Singapore's Evolving Cybersecurity Landscape: Lessons from 8 Major Cyber Attacks
- Netmarks Singapore

- Nov 20
- 5 min read
The data from CSA’s Singapore Cyber Landscape 2024/2025 Report, Singapore's current cybersecurity landscape is defined by a multi-faceted and intensifying threat level. At the highest level, state-sponsored espionage (APT) activity targeting critical national infrastructure has quadrupled since 2021.

This is compounded by a dramatic increase in high-volume attacks affecting all businesses, evidenced by a 21% rise in targeted ransomware and a nearly 50% surge in AI-driven phishing campaigns.
These threats often succeed by exploiting two core vulnerabilities: the widespread prevalence of unpatched systems—which saw a 67% increase in compromises—and critical third-party supply chain failures that pose a significant risk to business continuity.
The UNC3886 Espionage Campaign (July 2025): A Threat to National Infrastructure Cyber Attack

UNC3886 attack path diagram. Source: Google Cloud What Happened
A sophisticated, China-linked espionage group, UNC3886, was discovered launching a "serious" and ongoing attack against Singapore's critical information infrastructure (CII). Their goal was long-term espionage, exploiting zero-day vulnerabilities in network and security devices to maintain persistent, silent access.
Actionable Lesson
Against advanced persistent threat actors who exploit unknown vulnerabilities, basic defences are insufficient. This reality demands a strategic shift towards proactive threat hunting. As a partner of industry leader CrowdStrike, Netmarks Singapore deploys Endpoint Detection and Response (EDR) solutions that can identify the stealthy techniques used by such state-sponsored actors.
Why This Is Important
State-sponsored attacks represent the pinnacle of cyber threats. Their goal is not just financial gain but long-term strategic advantage, making them a severe risk to national security and the stability of entire industries.
The DBS & Bank of China Breach (April 2025): The Vendor Weak Link

Source: The Straits Times What Happened
A classic supply chain attack compromised a third-party vendor for DBS and the Bank of China, exposing the sensitive data of over 11,000 bank customers. Critically, the banks' own systems were not directly breached.
Actionable Lesson
This incident underscores the urgent need for robust controls over data shared with third parties. A stringent Data Security policy must be enforced, limiting vendor access to only essential information and monitoring data flows to detect and block unauthorised exfiltration attempts.
Why This Is Important
A supply chain attack is a force multiplier for hackers. By breaching one software vendor, they can gain access to the sensitive data of dozens of high-profile companies, maximising their impact whilst minimising their effort.
The Shook Lin & Bok Ransomware Attack (April 2024): A Legal Precedent

Shook Lin & Bok Logo. Source: law.asia What Happened
The prominent law firm Shook Lin & Bok fell victim to the notorious Akira ransomware group, threatening severe operational disruption and the leak of highly confidential client data.
Actionable Lesson
A multi-pronged strategy is essential. This starts with robust Endpoint Security to block the malware at the source. This must be paired with a comprehensive Data Security strategy, including resilient backups and access controls, to ensure systems can be restored without acceding to criminal demands.
Why This Is Important
Ransomware attacks on professional services firms aim to cripple operations and leverage the confidentiality of client data for extortion, creating a dual threat of financial and reputational ruin.
The Marina Bay Sands Data Breach (October 2023)

Sands Lifestyle Membership. Source: Marina Bay Sands What Happened
An unauthorised party successfully accessed the personal data of approximately 665,000 members of the "Sands LifeStyle" rewards programme.
Actionable Lesson
This highlights the necessity of a multi-layered Data Security approach. This involves implementing stringent access controls, encryption, and monitoring to ensure that only authorised personnel can access sensitive customer databases, with all activities logged to detect anomalies.
Why This Is Important
Customer loyalty programmes are goldmines of valuable personal data. A breach not only violates privacy but also severely damages brand trust and customer loyalty.
The Meiji Seika Ransomware Attack (August 2022): The Manufacturing Target

Meiji Pharma Logo. Source Meiji.com What Happened
A ransomware attack on the food manufacturer Meiji Seika Singapore signalled a growing trend of cybercriminals targeting the manufacturing sector for valuable intellectual property.
Actionable Lesson
For manufacturers, protecting the factory floor is paramount. This requires specialised OT Security solutions that understand the unique protocols and operational needs of industrial environments, including network segmentation to isolate critical production systems.
Why This Is Important
For manufacturers, a cyberattack is not just a data breach; it can halt production lines, compromise trade secrets, and cause tangible physical and financial damage.
The Singtel Data Breach (January 2021): The Third-Party System Failure

Singtel (left) and SPH Magazines, which operates, hosts and maintains HardwareZone forum site, were among the latest seven organisations which have flouted the data protection law. Source: The Straits Magazine What Happened
A third-party file-sharing system used by Singtel was compromised, leading to the theft of personal information from 130,000 customers.
Actionable Lesson
This underscores the need for proactive security hygiene across all systems. This can be addressed through a diligent Endpoint Management programme, ensuring that security patches for all software, including third-party applications, are tested and deployed in a timely manner to close vulnerabilities.
Why This Is Important
When a core service provider is breached via a third party, it erodes public trust not only in the company but in the broader digital ecosystem.
The OCBC Phishing Scams (December 2021–January 2022): The Human Element

Screenshot of phishing scam messages posing as OCBC. Source: Channel News Asia What Happened
Hundreds of OCBC customers suffered significant financial losses after falling for a sophisticated phishing campaign using spoofed SMS messages.
Actionable Lesson
A holistic strategy must combine technical and human controls. This requires robust Email Security and DNS Security solutions to filter malicious messages and block access to phishing sites at the network level, providing a critical layer of protection for users.
Why This Is Important
Social engineering attacks bypass even the most expensive security technologies by exploiting human psychology, making employee and customer awareness a critical, non-negotiable layer of defence.
The SingHealth Data Breach (2018): The Foundational Crisis

SingHealth Cyber Attack. Source: The Straits Times What Happened
In a targeted attack, hackers stole the personal data of 1.5 million patients from Singapore's largest healthcare group. The subsequent investigation exposed numerous systemic vulnerabilities.
Actionable Lesson
This event highlighted the need for a complete overhaul of security posture. It is a prime case for implementing a multi-layered IT Security strategy, encompassing Network Security, Endpoint Security, and Data Security, supported by a dedicated IR (Incident Response) capability for rapid reaction to threats.
Why This Is Important
The breach of sensitive healthcare data is one of the most severe forms of privacy violation, irrevocably damaging patient trust and highlighting the duty of care organisations have to protect the data they hold.
Conclusion: Forging a Resilient Cyber Defence
The lessons from Singapore's most significant cyberattacks are clear: a reactive approach is no longer sufficient. A strategic cybersecurity posture is more than an IT project—it is the foundation of customer trust, regulatory compliance, and business continuity. With the threat landscape constantly evolving, Singapore businesses must adopt a proactive, multi-layered defence that is resilient, intelligent, and future-ready.
Ready to Strengthen Your Cybersecurity Defence?
Netmarks Singapore provides a full spectrum of cybersecurity solutions tailored for your industry. Connect with our specialists to build a robust and resilient security strategy for your organisation.
Email: enquiries@netmarks.com.sg
WhatsApp: +65 8902 3303
Or simply click the button below to connect with our cybersecurity specialists.




Comments