Site icon SEPA for Corporates

7 Sizzling SWIFT Cyber Threats YOU Need To Know

A few weeks back SWIFT released a report – ‘Three years on from Bangladesh: tackling the adversaries‘ – detailing SWIFT cyber threats that have emerged in the last few years since the Bangladesh Bank hack. That bank heist was described by the SWIFT CEO Gottfried Leibbrandt “as a watershed moment for the banking industry..”, since the incident SWIFT have launched many initiatives such as the Customer Security Program and worked to engage and collaborate with stakeholders across the financial services landscape.

The SWIFT report is a must-read for SWIFT customers to better understand the evolution and current payments/SWIFT cyber threat space. Following is a quick summary of the highlighted SWIFT cyber threats:

1.) Targets

SWIFT found across many of the reported incidents:

2.) Amounts

It goes without saying the bigger the fraudulent payment, the bigger the reward. But the larger value transactions are also more easily detectable so the threat has evolved:

3.) Reconnaissance

Attackers are prepared to wait and silently watch for weeks and even months before launching an attack. The time is used to learn patterns of behaviour before launching the cyber attack. Ensuring institutions have a cybersecurity incident response plan is critical to help organisations pre-plan their responses.

4.) Timings

The following timing patterns were highlighted by the SWIFT report:

The longer it takes for organisation to detect a fraudulent payment the better it is for the attacker, since it gives them more time to reach the intended Beneficiary bank and being cashed out

5.) Message Types

6.) Currencies

Majority of cross border fraudulent payments were made in:

7.) Beneficiaries

In order for the fraudulent payments to be successfully “cashed out” the beneficiary or “mule” accounts are key. SWIFT found the locations of these mule accounts to be pretty startling:

 

 

Exit mobile version