Business Daily Media

Technology, Media, and Telecommunications (TMT) and Transport Industry Groups were Singapore’s Top Cyber Targets in 2021: Ensign InfoSecurity Report

Ransomware, multi-modal attacks, and cyber supply chain compromises emerge as key cyber threat trends impacting organisations in 2022

SINGAPORE - Media OutReach - 21 July 2022 - Ensign InfoSecurity (Ensign), Asia's largest pure-play end-to-end cybersecurity services provider, today unveiled the findings of its Cyber Threat Landscape 2022 report, which found that the Technology, Media, and Telecommunications (TMT) and Transport industry groups were the top targets for cyber threats in Singapore in 2021.

The latest edition of Ensign's report provides insights and analysis into the cyber threat landscape in Singapore and key Asia Pacific markets such as Hong Kong, Malaysia, and South Korea. It also explores emerging cyber threats that will impact organisations in 2022 and beyond.

Here are some of the key findings from the report:

Singapore: TMT and Transport Emerged as Top Targeted Industry Groups in 2021

The Technology, Media, and Telecommunications (TMT) industry group, comprising infocommunications[1], data centre and media sectors, was the top target for threat actors in 2021. Ensign found that nearly 70% of malicious traffic observed in Singapore in 2021 was directed at the infocommunications sector.

Percentage of malicious traffic observed targeting Singapore industries in 2021


Threat actors targeted TMT organisations as they covet these firms' bandwidth and computing resources, which can be used to build botnets or compromise other connected organisations. Additionally, many TMT organisations also support other businesses by providing services such as processing and storing sensitive data. This gives malicious actors an easy access pathway to target and access downstream customers via cyber supply chain compromise.

"Infocommunications companies are lucrative targets for malicious actors as their services penetrate and power almost every aspect of our society and digital economy. We need to constantly elevate our cyber defence capabilities to prevent cyber threats from derailing our nation's digital ambition and undermining our position as a regional technology hub. This would require public and private stakeholders to work closely together to build a vibrant cybersecurity ecosystem conducive to nurturing skilled cyber talents and driving innovation," said Steven Ng, CIO and EVP of Managed Security Services, Ensign.

In addition, threat actors were targeting media organisations following the cyberattack campaigns outside Singapore. Media companies saw cyberattacks designed to cause business disruptions, including ransomware campaigns. A key driver behind these attacks was to prevent facts from being disseminated to the public. This can distort or disrupt the public's understanding of the situation.

The Transportation industry group, comprising the Aviation and Maritime sectors, became increasingly attractive targets due to their global and regional connectivity. This is fuelled by the collection of personal identifiable information (PII) for cross-border travel, which may include medical information for COVID-19 tracking purposes.

The Maritime sector continues to see ransomware attacks targeting shipping lines and maritime support services. This further exacerbates supply chain challenges caused by COVID-19. Ransomware operators are likely exploiting the already-strained business operations to pressure organisations to pay the ransom.

Singapore: Rise in Opportunistic Cyberattacks due to COVID-19

In 2021, Ensign observed an increase in opportunistic cyber incidents using stolen credentials in Singapore. It revealed that 80% of these incidents were traced to "hands on keyboard" intrusions against remote access portals such as VPN and Virtual Desktop Interfaces. In these attacks, threat actors manually log into an infected system using leaked credentials.

These attacks can be attributed to COVID-19 where companies were forced to swiftly establish emergency remote working arrangements. However, some of these systems are not adequately secured. As a result, past credential leaks and bad cyber hygiene, such as reusing leaked passwords, led to a number of these opportunistic cyber breaches.

Global trends: Ransomware attacks and cyber supply chain disruptions are growing globally

1. Increasingly Sophisticated Ransomware Tactics

Ransomware remains a prominent and prevalent threat globally. This is exacerbated by increasingly sophisticated methods, such as multi-extortion attacks ransomware attacks.

