{"id":18015,"date":"2025-12-09T07:17:40","date_gmt":"2025-12-08T23:17:40","guid":{"rendered":"https:\/\/sgbuzz.com\/?p=18015"},"modified":"2025-12-09T07:17:40","modified_gmt":"2025-12-08T23:17:40","slug":"why-singapore-remains-cautious-over-naming-state-actors-in-cyber-attacks","status":"publish","type":"post","link":"https:\/\/sgbuzz.com\/?p=18015","title":{"rendered":"Why Singapore remains cautious over naming state actors in cyber-attacks"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div data-article-body=\"true\">\n<p class=\"mb-4 text-lg md:leading-8 break-words\">SINGAPORE \u2014 As Singapore ramps up efforts to confront cyber terrorism, Yahoo Singapore speaks to RSIS\u2019 Muhammad Faizal Abdul Rahman about cyber threats and what you can do to be better prepared in 2026.<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\">Faizal, who has a research background in terrorism and geopolitical cyber threats, also gives his thoughts on why Singapore is cautious about publicly identifying state actors and the government\u2019s move to start sharing classified threat intelligence with organisations in critical sectors.<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\"><strong>Q:<\/strong> What can the government do to better educate the regular person on cyber threats?<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\"><strong>Faizal:<\/strong> The government has implemented cybersecurity awareness campaigns and cyber hygiene programmes, including in schools, to educate the public. These should be sustained and could be updated to adapt to changes in the threat landscape and could be further customised to suit different sections of the demography.<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\"><strong>Q:<\/strong> A recent case involving <a class=\"link \" href=\"https:\/\/www.straitstimes.com\/singapore\/courts-crime\/jail-for-hackers-tasked-to-probe-sites-of-interest-laptops-had-info-linked-to-foreign-governments\" data-i13n=\"slk:three foreign hackers in Singapore;cpos:1;pos:1\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:three foreign hackers in Singapore;slk:three foreign hackers in Singapore;cpos:1;pos:1;elm:context_link;itc:0;sec:content-canvas\">three foreign hackers in Singapore<\/a> mentioned the use of PlugX-related tools. What exactly is PlugX?<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\"><strong>Faizal: <\/strong>Cybersecurity experts have described PlugX as a sophisticated malicious software that can avoid detection while infiltrating computer devices and performing a multitude of cyber espionage activities.<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\"><strong>Q:<\/strong> Going back to the case: There&#8217;s quite a lot of information in the report to digest, can you pick out any key observations?<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\"><strong>Faizal: <\/strong>One key observation is that the use of the same malware by both state-affiliated cyber threat actors and cybercriminals have blurred the lines between crime and national security as well as law enforcement and defence in the digital domain. Similar to how nation states have used mercenaries in the physical world to avoid international law and accountability in pursuing geopolitical interests, nation states can use cybercriminals as a deniable tool of state power to compete geopolitically in the digital domain.<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\"><strong>Q:<\/strong> In a <a class=\"link \" href=\"https:\/\/www.channelnewsasia.com\/commentary\/singapore-cyberattack-threat-security-unc3886-attribution-blame-country-5256086\" data-i13n=\"slk:recent opinion piece;cpos:2;pos:1\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:recent opinion piece;slk:recent opinion piece;cpos:2;pos:1;elm:context_link;itc:0;sec:content-canvas\">recent opinion piece<\/a> back in July, you suggested Singapore prefers technical attribution over political attribution when it come to identifying state actors involved in cyber-attacks. Please explain.<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\"><strong>Faizal: <\/strong>Countries that consider themselves neutral or non-aligned may prefer technical attribution over political attribution of malicious cyber activities. Technical attribution is based on factual data gathered during investigations and point to the perpetrator operating these activities.<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\">Political attribution may not always use factual data and usually pins the blame on a nation-state believed to be behind the perpetrator. While technical attribution demonstrates an act of defence, political attribution could be perceived as escalatory.<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\">So, countries need to assess where they stand in the realm of geopolitics and power to decide the course of action that best suits their national interests.