Hackers promoted bogus terror attack at APEC 2009

07.12.2010

"The perpetrators were technically savvy and demonstrated security consciousness," the Home team Journal article stated. "Other than deleting their traces in the infected computers after they had finished their operations, they also established anti-tracking operation set-ups, for example, their control servers were registered with fake names just prior to the attacks and likely to be used purely for controlled the Trojans and discarded after the attacks were completed."

The article said that analysis of the communication between the malware and the control servers led to dubious domain names and registrants.

This latest official article said the Singapore government suffered minimal damage from the attacks, however “the cyber-threat landscape is ever-evolving and we will not be seeing the last of such cyber attacks:.

"Lapses and complacency may bring about a ‘Digital Pearl Harbour’ to the nation."