The Bangladesh Bank Heist
The Bangladesh Bank Heist
The Bangladesh Bank Heist
In Cyber Vulnerability
Jump to Section:
Subscribe
Share:
OVERVIEW
The thieves were organized, well networked, and well funded. But their
success was, more than anything else, down to weaknesses in the institutions
they robbed.
Understanding exactly what went wrong in the BCB hack – which has been
suggested by some to be linked to the WannaCry ransomware attack of May
2017 – can provide businesses with invaluable lessons in how to improve their
security strategies.
IN DEPTH
The Hack
The hack was highly complex, and took place over several lines of attack:
By the time the BCB reactivated its printer and received the notifications
of the transfers – and requests from the New York Fed for clarification
— it was already too late and the money had been sent.
While a series of spelling and formatting errors in the thieves’ SWIFT
instructions halted the vast majority of the transactions, a total of $81
million was transferred to banks in Southeast Asia and quickly
laundered through, among other places, the Manila casino system.
It was one of the most audacious and successful bank robberies in history.
But what can organizations learn from it?
You can have the most sophisticated state-of-the-art security systems in the
world, but if people are cutting corners or failing to follow instructions, then
criminals can exploit that. And human error played a great part in the BCB
attack, at several points during which the theft could have been stopped:
There is evidence that the workers who installed the SWIFT system in
BCB did not follow official guidelines and that could have opened up
security vulnerabilities.
Ed Stroz, Co-Founder of Stroz Friedberg, sees people — and the risks they
pose — as a central part of any cyber-protection strategy: “The root cause of
many cyber breaches is human behavior. As technologies evolve to become
more secure at a technical level, the employee becomes the soft target, and
the weak link in security. An employee might pose a risk unconsciously,
through carelessness. They could be tricked into clicking on a link or
attachment through a spear-phishing campaign. Or they could pose a more
active risk, because of anger or disgruntlement at work. If you don’t address
the human element in cyber vulnerability, you are not going to be able to
deploy an effective strategy. It’s dangerous to be overly focused on
technology.”
While the idea of “an inside job” might seem like the plot of a Hollywood
blockbuster, there are plenty of reasons for organizations to worry about the
risk posed by their staff. “It’s unpleasant to admit, but people can just be out
for themselves. Or they could have an axe to grind with the company. And
what if they’re being blackmailed from someone outside the company?” asks
Stroz. “An employee with any of these motivations can pose a serious risk to
the integrity of an organization’s defenses.”
Educating staff about the many ways a computer system can be compromised
is critical if a company is to have the strongest cyber defense possible. It’s
also important to learn how to spot the early warning signs of employees who
might pose a security risk, whether through malice or error. Companies should
assess which employees are accessing what type of information and take the
appropriate steps to restrict their access to that information if that
person is deemed to pose a risk.
However, the risks don’t end there. It’s easy to think that by issuing protocols,
you’ve solved the problem. But what if you’ve got the wrong set in the first
place? In the BCB hack, the New York Fed did not have a real-time fraud
detection system. Instead, requests were reviewed and any
suspicious transactions addressed periodically. This gave the thieves a
window of opportunity to launder the money before fraudulent activity was
identified. According to its rules, the Fed did nothing wrong. The problem was
that those rules were not up to the task at hand.
Or what about if you’ve forgotten to put in a key piece of the protocol in the
first place? There were very few ways the BCB and New York Fed could
communicate with one another, other than the printouts. This meant that, in
the hours and days following the malware attack on the BCB, the cyber
thieves got all the time they needed to launder their stolen funds while the
printer was out of commission.
The investigations into the BCB attack are still ongoing and, no doubt, more
revelations will emerge. All the while, cyber-attacks will continue to grow in
scale and severity as the world becomes more and more connected.
The cyber thieves were skilled, but their real success was in exploiting
vulnerabilities in the organizations they targeted – vulnerabilities which may
have been invisible beforehand.
The Bangladesh attack was not the first cyber attack to lead to serious losses,
nor will it be the last. Only by approaching every such event with fresh eyes
will organizations learn to respond to – or prevent – these threats.
