What Happened to 2,400 SAF Personnel’s Personal Info?
On Saturday (Dec 21), the Ministry of Defence (Mindef) and Singapore Armed Forces (SAF) announced that a nasty phishing scam slipped through a private vendor, ST Logistics, and exposed the personal data of about 2,400 SAF members.
How It All Went Wrong
ST Logistics—our third‑party logistics partner that runs eMart retail and supplies gear for people in uniform—was the culprit. Employees received a malicious email that, when opened, unleashed malware. The data stolen included:
- Full names and NRIC numbers
- Contact details (phone, email, or home address)
The timing of the charge‑up remains unknown. No one knows when the phishing hit or how long it simmered in the system.
Another Breach on a Different Vendor
In a separate incident involving a healthcare training provider—the HMI Institute of Health Sciences—cybercriminals hit a server on Dec 4 and ran ransomware. The data was sensitive, covering 120,000 individuals, including 98,000 SAF servicemen who had taken CPR and AED courses.
HMI’s cybersecurity partner found the attack random and opportunistic. There’s no evidence the data was copied or sent elsewhere, so the risk of a leak is low. The institute—contracted by SAF since 2016—has notified everyone affected and added extra safeguards.
Vendors Take Responsibility
- ST Logistics pledged to treat all personal data with top‑notch integrity. CEO Loganathan Ramasamy apologized, promising stronger protection.
- HMI’s executive director, Tee Soo Kong, assured that new security layers were installed and everyone warned to stay sharp.
Both companies issued apologies, acknowledging the damage and committing to keep personal data safe. The takeaway: keep your passwords tight and your eyes on suspicious emails—everyone on the SAF front line should check that they’re not needing to convince their email to drop a bomb!

Health Data at Risk: HMI’s Cyber Glitch
Rumors have begun swirling over a nasty malware mess that has rattled the Health Management Institute (HMI) and its partners. The latest scuffles leave weeping personal data and a whole lot of nervousness in its wake.
Who’s on the Watchlist?
The Personal Data Protection Commission (PDPC) and the Singapore Computer Emergency Response Team have been called into the ring. Both officials are tip‑to‑tip and digging into the whys and hows of the breaches.
Mindef & SAF: They’re Not Taking This Lightly
- Mindef and the Singapore Armed Forces (SAF) are diving head‑first into the chaos, siding with both vendors to map the damage and probe whether personal data got the negative invisibility cloak.
- “These security blunders aren’t a joke for us,” Ministry of Defence declared. “If our vendors don’t keep their systems safe, we’ve got to rethink who gets our contracts.”
- Speaking to the media, Defence Cyber Chief Brigadier‑General Mark Tan added a clear message: “Our own engineering and data remains untouched, but the malware that invaded these supplier systems could have exposed our personnel’s private info. We’re tightening the safety net for future collaborations.”
Hands‑On Updates for Those Directly Affected
In a bid to guard the private files of our forces, Mindef has started sending direct notifications to all impacted personnel from the previous Saturday. Stay alert.
What This Means for the Future
Moving forward, Mindef & SAF will loom over suppliers with a keyboard wielded in treble clarity. Transparent cybersecurity standards will be the new North Star for awarding contracts. No more highest‑profile breaches.
Keep your eyes peeled, because if you’re about to do business up close with HMI, you’ll want to reassess those risk calculators. The good news is there’s a team on the job, so pain points can be addressed before they become headline headlines.
