Breaking News

Singapore will isolate Government Computers from the Internet

The Government of Singapore will cut off civil servants’ work computers from the Internet in order to secure Government networks.

The Singapore’s prime Minister Lee Hsien Loong confirmed this week that the Government would disconnect from the Internet government work stations within a year for security reasons.

The measure was aimed at preventing cyber attacks that could inject malware into the government email network.

The decision has shocked to IT industry, also consider that Singapore is one of the most technological countries.

The local news agency The Straits Times reported that the measure will impact some 100,000 computers.

“We have started to separate Internet access from the work stations of a selected group of public service officers, and will do so for the rest of the public service officers progressively over a one-year period,” the Infocomm Development Authority (IDA) said in a written reply to AFP queries.

The prime Minister Lee Hsien Loong has publicly defended the Government decision to cut off civil servants’ work computers from the Internet.

Civil servants would still be able to access the Internet by using their personal devices.

“Are we happy? I don’t think so, because it will slow us down in terms of day-to-day productivity. In terms of security, safety of our systems, safety of our citizens and information concerning them, it’s absolutely necessary,” he explained to the media.

The minister confirmed that other Government networks, including the ones of the defence and foreign affairs ministries, are already disconnected from the Internet to protect sensitive data.

The Straits Times newspaper quoted a cyber security official who reported at least 16 malware based attacks on government systems last year. Government experts detected the malware and neutralized it.

We have to consider that the decision is very important for a so Internet-savvy society, the Singapore Government provides a wide range of web services to the citizens.

At the same time, the Government and national infrastructure are a privileged target of hackers, in 2014 a section of the prime minister’s website, as well the website of the presidential residence were targeted by unknown attackers.

In December 2015, experts at FireEye discovered a stealthy botnet relying on a backdoor called LATENTBOT that compromised companies around, including Singapore. In January, a new variant of the infamous Tinba banking trojan has emerged in the wild and targeted financial institutions in the Asia Pacific region, including Singapore.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – Singapore, Hacking)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

27 minutes ago

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

21 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

22 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

This website uses cookies.