The Adversary Ecosystem Singapore Boards Must Confront

The Adversary Ecosystem Singapore Boards Must Confront

By Xiang Zheng Teo, Vice President of Advisory, Ensign InfoSecurity

 

Over the past two years, several major organisations in Singapore across sectors such as law, construction, insurance, and IT services have suffered significant ransomware attacks. These incidents have ranged from the freezing of critical systems and exposure of sensitive client or project data, to the compromise of customer records through third-party service providers. In many cases, while organisations maintained that their core systems remained unaffected, the breaches revealed how operational disruptions, data exposure, and supply chain vulnerabilities can become substantial reputational and business risks.

 

The consequences were twofold. Operations ground to a halt, while reputational damage, financial loss, and regulatory scrutiny loomed large. In many cases, paying the ransom rarely closes the chapter. Even when organisations comply, stolen data often resurfaces on illicit marketplaces, traded repeatedly for profit. Exposure in these markets can bring not just substantial commercial loss and lawsuits but also entanglement in geopolitical conflicts.

 

This is far from an isolated trend. Companies are no longer facing lone hackers working from basements. Our latest Cyber Threat Landscape Report 2025 reveals that cybercrime has evolved into a thriving underground economy, driven by networks of specialised criminals who are organised, profit-driven, and highly collaborative.

 

This raises a sobering question: how can companies possibly stay ahead when their enemies are not just multiplying but collaborating at scale?

 

The Rise of a Collaborative Underground Economy

 

The answer lies in understanding what has changed. Cybercrime today operates as a structured value chain, mirroring legitimate business efficiency. Stolen data, access, and tools are traded like legal commodities, while criminal networks share expertise, subcontract tasks, and monetise their skills. These make cyber-attacks more scalable, organised, and far harder to counter than isolated threats of the past.

 

At the start of this chain are Initial Access Brokers (IABs). These specialists breach networks through phishing, unpatched vulnerabilities, or stolen credentials, then sell access to others. Their "breach once, sell to many" model is devastatingly effective, as a single compromise can be resold repeatedly, fuelling cascades of attacks and ongoing financial gain.

 

The result is that anyone with bad intentions can now launch sophisticated attacks by buying what they lack. For example, Ransomware-as-a-Service groups buy access from IABs to launch attacks, encrypt files, and demand payment, often combining extortion with threats of public leaks. Operating like corporations with negotiators and payment systems, they reinvest profits into constant innovation, spawning new variants and stealthier techniques that make attacks harder to detect, defend against, and recover from.

 

Accelerated by AI, this ecosystem automates attacks and lowers barriers to entry for aspiring criminals. It complicates attribution and heightens operational and reputational risks for unprepared organisations.

 

When Trust Becomes the Target

 

What makes this evolution so dangerous is not only the scale of attacks but also their focus on the trust fabric that underpins business. The cyber supply chain exploits trusted vendors, often forming the weak links to the organisation, and a single breach can spread like wildfire, causing reputational damage, regulatory scrutiny, and crippling operational disruption no Board can afford to ignore.

 

Business and Professional Services firms, including law practices, accountancies, and data processors, are particularly exposed. As custodians of sensitive client information, from merger and acquisition strategies to financial records, they occupy a position of trust. Yet many lack the mature cybersecurity defences of larger enterprises, making them attractive entry points. Attackers are also found to frequently exploit both hardware and software to gain stealthy, persistent access, with one breach enabling lateral movement that amplifies risk across multiple corporate systems and client networks.

 

Hacktivists and state-linked actors also exploit trust in more insidious ways. They spread disinformation, manipulate narratives, or disrupt services to achieve political and economic goals. In these cases, the aim is not only financial gain but also reputational damage and societal impact. For businesses, the risk is therefore twofold: operational disruption and the erosion of trust across their entire ecosystem.

 

Building Resilience in the Age of Cybercrime

 

Against this backdrop, the old approach of treating cybersecurity as a purely technical or IT problem is no longer sufficient. If adversaries are collaborating, innovating, and scaling, companies must respond with equal seriousness — and that response must start at the very top.

 

Boards must own cyber risk. Leaders should move beyond compliance checklists, engaging directly with security teams. They need to ask tough questions about the organisation’s real risk posture and assess readiness for AI-driven attacks, Ransomware, and cyber supply chain threats. This means understanding where the most valuable data resides and who has access to them and how they relate to critical business processes.

 

Equally important for business leaders is ensuring that budgets reflect the reality of the threat landscape, that accountability is clearly defined, and that cyber risk is embedded into enterprise-wide risk management frameworks. For example, supply chains must be rigorously stress-tested. Companies should inventory suppliers, monitor their threat exposure, evaluate their resilience, and ensure robust cybersecurity standards are met. Effective oversight of the supply chain is a cornerstone of modern risk management.

 

Cybersecurity must be central to governance. It underpins trust, growth, and compliance. The increasing frequency and complexity of attacks demand a proactive, threat-informed defence approach that can help organisations anticipate, prevent, and respond to cyber threats confidently. Security should be a standing Boardroom agenda item, not just a reactive response.

 

In a world where trust is a company’s most valuable currency, boards that embrace cyber resilience gain a competitive edge. Singapore’s leaders must recognise that decisive action today protects not only assets but the organisation’s future in a digital-first world.

 

-End-

 

This article was published in Singapore Business Review. Read more here.