Introduction
Overview
In 2015 and 2016, a series of cyberattacks were carried out against various banks, and the attackers targeted the SWIFT network to steal funds. The attackers exploited vulnerabilities in SWIFT's Alliance Access software in order to initiate fraudulent transfer requests to accounts they control. Biggest attack was the Bangladesh bank heist, in which the attackers attempted to transfer close to $1B to fraudulent accounts, but were blocked by the New York Federal Reserve due to suspicions raised from a typo in the instructions.
Vulnerability Details
Initial compromise of Bangladesh Bank likely occurred through a combination of phishing emails or other social engineering methods. Sophisticated malware developed and used against SWIFT's Alliance Access software, tailored to manipulate SWIFT messages. With access to Bangladesh Banking systems and knowledge of their transactions, the attackers initiated the fraudulent transfer requests using their compromised SWIFT transfer messages. The attacks were consistent with tactics and methods used by the Lazarus Group, also known as APT 38, which is widely connected to the North Korean government. If APT 38 is backed by the North Koreans, this would be the first instance of a state actor conducting cyber attacks to steal funds, which could have profound implications for international relations. SWIFT announced new mandatory controls that all member banks must follow, and they will inspect member banks for compliance and inform appropriate regulators of noncompliant banks. SWIFT understands that they will continue to be the target of attacks and urge banks to remain vigilant.
Learning Objectives
- Explain data security and privacy
- Describe security and privacy violations in the SWIFT banking hack
- List common protection mechanisms for data security and privacy