The announcement that 1,200 SingPass were compromised and that quarter of them had their unauthorized password reset raised the question about cyber security. However, it seems from media reports that the blame is on end users. IDA should also take the responsiblity of the safety of our SingPass details.
A FireEye spokesperson suggested that the breach was probably from a malware in a user's device and that it allowed the perpetrator to access 1,200 SingPass. This raises a strong probability that the communication between device and database server may be not as strong as thought. Furthermore, it could highlight that the database server is not as strongly encrypted as a full section was
accessed via a single malware.
Media reports noted that IDA was receiving complains over the weekend from SingPass users receiving unauthorized password reset letters and CrimsonLogic only raised the matter with IDA on Monday evening. This resulted in the "hastily" arranged press conference on Wednesday. Given that letters take a day to be delivered within Singapore, the unauthorized reset was probably done on Thursday and/or Friday. From this approximated timeline, it took a week from the unauthorized entry for IDA to hold a press conference.
If there were a spike in password reset, there should have been an alert to inform CrimsonLogic. It seems that either there is no such alerts or the level of requests to reset password on a daily basis is so hight, the spike turned into a false positive.
If the former is the reason, there should be concerns as spikes in unusual activities are not resulting in alerts to take prompt action. If it is the latter, IDA should reexamine how passwords are set.
The estimate period of time IDA took to alert the public is also of a concern. If this was a real hack and data compromise, lots of information would have fallen in the wrong hand.
The delay in implementing third factor authentication is also a concern. What made the situation worst was that reports highlight the delay as only one vendor bid for the tender. Surely, security of individual data should be critical to call for a new tender?
Hopefully, IDA can and will learn from this incident. While CrimsonLogic has assured that no data was compromised, there should be more security and encryption especially in how the data is communicated from end to end and how it is being stored.
Comments
First: Using our IC No as a default ID already simplifies half the task for hacking since its not difficult to obtain lists of valid ICs, with the check alphabet. eg just get hold of a bunch of entry forms for supermarket lucky draws. So only need to guess the password.
Secondly: Get entry into the sign-in database of a large corporation in SG eg telcos, banks etc with large online user base. Take the IC numbers, telephone numbers and passwords, cover tracks and exit. Use this list to hack into SingPass. Many users tend to used the same password so there will be a reasonable hit rate that the attack will not attract suspicion.
Conclusion: letting us use IC No is an user friendly idea but since IC numbers are not randomly generated, the security regime need to be thought through even more rigourously such as making in compulsory for those who retain the IC as default to register their handphone to receive an SMS code for transaction validation. (and for the occasion when you lose your phone and urgently need to use Singpass, allow you to register your home phone or alternative mobile to receive a call from theif call centre etc.