Ensign InfoSecurity is the largest pure-play cybersecurity service provider in Asia with an extensive footprint within the region. The company is headquartered in Singapore, and has offices in Malaysia, Hong Kong and South Korea. It has a workforce of over 500 cybersecurity professionals with skills in the provision of comprehensive cybersecurity services. Its core competencies include security advisory and assurance, architecture design, implementation, validation and management of advanced security controls, threat hunting, and incident response services. Underpinning these competencies is in-house research and development in cybersecurity.
The report also uncovered a surge in activities from the threat actor group, APT32, in Singapore and identified the Emotet malware as a rising threat in 2019
SINGAPORE - Media OutReach - 18 May 2020 - Ensign InfoSecurity (Ensign), one of Asia Pacific's largest pure-play cybersecurity firms, today unveiled the findings of its Singapore Threat Landscape 2019 report, which identified waterhole attacks, a strategic website compromise attack, and phishing as the nation's top threat vectors in 2019, accounting for 84% of all cyberattacks detected.
The report also revealed that the high technology industry in Singapore is the top target for threat actors in 2019. Companies in this sector are attractive targets as threat actors want to exploit their data centre infrastructure to expand their botnet activities as well as target other organisations whose servers are being hosted there.
In 2019, the top five most targeted sectors in Singapore are:
This report was generated using Ensign's proprietary tools and data models, including Ensign Singapore-centric Cyber Threat Intelligence, Cyber Threat Detection & Analytics engine, and the Ensign IP360 platform which profiles activities and behaviours of anonymous IPs in enterprise network traffic.
"Relevance and context are the most important elements when analysing cyber threat intelligence as threats and trends can differ across geographies, sectors and companies," said Lee Shih Yen, Senior Vice President, Ensign Labs, Ensign InfoSecurity. "Only by combining different global and local cyber threat intelligence sources are we able to derive accurate and deep information about Singapore-specific threats and help organisations bolster their cybersecurity posture by providing contextualised, actionable insights."
Singapore's Top Two Threat Vectors in 2019
Waterhole attacks are the most prevalent threat vector of 2019, contributing to nearly half (47%) of all detected cyberattacks in Singapore. Waterhole attacks occur when an attacker compromises a website and replaces its content with malicious payloads. Unsuspecting victims who then download content from these websites will infect their machines with malware.
This method enables threat actors to execute supply chain attacks where they infect servers containing updates of popular software and replace these updates with malicious codes to spread malware. This allows threat actors to achieve mass infection, especially when the vulnerable web server is popular and trusted by end users.
The other top threat vector in Singapore is phishing (also known as malspam), and almost two out of five (37%) of the detected cyberattacks in 2019 can be attributed to it. Phishing is an effective social engineering technique and a popular tactic for threat actors as it is easy to execute and able to target a wide pool of victims.
APT32 -- Threat Actor Group with Highest Cyberattack Footprint in 2019
Both waterhole attacks and phishing are the favoured techniques of the threat actor group, APT32. The report uncovered that the increase in activities associated with APT32, also known as Oceanlotus, is higher than any other threat actor groups in Singapore in 2019.
APT32, which has been active since 2014, concentrates its activities in Southeast Asia and has targeted multiple private sectors and governments across the region.
In 2019, Ensign detected APT32 associated activities in 23 out of 34 sectors (68%) in Singapore. The spread of cyberattacks across diverse sectors aligns with APT32's strategy of running opportunistic phishing email campaigns throughout the year.
From April to May 2019, Ensign detected a 500% spike in APT32 activities in Singapore's manufacturing sector. From October to December 2019, Ensign found an 800% increase in APT32 activities, which is the result of seasonal phishing campaigns that this threat actor group was running during the shopping and festival seasons.
Emotet -- A Rising Threat in 2019
The report also found that Emotet was the most prominent malware in Singapore. Ensign detected Emotet activities in 27 out of 34 (79%) sectors in 2019, impacting more than 1,200 companies. The widespread attacks across a broad spectrum of sectors indicate the attacks were likely opportunistic and in the form of spam campaigns.
In the first half of 2019, especially from February to April, Ensign detected high volumes of probing activities on port 445, which is a vulnerable port targeted by Emotet. It is likely that threat actors were scanning for vulnerable targets as part of their reconnaissance.
In Q4 of 2019 (1 October to 31 December), Emotet phishing detections spiked by nine times compared to Q3 of 2019 (1 July to 30 September). This can be attributed to the launch of phishing email campaigns by various threat actor groups.
In the same period, there was an 11 times increase in outgoing Emotet C2 (command and control) detections compared to Q3 of 2019. The increase in outgoing traffic with Emotet indicators-of-compromise (IoCs) can be attributed to servers being infected by phishing spam campaigns.
"Conventional and reactionary signature-based threat detection is inadequate in today's cyber threat landscape as modular, polymorphic malware, such as Emotet, are emerging faster than ever. Organisations need to have a proactive cybersecurity posture, and this not only requires access to hyperlocalised, actionable threat intelligence, but also behaviour-based security capabilities that can detect changes in adversary tactics and techniques based on the MITRE ATT&CK® framework," added Shih Yen.
 For high technology companies, technological innovations and advanced systems, applications, and devices play a central role in their core business offerings and services. Some examples include cloud, data centre, and web hosting service providers.
 For info-communications companies, they specialise in network connectivity and info-communication technology products and services. Some examples include telecommunications companies, internet service providers, and network operators.
 MITRE ATT&CK® (Adversarial Tactics, Techniques, and Common Knowledge) framework is a knowledge base of cyber threat tactics and technique which allows cybersecurity researchers, cyber threat hunters and red teamers to better understand cyber threats and assess an organisation's cyber risks.
Past Press ReleasesMORE
20 January 2022