SWIFT Bank Hack

Last updated: June 29, 2025

Target Audience

Keywords

Introduction

Overview

In 2015 and 2016, a series of cyberattacks were carried out against various banks, and the attackers targeted the SWIFT network to steal funds. The attackers exploited vulnerabilities in SWIFT's Alliance Access software in order to initiate fraudulent transfer requests to accounts they control. Biggest attack was the Bangladesh bank heist, in which the attackers attempted to transfer close to $1B to fraudulent accounts, but were blocked by the New York Federal Reserve due to suspicions raised from a typo in the instructions.

Vulnerability Details

Initial compromise of Bangladesh Bank likely occurred through a combination of phishing emails or other social engineering methods. Sophisticated malware developed and used against SWIFT's Alliance Access software, tailored to manipulate SWIFT messages. With access to Bangladesh Banking systems and knowledge of their transactions, the attackers initiated the fraudulent transfer requests using their compromised SWIFT transfer messages. The attacks were consistent with tactics and methods used by the Lazarus Group, also known as APT 38, which is widely connected to the North Korean government. If APT 38 is backed by the North Koreans, this would be the first instance of a state actor conducting cyber attacks to steal funds, which could have profound implications for international relations. SWIFT announced new mandatory controls that all member banks must follow, and they will inspect member banks for compliance and inform appropriate regulators of noncompliant banks. SWIFT understands that they will continue to be the target of attacks and urge banks to remain vigilant.

Learning Objectives

  • Explain data security and privacy
  • Describe security and privacy violations in the SWIFT banking hack
  • List common protection mechanisms for data security and privacy

Download

  • Includes a PDF case study adapted from a real-world cyber breach
  • Guided questions for student engagement
  • Instructor materials including context and background
  • All content packaged in a downloadable ZIP file

Remote Terminal

Terminal Description

Module Questions

What happened in the SWIFT Banking Hack of 2015?
What are two effective security mechanisms to guard against vulnerabilities like those exploited in the SWIFT hack?
If you were a hacker, how would you launch a similar attack on a financial institution using the SWIFT network?
What are some ways to perform privilege escalation in financial networks?
How can vulnerability scanning be performed in a financial institution's network?
As the CTO of a financial institution, what measures would you implement to enhance the security of financial transaction systems?
SWIFT introduced new mandatory controls after the hack. How would you ensure compliance while minimizing alert overload?
What solution would you propose to segment and categorize SWIFT's networks and resources?
What IT weaknesses were present in SWIFT's systems that enabled the hack?
As the CIO of SWIFT, how would you improve IT security?