iTnews Asia
  • Home
  • News
  • Security

Singapore’s Fullerton Health breach sees massive loss of data from 400,000 people

Singapore’s Fullerton Health breach sees massive loss of data from 400,000 people

This is another lesson to not let our guard down – even with third party vendors – and to assume that threat actors can always infiltrate your infrastructure anytime.

By Siti Bahari on Nov 1, 2021 4:44PM

Customers of Singapore healthcare provider Fullerton Health were recently affected by a ransomware attack after a vendor of the private healthcare group suffered a breach that led to the data of at least 400,000 people – including the insurance policy details of Singaporeans – being stolen and put up for sale.

The data was listed on hacking forums last month for US$600 in Bitcoin – but posts on the data sale have since been taken down.

The unidentified hackers uploaded a sample of the data which included customer names, identity card numbers, information on bank accounts, employers, and medical history, and even the personal details of the customers’ children. A sample document shared by the hackers bore the letterheads of Fullerton Health and Singapore Airlines.

Breach was through engaged vendor 

The breach was on a server used by Agape Connecting People, a vendor engaged by Fullerton Health to handle their customer bookings, and was discovered by the healthcare service provider shortly before informing Agape.

Both parties have made police reports and the Personal Data Protection Commission in Singapore has been informed with investigations still ongoing.

In response to queries from the media, Fullerton Health had confirmed that its own networks were not compromised and that they are still trying to establish the exact number and identities of those affected.

Commenting on the attack, Steve Turner, analyst at Forrester said that organisations throughout the globe should be increasing the reviews of companies that they contract with to store their customer’s data.

“That review needs to include what types of controls they have implemented to help detect, prevent, and quickly respond to ransomware and other types of attacks where a main motivating factor is exfiltrating data,” said Turner.

“At the end of the day, while the third party that was contracted can be held responsible, it’s the organisation that contracted with them in the first place that will suffer the wrath of upset customers and have their reputation tarnished.” 

“You must assume the threat actors will get in, because they eventually will, and stop them quickly and pushing them out of networks becomes essential to keep your customers and partners safe,” said Eric Nagel, General Manager APAC at Cybereason.

“Also, this data breach is a reminder that as consumers our personal information has been stolen many times over and sold on the DarkWeb. It appears that personal banking information, medical records and identity card numbers were stolen and only in time will consumers know if their personal information was used in an identity theft scam or fraud was committed.”

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
© iTnews Asia
Tags:
data breach ransomware risk management security singapore

Related Articles

  • Your organisation’s physical security can be a gateway for cybercriminals
  • The best way to outsmart your threat actors is to think like one
  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Your organisation’s physical security can be a gateway for cybercriminals

Your organisation’s physical security can be a gateway for cybercriminals

Malaysia's Maxis Berhad investigates claims on alleged data breach

Malaysia's Maxis Berhad investigates claims on alleged data breach

DBS plans US$58 million investment to improve technology resilience

DBS plans US$58 million investment to improve technology resilience

The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.