Recurring |
one_organization, multiple_organization |
(a) The software failure incident having happened again at one_organization:
- In 2013, Prime Minister Lee Hsien Loong's official website was "compromised" by hackers claiming to be members of the hacking group Anonymous [73432].
- The recent incident in 2018 involved the breach of the government health database in Singapore, specifically targeting the data of Prime Minister Lee Hsien Loong, including information on his outpatient dispensed medicines [73432].
(b) The software failure incident having happened again at multiple_organization:
- The article mentions high-profile cyber-attacks in other countries, such as Germany, the US, UK, and North Korea, indicating that similar incidents have occurred in multiple organizations globally [73432]. |
Phase (Design/Operation) |
design, operation |
(a) The software failure incident in Article 73432 occurred due to a design-related contributing factor introduced during system development. The breach into the government health database in Singapore was a result of hackers gaining access to the database through malware that infected a computer belonging to SingHealth, one of the state's major government healthcare groups. This breach was described as a "deliberate, targeted and well-planned" attack, indicating a flaw in the design or security measures of the system [73432].
(b) The software failure incident in Article 73432 also involved contributing factors introduced during the operation of the system. The breach was facilitated by the operation of the infected computer within SingHealth, allowing the hackers to gain access to the database. This highlights the importance of operational security measures and the potential for misuse of systems to lead to software failures [73432]. |
Boundary (Internal/External) |
within_system |
(a) within_system: The software failure incident in Singapore, where hackers stole personal data from the government health database, was due to a breach that originated from within the system. The hackers gained access to the database by infecting a computer belonging to SingHealth with malware, allowing them to extract data on 1.5 million individuals [73432]. |
Nature (Human/Non-human) |
non-human_actions, human_actions |
(a) The software failure incident occurring due to non-human actions:
The software failure incident in Singapore, where hackers stole personal data belonging to 1.5 million people, was a result of the systems being breached through malware infecting a computer belonging to SingHealth, one of the state's major government healthcare groups. The hackers gained access to the government health database through this malware, which was a non-human action introduced into the system [73432].
(b) The software failure incident occurring due to human actions:
In the same incident, it was reported that the hackers broke into the government health database in a "deliberate, targeted, and well-planned" attack. This indicates that the failure was also a result of human actions, specifically the deliberate actions of the hackers to breach the system and steal personal data [73432]. |
Dimension (Hardware/Software) |
hardware |
(a) The software failure incident occurring due to hardware:
The software failure incident in Singapore, where hackers stole personal data from the government health database, was attributed to a hardware-related issue. It was mentioned that the breach occurred when a computer belonging to SingHealth, one of the state's major government healthcare groups, was infected with malware, allowing the hackers to gain access to the database [73432].
(b) The software failure incident occurring due to software:
The software failure incident in Singapore, involving the theft of personal data from the government health database, was primarily caused by software-related factors. Hackers exploited a vulnerability in the system by infecting a computer with malware, which enabled them to access the database and steal sensitive information [73432]. |
Objective (Malicious/Non-malicious) |
malicious |
(a) The objective of the software failure incident was malicious:
- The software failure incident in Singapore, where hackers stole personal data belonging to 1.5 million people, was a deliberate, targeted, and well-planned attack on the government health database [73432].
- The hackers gained access to the database by infecting a computer belonging to SingHealth with malware, indicating a malicious intent to breach the system and steal sensitive information [73432].
- Prime Minister Lee Hsien Loong's personal data, including information on his outpatient dispensed medicines, was specifically and repeatedly targeted, showing a deliberate attempt to access sensitive information [73432].
(b) The objective of the software failure incident was non-malicious:
- There is no indication in the articles that the software failure incident was non-malicious. |
Intent (Poor/Accidental Decisions) |
poor_decisions |
(a) The intent of the software failure incident was due to poor_decisions. The breach into the government health database in Singapore was described as a "deliberate, targeted and well-planned" attack by hackers [73432]. This indicates that the hackers made intentional decisions to carry out the attack, rather than it being accidental or unintended. |
Capability (Incompetence/Accidental) |
accidental |
(a) The software failure incident in Singapore, where hackers stole personal data belonging to 1.5 million people, was not attributed to development incompetence but rather to a deliberate, targeted, and well-planned attack. The breach occurred through malware infecting a computer belonging to SingHealth, one of the state's major government healthcare groups, allowing hackers to gain access to the database [73432].
(b) The software failure incident in Singapore, resulting from the data breach, was accidental in the sense that the hackers gained access to the government health database through malware infection, which was not intentionally introduced by the organization but rather exploited by the attackers. The breach was not caused by accidental factors but rather by a deliberate and targeted cyber-attack [73432]. |
Duration |
permanent, temporary |
(a) The software failure incident in the reported hack on the Singapore government health database can be considered permanent. The breach was described as a "deliberate, targeted and well-planned" attack by hackers who gained access to the database through malware infecting a computer belonging to SingHealth [73432]. The incident resulted in the theft of personal data belonging to about 1.5 million people, including specific targeting of Prime Minister Lee Hsien Loong's information on outpatient dispensed medicines. The breach was not limited to a specific timeframe but was a result of deliberate actions by the hackers to access and steal sensitive information from the database.
(b) The software failure incident can also be considered temporary in the sense that the breach occurred within a specific timeframe between 27 June and 4 July [73432]. This indicates that the breach was not a continuous failure but rather a specific incident that took place over a limited period. The breach was identified and reported, leading to immediate actions to address the vulnerability and prevent further unauthorized access to the database. |
Behaviour |
crash, other |
(a) crash: The software failure incident in the article can be categorized as a crash. The system lost its state and did not perform its intended functions due to being breached by hackers who gained access to the database [73432].
(b) omission: There is no specific mention of the software failure incident being due to the system omitting to perform its intended functions at an instance(s) in the article.
(c) timing: The software failure incident is not related to the system performing its intended functions correctly but too late or too early.
(d) value: The software failure incident is not related to the system performing its intended functions incorrectly.
(e) byzantine: The software failure incident is not related to the system behaving erroneously with inconsistent responses and interactions.
(f) other: The software failure incident in the article can be categorized as a deliberate, targeted, and well-planned attack by hackers who infected the system with malware, leading to the breach of the database [73432]. |