Ransomware operators most typically leverage a mix of the following extortion threats:
1. Disrupting business operations;
2. Leaking exfiltrated data;
3. Reporting to regulators;
4. Reporting to stock exchange for public listed victims;
5. Rallying key customers to force the victim to pay the ransom by threatening to leak their personal or sensitive information;
6. Buying online advertisements to publicise the compromised victims; and
7. Disrupting Internet-facing services via Distributed Denial-of-Service (DDoS) attacks.

Threat actors are highly selective of their victims. Their criteria are typically based on the target victims' ability to pay a high ransom amount. These organisations usually provide high-availability services required for uninterrupted downstream operations.

Ransomware operators are also prioritising more lucrative regions and markets in their attacks. According to the data that Ensign gathered from ransomware data leak sites and active ransoms in 2021, almost half of the ransomware incidents occurred in companies operating in the US (49%), followed by Europe (22%) and Asia (9%).

Furthermore, Ensign found a 133% increase in Singapore-based companies being mentioned on ransomware leak sites. The financial sector is the top target for ransomware attacks. The maritime and aviation are the next most targeted sectors.

2. Multi-modal Attacks, incorporating Misinformation, Disinformation and Malinformation (MDM), on the Rise

Multi-modal attacks have risen in prominence as threat actors attempt to increase their success rate. As these types of attacks come from multiple fronts, they can result in greater confusion among the victims and require more resources to tackle. In particular, MDM techniques have been incorporated in multi-modal attacks to support phishing or perform influence campaigns.

MDM techniques employed for phishing typically leverage misleading information or distorted facts to trigger the victims' urgency of response or action. This increases the threat actors' chances of successfully gaining access to the targets. Such techniques have been observed in the COVID-19 themed phishing attacks and election-related attacks.

Threat actors also leverage MDM techniques in extortionist attacks. This includes using false information to cause negative hype or sharing illegally exfiltrated sensitive information to influence a large-scale outcome.

3. Threat Actors Compromising the Cyber Supply Chain Upstream

Cyberattacks through compromised cyber supply chains serve as effective and less secured backdoors for threat actors, giving them a higher probability of success with a minimum investment of efforts and resources. As threat actors move upstream in the cyber supply chain, it has more significant implications and affects more victims downstream.

The cyber supply chain comprises hardware, software, and vendors, and each element presents unique security complexity. A key challenge organisations face across the cyber supply chain is the imperfect inventory of assets. This allows threat actors to slip through an organisation's security blind spots and compromise their digital environment.

Furthermore, the report highlighted that threat actors can compromise all stages of the software development chain:
  • Threat actors can attack and compromise open-source libraries. This can expose organisations to risks such as code injections when their developers leverage commercial reusable code libraries.
  • During a software's building and test phase, threat actors can attack code repositories, leading to exposed credentials and certificates and malicious code injected with automated commit.
  • Threat actors also exploit zero-day vulnerabilities when new software is launched, or updates are implemented.

The next category of cyber supply chain compromises relates to hardware. This category is the hardest for cyber defenders to address and increasingly involves firmware and microcode. Sophisticated attackers continue to exploit them as firmware patches can be complex to implement. Hence, remediation may only be possible in 6 to 9 months.

Furthermore, hardware-related vulnerabilities provide the threat actor access to privileges higher than the operating system. This means that the threat actor can potentially infect the system with malware and maintain persistence without being detected by conventional anti-malware solutions or even modern endpoint detection and response solutions. Due to the nature of such vulnerabilities, the implications are much more severe than application-level vulnerabilities.



[1] Infocommunications companies specialise in network connectivity and infocommunication technology products and services. Some examples include telecommunications companies, internet service providers, and network operators.


Hashtag: #EnsignInfoSecurity

About Ensign InfoSecurity

Ensign InfoSecurity is the largest, pure-play end-to-end cybersecurity service provider in Asia. Headquartered in Singapore, Ensign offers bespoke solutions and services to address their clients' cybersecurity needs. Their core competencies are in the provision of cybersecurity advisory and assurance services, architecture design and systems integration services, and managed security services for advanced threat detection, threat hunting, and incident response. Underpinning these competencies is in-house research and development in cybersecurity. Ensign has two decades of proven track record as a trusted and relevant service provider, serving clients from the public and private sectors in the Asia Pacific region.