TALKING POINTS
“As more financial services are delivered over the Internet, there will be
growing security and privacy concerns from cyber threats. And maybe even
systemic concerns. It is not inconceivable that the next financial crisis is
triggered by a cyber-attack.” – Ravi Menon, Managing Director, Monetary
Authority of Singapore
“In my previous risk management experience, cyber was something for the IT
department. More and more, for CROs, cyber is what makes you lose sleep at
night. On our own and as part of a larger White House effort, we have spent a
great deal of time and effort reviewing and updating our systems.” – Ken
Phelan, CRO, U.S. Treasury
“Each business has to assess the risks posed to it based on its profile and
make these policy determinations. Businesses should learn from the mistakes
of others and consider implementing some of the directives imposed by
regulators in enforcement actions against other companies. There should be
training, and it should inform people as to how to use their devices more
appropriately, including how to write emails. There are always changes in
what is permissible, and those updates should be a part of this ongoing
training.” – John Carlin, Partner at Morrison & Foerster, former Assistant
Attorney General, U.S. Department of Justice
t is clear that there were multiple privileged accounts involved in such attacks. They include
both the accounts of system administrators and application accounts that would enable an
attacker to operate inside the network, but also the accounts of those bank officials who have
the permissions to initiate such high-volume transfers. Attackers commonly look for the
credentials that would enable them to reach their goals, which change and evolve in the course
Failure to secure these powerful credentials and monitor their activity exposes a bank’s network
If the BCB had been monitoring the activity of these accounts, it could have quickly identified the
anomalous behaviour and not have been completely reliant on the Federal Reserve Bank of
New York, Deutsche Bank, or any other third party to flag suspicious activity.
As we saw in the Bangladesh heist, simply gaining control of a printer made sure staff were
unable to see fraudulent transactions, which would have been revealed in the daily transaction
list, and consequently the attack went undetected until it was too late.
the failure to secure the privileged credentials that allow authorised SWIFT users or IT
control.
Once inside a bank’s networks, attackers can hide in plain sight and watch internal processes
and procedures in order to carry out the next stage of their plan with minimum risk of detection.
they obtained valid credentials the banks use to conduct money transfers over
SWIFT and then used those credentials to initiate money transactions as if
they were legitimate bank employees.
ther reports indicate that lax computer security practices at Bangladesh Bank
were to blame: the bank reportedly didn't have firewalls installed on its
networks, raising the possibility that hackers may have breached the network
and found the credentials stored on the system.
BANKING
The recent Bangladesh Central Bank (BCB) heist is believed to have been one of the
largest cyber bank robberies of all time. After almost a year spent carefully planning the
robbery, $81m was stolen before a spelling error denied the hackers of a far greater sum
($1 billion).
The BCB incident bears similarities to the activities of the Carbanak hacking group that
allegedly stole more than $1 billion from financial institutions in 2015. In both cases,
attackers infiltrated the target network and assumed the highest level of insider access
possible. Once inside a bank’s networks, attackers can hide in plain sight and watch
internal processes and procedures in order to carry out the next stage of their plan with
minimum risk of detection. In the case of Carbanak, this was through fraudulent ATM,
cash transactions and money transfers; with BCB, it was in the form of a series of transfer
requests across the global banking system.
Meanwhile, Swift – the global financial messaging network – has subsequently warned of
another second malware attack targeting a commercial bank; believed to be Vietnam’s
Tien Phong Bank. In a statement, Swift noted that the attackers exhibited a “deep and
sophisticated knowledge of specific operational controls” at targeted banks and may have
been aided by “malicious insiders or cyber attacks, or a combination of both”.
Businesses are continuously failing to deal with attackers that exploit both human error
and network vulnerabilities to cause damage and reap financial gains. While the full
impact of the BCB attack was avoided due to the attackers’ mistake, relying on poor
spelling should not be a security policy.
It is clear that there were multiple privileged accounts involved in such attacks. They
include both the accounts of system administrators and application accounts that would
enable an attacker to operate inside the network, but also the accounts of those bank
officials who have the permissions to initiate such high-volume transfers. Attackers
commonly look for the credentials that would enable them to reach their goals, which
change and evolve in the course of attackers’ activity in the network.
Failure to secure these powerful credentials and monitor their activity exposes a bank’s
network to a whole range of attacks and prevents any chance of successful mitigation. If
the BCB had been monitoring the activity of these accounts, it could have quickly
identified the anomalous behaviour and not have been completely reliant on the Federal
Reserve Bank of New York, Deutsche Bank, or any other third party to flag suspicious
activity.
Network weaknesses are no secret; well-known vulnerabilities are being exploited time
and again. For instance, in the latest incident, the failure to secure the privileged
credentials that allow authorised SWIFT users or IT personnel at the bank to access
SWIFT-connected systems resulted in a complete loss of control. If hackers can move
around freely once inside a network, working out how to circumvent transactional checks
and balances and gaining higher levels of enhanced access to the keys to the kingdom,
then whatever any organisations may have spent to secure its network is wasted. As we
saw in the Bangladesh heist, simply gaining control of a printer made sure staff were
unable to see fraudulent transactions, which would have been revealed in the daily
transaction list, and consequently the attack went undetected until it was too late.
We can expect attacks of this nature against financial institutions to become more
aggressive and cyber attackers in general to become bolder and more audacious, going
after bigger targets for greater sums. Financial institutions must take the necessary steps
to prevent attackers from using their own internal credentials against them to operate
inside the network and achieve their nefarious goals. Employing multi-factor
authentication, controlling and monitoring the use of privileged accounts, detecting
potentially malicious behavior and quickly responding to alerts should be at the centre of
security practices employed by organisations to mitigate such attacks.