SWIFT report gives new insights into cyber threats

Published 

 

  • Attackers adjust Modus Operandi and fraudulent payment profiles
  • Increased vigilance enables early fraud detection
  • SWIFT’s information sharing initiative continues to deliver results

Brussels – SWIFT today publishes a new cyber report, ‘Three years on from Bangladesh: tackling the adversaries’, providing new insights into the evolving nature of the cyber threats facing the global financial community. 

Key findings show that:

  • Four out of every five of all fraudulent transactions were issued to Beneficiary accounts in South East Asia
  • Approximately 70 per cent of attempted thefts were USD-based – but usage of European currencies increased
  • The value of each individual attempted fraudulent transaction decreased dramatically – from more than USD$10m to between USD$250,000 and USD$2m

Three years after the cyber attack on Bangladesh Bank, and the subsequent launch of SWIFT’s Customer Security Programme (CSP), SWIFT’s study of cyber attacks on banks evidences how efforts to promote robust cyber security standards, the introduction of security-enhancing tools and an increase in the scope and quality of cyber threat intelligence sharing, are paying off.

Based on investigations conducted over the last 15 months, the report shows how closer industry collaboration resulted in the quick identification of financial institutions targeted by cyber criminals – in most cases, before attackers were even able to generate fraudulent messages. In particular, the exchange of relevant and timely cyber threat intelligence has proved critical in effectively detecting and preventing attacks.

Dries Watteyne, Head of Cyber Security Incident Response Team at SWIFT, said: “SWIFT’s threat intelligence sharing has highlighted the changes to cyber criminals’ tactics, techniques and procedures used in attempted attacks, enabling industry participants to understand and respond to the increasingly sophisticated nature of cyber threats. In this report, SWIFT reveals important information about the evolving payment profile to enable more accurate detection through business indicators. It is encouraging that detection rates of attempted attacks are increasing, but we need to be mindful that malicious actors adapt rapidly. The industry must continuously strengthen and diversify its defences, investigate incidents and share information.”

Brett Lancaster, Head of Customer Security, said: “These cases show how SWIFT solutions including our Daily Validation Reports tool, our Payment Controls Service and the gpi Stop and Recall facility can all have real, positive impact. They also evidence the importance of implementing security controls and of understanding and mitigating against cyber risks presented by counterparties. This is why more and more customers are turning to SWIFT’s KYC-Security Attestation utility to consume that information.”

The report also reveals:

  • Extended reconnaissance periods: attackers continue to operate ‘silently’ for weeks or months after penetrating a target, learning behaviours and patterns before launching an attack.
  • Timings are shifting: malicious actors previously favoured issuing fraudulent payments outside business hours to avoid detection but have more recently turned this approach on its head, acting during business hours to blend in with legitimate traffic.
  • New payment corridors: the vast majority of fraudulent transactions investigated over the past 15 months used payment corridors (combinations of target and beneficiary banks) that had not been used during the previous 24 months.

The report recommends the:

  • Development of new defensive measures: the development and deployment of security-enhancing innovations will help thwart cyber thieves.
  • Increase of information sharing: the more information the community shares and the frequency with which it shares, the better chance of avoiding or fending off an attack.
  • Adherence to robust cyber security standards: ensuring strict adherence to strong standards and implementing controls is key to prevention and detection.
  • Consumption of counterparty cyber security data: users should incorporate the assessment of counterparties’ attestation data against SWIFT’s Customer Security Controls Framework into their risk management and business decision-making processes.

 

Most recent episodes

Keeping the Plates Spinning: the Art of Treasury Project Management

Sandra Shen (Actualize Consulting) joins TMI's Tom Alford to offer professional insight into what defines successful treasury project management.  Our guest provides expert guidance on how to assign roles and leadership during project planning stages, considers the importance of mitigation...

18:27

Audio TMI - ESG: Time to Decide

The pressure to comply with ESG initiatives is being felt by corporates like never before, with ESG-compliance a common concern among treasury departments. TMI talks to Lavinia Bauerochse (Deutsche Bank) about treasury’s ...

11:41

UK Autumn Statement Restores Confidence in Sterling

Welcome to the latest edition of Liquidity Link Live, your exclusive market analysis provided by Northern Trust Asset Management, one of the world’s largest cash managers. Tune in each month to discover the very latest insights on the UK, Eurozone and US markets. This edition was recorded on the 7th...

05:16

Trade Finance Vision: J.P. Morgan and Cleareye Collaboration Plots Future Path

Eleanor Hill (TMI) is joined by Natasha Condon (J.P. Morgan Payments) to discuss the latest trends and innovations emerging from the trade finance arena. Natasha considers how treasurers can improve the efficiency of their working capital, and examines why it remains critical for banks and fintechs to...

29:01

Embedded Finance: A 101 Guide for Treasurers

Our latest TreasuryCast guest, Aman Narain (HSBC) sits down with TMI's Eleanor Hill to consider the ways in which treasury might be impacted by embedded finance. In this podcast, Aman explains the differences between embedded finance and BaaS, shares his hopes for the future in this space, and provides...

12:58

Audio TMI - A Modern, Agile, and Efficient Machine

UniCredit's Raphael Barisaac and Massimo Ortino explain how the fir...

What’s on the Horizon for Short-term Investments?

The treasury community has risen to the ongoing challenge of rising interest rates and inflation, with corporate cash serving as the sought-after safety net. Here, Daniel Farrell (Northern Trust Asset Management) and Karl Adams (ICD) consider how the latest MMF reform proposals affect short-term...

39:27

Transitioning a Corporate from LIBOR to CME Term SOFR

The loans market has predominantly moved to forward looking term rates, and both corporate borrowers and global lenders are increasingly turning to CME Term SOFR as the forward looking risk-free benchmarks to support their activities. Listen to this podcast, featuring Gavin Lee, Marco Bianchi (CME...

37:16

HSBC’s Sibos Spotlight – View from Sibos

TMI's Eleanor Hill invites Neil Atkinson, Nadine Lagarmitte, and Vinay Mendonca (HSBC) to discuss the critical treasury topics and conversations highlighted at this year's Sibos conference in Amsterdam. Amongst a wealth of market insights, our guests consider the most critical developments emerging from...

38:40