Voluntary Undertaking by Axxis Consulting (S) Pte Ltd

Background

Axxis Consulting (S) Pte Ltd (the “Organisation”), a reseller of SAP Enterprise Resource Planning (“ERP”) systems that provides installation and configuration of SAP services and cloud hosting services, discovered a ransomware attack within its data center environment on 22 June 2024 after corporate clients reported difficulties connecting to its cloud hosting platform. Nine (9) VMware ESXi servers (the “ESXi servers”) likely to contain personal data from its clients had been encrypted by ransomware (the “Incident”). The Personal Data Protection Commission (the “Commission”) was notified of the Incident through several of its affected clients on 12 July 2024.

Investigations revealed that the threat actor (“TA”) had gained initial access to the Organisation’s network through SSL-VPN connectivity on the Organisation’s firewall using a local administrative account, likely stolen by exploiting known vulnerabilities in the firewall that had reached End-of-Life (“EOL”) support as of 11 October 2023. The TA subsequently created an unauthorised administrative-level account on the Organisation’s backup server and deleted backup data via Remote Desktop Protocol (“RDP”) connectivity. Other vulnerabilities in the Organisation’s server management software also were likely exploited by the TA to activate Secure Shell (“SSH”) connections to the ESXi servers and execute ransomware encryption.

The TA had disabled the Organisation's data center environment by encrypting server configuration files and the virtual hard disk drives on the ESXi serves which affected user access of 74 corporate clients, including 54 Singapore-based companies, to their respective SAP ERP systems hosted on the ESXi servers.

Investigations found that before the Incident, data on the SAP ERP software was encrypted at rest through SAP’s security controls and access to client databases required separate authentication login which the Organisation’s compromised administrative accounts did not have access rights to. The Organisation’s corporate data was also affected in the Incident. However, employee personal data was stored independently from its data center and was not affected in the Incident.

Upon discovery of the Incident, the Organisation took prompt remedial actions including resetting all system passwords, disabling any unused accounts, additional restrictions for external VPN access, enhancing data backup protocol, implementing multi-authentication for key accounts and stricter access controls to limit client RDP usage. The Organisation also promptly engaged an external digital forensics consultant to scan for any dark web exposure on two separate occasions, neither of which suggested any evidence of dark web exposure.

Voluntary Undertaking

The Commission considered that while there may be lapses in the Organisation’s security measures, including using an EOL firewall, out of date software on its backup server and a lack of a formal patch management policy, the likelihood of the TA accessing or exfiltrating PD is low. PD held by ACPL’s 74 clients was encrypted by SAP security controls.

Having considered the circumstances of the case, the Commission accepted a voluntary undertaking (the “Undertaking”) from the Organisation to improve its compliance with the Personal Data Protection Act 2012 (the “PDPA”). The Undertaking was executed on 27 March 2025.

As part of the Undertaking, the Organisation will be implementing the following:

(a) Conduct regular security reviews on an inter-group basis;

(b) Conduct regular data protection and cybersecurity awareness training for IT personnel;

(c) Undergo and obtain the Cyber Essential Certification;

(d) Ensure upgrading of network security measures are completed and reviewed for relevancy and efficiency;

(e) Ensure strict oversight to ensure patch management policy is adhered to;

(f) Conduct a red team cyber-attack simulation exercise to ascertain the effectiveness of enhanced threat detection and response capabilities; and

(g) Ensure that logging is enabled for the newly migrated AWS environment.

The Commission will verify the Organisation’s compliance with the Undertaking. If the Organisation fails to comply with any terms of the Undertaking, the Commission may issue a direction so as to ensure the Organisation’s compliance with the Undertaking.