and any attack on their premises or along their supply chain. Top stories Swipe. Select. Stay informed. World Trump modifies reciprocal tariffs ahead of deadline; rate on Singapore likely to remain at 10% Business Singapore's US tariff rate stays at 10%, but the Republic is not out of the woods yet Singapore NUS launches S'pore's first nursing practice doctorate to meet evolving healthcare needs Singapore Data breach involving 147,000 Cycle & Carriage Singapore customer records under probe Business CAD probing Tokenize Xchange operator; firm's director charged with fraudulent trading Singapore PM Wong to deliver National Day message on Aug 8 Singapore Man charged over kicking woman's face in Teck Whye Lane flat, leading to her death In particular, operators of critical systems must report suspected APT attacks to CSA, whose oversight will expand to include risks that come from suppliers and cloud services. The amendments are expected to kick in later in 2025. Declining to name the country behind UNC3886, Mr Shanmugum said: 'We release information that we assess is in the public a specific country is not in our interest at this point of time.' Experts have said that the group is linked to China. On naming the group, he added: 'In this case, we felt that the situation and the threat of the attack and compromise was serious enough, and we were confident enough to name UNC3886.' In a statement on July 19 responding to media reports about UNC3886 being linked to Beijing, a spokesperson for the Chinese Embassy in Singapore said: 'China expresses strong dissatisfaction with this, and we resolutely oppose any unwarranted smearing against China. 'In fact, China is one of the main victims of cyber attacks. We reiterate that China resolutely opposes and combats any form of cyber attacks in accordance with the law, and will not encourage, support or condone hacker attacks.' On Aug 1, Mr Shanmugam also spoke about the need for cybersecurity exercises to be better prepared for attacks, which is why Exercise Cyber Star is important. The exercise is in its sixth edition, and is the largest to date. It was held over a period of 11 days and involved nearly 500 participants from CSA, owners from Singapore's 11 critical sectors, and the Singapore Armed Forces' Digital and Intelligence Service. At the event, CII operators were tested on their skills in countering simulated cyber attacks such as those from APT actors. CII operators were also tested on their ability to deal with spillover effects from the attacks that affect the larger business community and society. 'This exercise brings together the different sector leads, critical infrastructure exercise real-life scenarios,' said Mr Shanmugam. 'Imagine millions of people travelling on our subways, and something goes wrong... What's your approach on dealing with the attack? How do you recover from it?' he said, noting that the private sector also needs to have the know-how to better work with the government to contain the damages. Singapore's 11 CII sectors are aviation, healthcare, land transport, maritime, media, security and emergency services, water, banking and finance, energy, infocomm and government. UNC3886 is not the first APT attack on Singapore - there was a security breach in the Ministry of Foreign Affairs' technology systems back in 2014, and intrusions in the networks of two local universities in 2017 believed to be aimed at stealing government and research data. The Republic experienced its worst data breach in 2018, which involved the personal particulars of 1.5 million patients including former Prime Minister Lee Hsien Loong. The attacker in this breach on SingHealth was said to have been persistent in its efforts to access the electronic medical records system, and is believed to have lurked in the healthcare group's network for at least nine months.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store