CNA Explains: Could a DDoS attack bring down Singapore’s public healthcare system?

SINGAPORE: On November 1, a distributed denial of service( DDoS ) removed the websites of Singapore’s public healthcare organizations, resulting in an extended outage. & nbsp,

Services that needed internet connectivity, such as websites, emails, and staff productivity tools, were unavailable during the disruption, despite the fact that essential healthcare services were untouched. & nbsp,

There was no evidence to suggest that medical data and internal networks had been compromised, according to a statement from Singaporean health tech firm Synapxe, which supports the operations of 46 people medical institutions.

The DDoS attacks are also happening, and there may still be sporadic outages of online service, it added. & nbsp,

According to experts, it’s crucial to maintain essential services unhindered even in the face of cybercrime because public health care systems are so crucial.

Additionally, they emphasized how crucial it is to separate inside healthcare systems from online and web-based services. & nbsp,

A DDOS ATTACK: WHAT IS IT?

A distributed denial of service( DDoS ) attack, one of the most frequent cyberattacks, is a malicious attempt to obstruct an online service or site by inundating it with unusually high volumes of data traffic. & nbsp,

According to Atreyi Kankanhalli of the National University of Singapore,” Cybercriminals overburden a network with so much traffic that it cannot function( communicate ) as it usually would.” & nbsp,

This would impede customers, or requests, from reputable people, according to the Provost’s Chair Professor in the Department of Information Systems and Analytics at the School of Computing at NUS. Users would then be unable to load content on & nbsp. In addition, & nbsp,

Prof. Kankanhalli & nbsp used the example of a group of people swarming the shop’s entrance door, making it difficult for legitimate customers to enter. & nbsp,

According to the & nbsp, Singapore University of Social Sciences’ ( SUSS ) & nfspp, Ng Boon Yuen, a DDoS attack coordinates multiple attack streams so that numerous devices are simultaneously attacking the target system.

These products are frequently those that have been compromised by malware and are” remotely controlled” by the intruder, according to the senior teacher of the business program at SUSS ‘ School of Business. & nbsp,

According to cybersecurity firm Palo Alto Networks, a DDoS attack is normally planned in three steps. & nbsp,

The first step is typically & nbsp, reconnaissance to find a specific target, according to its Field Chief Security Officer of Japan and Asia Pacific Ian Lim. & nbsp,

The second step is” weaponization ,” in which the attacker creates or rents a bot network to carry out the attack. Launching the strike and possibly adapting to the defenses to withstand it is the next step, according to Mr. Lim.

The purpose or goal of the harm may determine the next steps, he continued. & nbsp,

Sluggish application performance, protracted inability to access websites or system files, high processor and memory usage, frequent disconnections from wireless or wired internet connections, and an increase in spam emails are all potential indicators of a DDoS attack, according to the Cybersecurity Agency of Singapore( CSA ).

HOW CAN Digital Thieves Storm Blogs WITH TRAFFIC, Yet WITH FIREWALLS IN PLACE?

According to Synapxe, it has access to services that prevent unusual internet traffic spikes before they reach the people healthcare system. & nbsp,

Synapxe added in its statement that routers are in place to ensure that only legitimate traffic enters the network even after the limiting service has cleared the traffic. & nbsp,

But, on November 1st, a strange increase in network traffic that was picked up around 9.15 am was able to get around the obstructing service and destroy the firewalls. & nbsp,

DDoS preventing services have power limits, Prof. Kankanhalli noted. & nbsp,

” Attacks bigger than 2 terabits per second( Tbps ) have happened, and attack sizes are getting bigger.” Massive attacks you overwhelm firewalls and preventing services.

According to Mr. Lim, the danger environment for DDoS has changed, allowing adversaries to launch attacks with more volume and speed.

Any internet-facing system, such as a router or modem, has bandwidth limitations that can be overextended in network-based DDoS. The application is overcome and can no longer listen to reasonable calls in an application-based assault, according to Mr. Lim. & nbsp,

Why had cybercriminals targeted public health care system websites? & nbsp,

According to the CSA, one of the 11 industries with important details infrastructure is healthcare. & nbsp,

According to Prof. Kankanhalli, it is a crucial company that makes it an appealing destination for online thieves looking to cause trouble. & nbsp,

” The adversaries may have both financial and activist motivations for causing break.” For instance, take information to buy or demand ransom from the company.