<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\"><strong>Q:<\/strong> In October, MINDEF established the <a rel=\"noopener\" class=\"link  yahoo-link\" href=\"https:\/\/sg.news.yahoo.com\/mindef-digital-defence-unit-set-040254405.html\" data-i13n=\"slk:Digital Defence Hub (DDH);cpos:3;pos:1\" data-ylk=\"slk:Digital Defence Hub (DDH);slk:Digital Defence Hub (DDH);cpos:3;pos:1;elm:context_link;itc:0;sec:content-canvas;outcm:mb_qualified_link;_E:mb_qualified_link;ct:story;\" target=\"_blank\">Digital Defence Hub (DDH)<\/a>. Can you talk a bit about the importance of this development in light of the <a rel=\"noopener\" class=\"link  yahoo-link\" href=\"https:\/\/sg.news.yahoo.com\/unc3886-group-attacked-singapore-critical-113544374.html\" data-i13n=\"slk:UNC3886 attacks;cpos:4;pos:1\" data-ylk=\"slk:UNC3886 attacks;slk:UNC3886 attacks;cpos:4;pos:1;elm:context_link;itc:0;sec:content-canvas;outcm:mb_qualified_link;_E:mb_qualified_link;ct:story;\" target=\"_blank\">UNC3886 attacks<\/a>?<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\"><strong>Faizal: <\/strong>The Digital Defence Hub is a new unit in the Centre for Strategic Infocomm Technologies (CSIT), which has been around in MINDEF since 2003. It is likely that the strategic goal of the Hub is to better bring together defence capabilities and threat intelligence with those of the civilian Cyber Security Agency (CSA) and SAF\u2019s Digital and Intelligence Service.<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\">This development also shows that civilian and defence agencies need to work together in defending the digital domain where civilian interests are often the targets in cyber conflict between nation-states. It may also be a response to better prepare Singapore for the reality that the digital domain is being increasingly militarised, which is a reflection of the physical world today where there is an increase in armed conflicts and inter-state tensions.<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\"><strong>Q:<\/strong> It was also announced in October that the government will start <a rel=\"noopener\" class=\"link  yahoo-link\" href=\"https:\/\/sg.news.yahoo.com\/pore-govt-share-classified-threat-020135869.html\" data-i13n=\"slk:sharing its classified threat intelligence;cpos:5;pos:1\" data-ylk=\"slk:sharing its classified threat intelligence;slk:sharing its classified threat intelligence;cpos:5;pos:1;elm:context_link;itc:0;sec:content-canvas;outcm:mb_qualified_link;_E:mb_qualified_link;ct:story;\" target=\"_blank\">sharing its classified threat intelligence<\/a> with organisations in critical sectors. Can you explain this shift?<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\"><strong>Faizal:<\/strong> Sharing critical intelligence with critical infrastructure sectors reflects the reality today where critical infrastructures that provide essential services to the public and economy are targeted during peacetime and armed conflicts. There are international cyber norms that require nation-states not to damage critical infrastructure, but the reality today is that international rules and norms are increasingly being undermined. Physical borders as well as the digital backbone of critical infrastructure are the frontlines of conflict.<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\"><strong>Q: <\/strong>Lastly, can you offer some advice to the layman on steps they can take to stay safer in 2026 with regard to their cybersecurity?<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\"><strong>Faizal:<\/strong> It is necessary for the public to stay abreast of the situation by firstly regularly updating their devices\u2019 software and apps and install security tools and secondly take note of advisories issued by the Cyber Security Agency of Singapore (CSA) and the Singapore Police Force.<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\">For individual resilience, it would be useful to plan for situations where digital systems are down due to cyber threats. For example, do we need to keep some cash in the pocket in the event that digital payments are unavailable due to disruptive cyber-attacks to the financial infrastructure? Do we keep flashlights, spare batteries and power banks at home in the event that cyber-attacks targeting power grids cause blackouts?<\/p>\n<p class=\"mb-4 text-lg md:leading-8 break-words\"><em>Muhammad Faizal is a Research Fellow with the Regional Security Architecture Programme, Institute of Defence and Strategic Studies (IDSS) at the S. Rajaratnam School of International Studies (RSIS).<\/em><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/sg.news.yahoo.com\/why-singapore-remains-cautious-over-naming-state-actors-in-cyber-attacks-213927933.html\" target=\"_blank\" rel=\"noopener\">Read Full Article At Source <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SINGAPORE \u2014 As Singapore ramps up efforts to confront cyber terrorism, Yahoo Singapore speaks to RSIS\u2019 Muhammad Faizal Abdul Rahman about cyber threats and what&#8230;<\/p>\n","protected":false},"author":1,"featured_media":18016,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","footnotes":""},"categories":[2611],"tags":[],"class_list":["post-18015","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-buzz-headlines","wpcat-2611-id"],"_links":{"self":[{"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/posts\/18015","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=18015"}],"version-history":[{"count":0,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/posts\/18015\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/media\/18016"}],"wp:attachment":[{"href":"https:\/\/sgbuzz.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=18015"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=18015"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=18015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}