For more information, visit or email

News from Asia

Madar Saudi Arabia Recognized as One of the Best Places to Work for 2024

RIYADH, SAUDI ARABIA - Media OutReach Newswire - 31 October 2024 - Madar is proud to announce its certification as a Best Places to Work for 2024, a recognition that highlights the company's unwav...

AIM Vaccine’s 13-valent pneumonia conjugate vaccine obtained Production license

Application for drug marketing registration duly submitted Super heavyweight items are expected to drive performance soaring HONG KONG SAR - Media OutReach Newswire – 1 November 2024 - AIM Vaccin...

Light Show Illuminates the Liangma River

BEIJING, CHINA - Media OutReach Newswire - 31 October 2024 - During the recently launched 2024 Beijing Chaoyang International Light Festival, the Liangma River Cultural and Economic Belt, on the t...

426 Major Projects Accelerating in Ordos

ORDOS, CHINA – Media OutReach Newswire – 31 October 2024 - On October 28, nearly 20,000 builders fought on the front line at the site of the 2.6 million tons of coal-to-olefins and supporting 400...

VTEX and ChannelEngine Forge Powerful Alliance to Revolutionize the Ecommerce Landscape

SINGAPORE - Media OutReach Newswire - 4 March 2024 - VTEX (NYSE: VTEX), the global enterprise digital commerce platform, announced today its partnership with ChannelEngine, a leading global marke...

Siam Paragon Bangkok International Fashion Week 2024 Unveils the best of Thai and Asian Creativity And Reaffirms Siam Paragon As the Number One ‘Luxury Destination’

BANGKOK, THAILAND - Media OutReach Newswire - 1 November 2024 - Siam Paragon reaffirms its positioning as a leading 'global luxury destination' and the top-of-mind destination for both Thai and i...

EdgeProp announces winners of EdgeProp Excellence Awards 2024; City Developments, GuocoLand, SingHaiyi Group and UOL Group are Top Developers

City Developments, GuocoLand, SingHaiyi Group and UOL Group emerged as major winners with more than 9 awards each Lentor Mansion, Tembusu Grand and TMW Maxwell clinched 4 Exc...

Merck Announces Emerging Biotech Grant Program Winners

Award recipients to receive in-kind technologies and services to accelerate therapeutics to market Merck experts to provide consultation and training in qualification, risk assess...

Ocean City to host International Lantern Design Contest and Festival

HANOI, VIETNAM- Media OutReach Newswire - 1 November 2024 - Vinhomes JSC and Sunny Vietnam Co. announce the launch of the Ocean International Lantern Contest and Festival. This event marks the fi...

Lee Kum Kee Garners Industry Cares Recognition Scheme 2024 ‘Grand Award’ from the Federation of Hong Kong Industries

HONG KONG SAR - Media OutReach Newswire - 1 November 2024 - On 26 September, Lee Kum Kee rejoiced as the recipient of the esteemed 'Grand Award', 'The Most Devoted Award' and 'The Most Innovative ...

How to Get Your Property Ready to Sell

When you are selling your house, preparing it for viewings is very important but can equally be very stressful. This is something that is not only g...

Property

A Complete Guide To Buying Commercial Property: Applying For a Loan

Commercial property loans are an excellent way for businesses to finance the purchase of a new property. Whether you’re expanding an existing busi...

Property

Tips on How to Accomplish Your Goals as a New Business Owner

Being a new business owner can be an overwhelming experience for most due to the hefty responsibility of keeping a startup afloat. As such, many peo...

Business Training

13 Top Advantages of Owning a Real Estate Photography Business

Starting a real estate photography business can be both rewarding and practical, especially for those who have a passion for photography and an in...

Business Training

9 Reasons To Hire An SEO Agency in Sydney

Businesses across Sydney are now quickly coming out of lockdown. With 2022 just around the corner, it’s important that businesses adapt to the new...

Business Training

5 BENEFITS OF USING HIGH-QUALITY HEADPHONES

We all know how colorless life can be without the audio in it. And with the broad range of digital media that surrounds us wherever we go, we all ne...

Business Training