According to Mr. Lim, due to the status of the organization and the media attention it may garner, big institutions are frequently the goal of such attacks. According to & nbsp,” Hacktivism” or” hacking for a cause” is frequently the reason behind DDoS attacks that are not financially advantageous. & nbsp,

DDoS could also be used as a distraction strategy to conceal another invasion occurring elsewhere in the organization, Mr. Lim continued.

HOW ARE Important OPERATIONS AND SERVICES No AFFECTED BY PUBLIC HEALTHCARE INSTITUTIONS?

Professionals concurred that if critical operating techniques in a hospital are available via the internet, they will be vulnerable to DDoS attacks. & nbsp,

According to Nanyang Business School’s( NBS ) Goh Kim Huat, the majority of hospitals have separate systems for managing their internal healthcare systems and hosting online web pages.

According to Prof. Goh, a member of NBS ‘ Division of Information Technology and Operations Management, internal healthcare systems have files like electronic medical records that are” mission critical, confidential, time-sensitive, and need to be continuously available for patient safety.”

For separation is currently being practiced in our health care system. Mission-critical healthcare systems are typically compartmentalized and equipped with redundancy( backup ).

According to Prof. Kankanhalli,” Service connecting to the internet have many benefits, but likewise immediately increase risks.” However, it is not feasible to forbid all of these services; rather, you must implement since many safeguards as you can.

HOW Essential ARE People HEALTHCARE INSTITUTIONS ‘ Sites?

The question is whether it is essential to maintain the availability of medical institution websites, Dr. Ng said, even if there was no data breach and operations were essentially unaffected. She stated that the accessibility of websites that offer e-services to the general public may be crucial. & nbsp,

Even though websites for health care organizations are primarily there to inform the public, a disturbance can lead to various issues, according to Dr. Ng. & nbsp,

For instance, a user would use the hospital’s telephone number for public inquiries if they were unable to locate the contact information for the professional clinic or ward on the website. According to Dr. Ng, a high amount of enquiries could destroy the call center.

A spokesperson for NUHS( National University Health System ) added that their call center and emails were even partially absent in light of the recent disturbance.

According to the top teacher, when various( or all ) channels of information and communication are impacted, those who are in need of assistance does become concerned or even anxious. & nbsp,

HOW SHOULD Organizations SECURE THEMSELVES FROM ATTACKS BY DDOS?

According to online safety company Cloudfare, businesses can use specially created network equipment or a cloud-based protection service to alleviate the threat. & nbsp,

DDoS mitigation, which involves using a cloud-based provider across many stages, is the process of properly shielding cybernet or server from DDOS attacks.

A website must first be able to distinguish between an attack and a large volume of regular traffic in order to react by deftly removing harmful bot traffic while absorbing the remaining traffic.

A good network may route traffic effectively and look for patterns like specific attacks coming from specific nations or improper use of specific protocols. & nbsp,

According to Mr. Lim, the organization would be able to bring in experts shortly to stop or divert these attacks if the DDoS attack was detected early. & nbsp,

” A thorough examination of the attack will also enable the preparation and application of a suitable course of reduction.” Remember that the intruder might be anticipating your defenses and changing the direction of their harm.

” To totally address the continuing attack, constant attention is required because this is a dynamic situation. To increase response time, it is essential to have a team( internal or partners ) prepared to respond to DDoS incidents and exercise drills.

To prevent unauthorized access and takeover of your network devices and routers, the CSA advises using strong passwords and enabling two-factor authentication,( 2FA ) as an additional layer of security.

Additionally, it suggests & nbsp putting security measures in place at the network’s perimeter, such as firewalls between internal and external connectivity points.

WHAT TYPE OF Problems ARE THESE? & nbsp,

One of the most typical types of attacks is DDoS episodes.

According to the CSA and Infocomm Media Development Authority( IMDA ), DDoS attacks on telco infrastructure in 2016 crippled StarHub’s broadband network twice in three days. & nbsp,

Therefore, infected subscribers’ Internet-connected products in their homes were taken over and used in the cyberattacks. The devices’ owners, thieves, were able to deliver visitors to their intended destination. & nbsp,